National Library of Energy BETA

Sample records for lets remote authenticated

  1. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  2. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  3. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  4. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  5. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  6. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 -...

  7. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  8. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  9. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Energy Savers [EERE]

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  10. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  11. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  12. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  13. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  14. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  15. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  16. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  17. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  18. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  20. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  1. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  2. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  3. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  4. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  5. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  6. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  7. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  8. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  9. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  10. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  11. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  12. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  13. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  14. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  15. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  16. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  17. U-267: RSAź Authentication Agent 7.1 for Microsoft Windowsź...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  18. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  19. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  20. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  1. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  2. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  3. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  4. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  5. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  6. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  7. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  8. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  9. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  10. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  11. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  12. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  13. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  14. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  15. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the...

  16. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  17. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  18. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  19. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  20. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  1. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  2. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  3. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  4. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  5. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  6. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  7. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  8. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  9. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  10. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  11. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Energy Savers [EERE]

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  12. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  13. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  14. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  15. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  16. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  17. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  18. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  19. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  20. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  1. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  2. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  3. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  4. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Energy Savers [EERE]

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  5. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  6. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  7. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  8. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  9. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 7: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  10. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  11. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  12. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  13. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  14. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  15. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Energy Savers [EERE]

    Users Access or Modify SSL/TLS Sessions | Department of Energy 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  16. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  17. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  18. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  19. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  20. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  1. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  3. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  4. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  5. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  6. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  7. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  8. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ...

  9. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... remote user with the ability to conduct a man-in-the-middle attack on an HTTPS connection ...

  10. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  11. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  12. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  13. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  14. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  15. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  16. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  17. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  18. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  19. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  20. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  2. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  3. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  6. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  7. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  10. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  11. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  13. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  14. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  15. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target ...

  16. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  17. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Kdump uses the SSH "StrictHostKeyCheckingno" option when dumping to SSH targets. A remote user on the local network with the ability to conduct a man-in-the-middle attack can ...

  18. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the...

  19. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  20. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  1. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  2. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  3. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  4. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  5. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  6. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  7. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  8. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  9. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ... and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let ...

  10. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  11. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  12. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  13. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  14. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  15. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  17. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  19. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  1. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  2. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  3. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  4. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  5. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  6. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions ...

  7. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  8. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  9. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  10. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  11. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  13. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  14. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  15. Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using HSPD-12 Badge. PDF icon HSPD-12 Badge Instructions More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Audit Report: IG-0860

  16. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc PDF icon Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  17. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  18. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  19. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  20. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  1. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  2. CERTIFICATE OF AUTHENTICITY

    Energy Savers [EERE]

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  3. Two-Factor Authentication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Authentication Two-Factor Authentication computer-767784_960_720.jpg Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number is combined with a secret PIN, the resulting passcode provides positive identification, and more reliable user authentication.

  4. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  5. User Guide for Remote Access to VDI/Workplace Using PIV | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy User Guide for Remote Access to VDI/Workplace Using PIV User Guide for Remote Access to VDI/Workplace Using PIV User guide for remote access to VDI/Workplace using a PIV card . PDF icon VDI_WP_PIV_Remote_Guide_Final.pdf More Documents & Publications User guide for remote access to VDI and Workplace using RSA token Remote Access Options Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA)

  6. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be...

  7. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token PDF icon VDI_WP_RSA_Remote_Guide_Final.pdf More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  8. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  9. Remote Connections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Connections Remote Connections Monday, Feb. 23 New User and Data Analytics Training Monday's training presentations will be broadcast using WebEx. Use a browser to connect...

  10. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL...

  11. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  12. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  13. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  14. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  15. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  16. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  17. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  18. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service

  19. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  20. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  1. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  2. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college students with the training and hands-on experience. This video highlights how the competition is shaping the careers of the students involved and making sustainable home design popular. | Video by Matty Greene, Energy Department. Richard King Richard King Director, Solar Decathlon Solar Decathlon 2015 Team Facts: This

  3. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian,

  4. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  5. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  6. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  7. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  8. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  9. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  10. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  11. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  12. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  13. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  14. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  15. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Device Manager (ASDM) Administrative Access * Telnet Access * SSH Access * Virtual ... Security Focus Bugtraq ID: 45768 SecurityTracker Alert ID: 1024963 CVE-2010-4692 ...

  16. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  17. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  18. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  19. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  20. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  2. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  3. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  4. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  5. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g., UDP, TCP) data from the specially crafted IP packet. Nexus 1000v, 5000, and 7000 Series Switches...

  6. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  7. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  8. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  9. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... of Cisco's software license terms found at http:www.cisco.comenUSdocsgeneralwarrantyEnglishEU1KEN.html, or as otherwise set forth at Cisco.com Downloads at http:...

  10. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  11. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  12. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Savers [EERE]

    Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric

  13. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  14. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  15. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  16. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  17. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  18. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  19. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  20. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  1. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  2. Citrix_2FA_Authentication_09.09 | Department of Energy

    Office of Environmental Management (EM)

    Citrix_2FA_Authentication_09.09 Citrix_2FA_Authentication_09.09 PDF icon Citrix_2FA_Authentication-September09 More Documents & Publications Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc

  3. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have...

  4. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  5. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  6. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Energy Savers [EERE]

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. PDF icon Spotlight on Austin, Texas More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  8. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E. (West Melbourne, FL)

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  9. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  10. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  11. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  12. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  13. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  14. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  15. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph; Olsen, Khris; Larson, David

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  16. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Projects Remote Sensor Placement Collaboration between Los Alamos National Laboratory and the University of California at San Diego (UCSD) Jacobs School of Engineering Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Ellie Vigil (505) 667-2818 Email Administrative Assistant Rebecca Duran (505) 665-8899 Email The goal of this work is to develop a new autonomous capability for remotely deploying

  17. Remote Access Options

    Energy Savers [EERE]

    Remote Access Options November 2013 Remote Access Options for EITS Customers If access is required to DOE Headquarters internal network resources, such as messaging, productivity tools or network-stored files and folders while away from the DOE building, you can access them through a Virtual Private Network. Follow the instructions below. (Note: You must have access to the Internet to use these services) Virtual Private Network A Virtual Private Network (VPN) is a private connection between two

  18. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  19. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  20. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  1. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  2. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Experience | Department of Energy Mentoring Café- Engaging Young Women in an Authentic Mentoring Experience STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring Experience May 30, 2014 - 1:34pm Addthis STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard Space Flight Center It is a well-known fact: The percentage of women in science,

  3. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F. (Pullman, WA); Tetzlaff, Wolfgang (Pullman, WA); Hegland, Joel E. (Pullman, WA); Jones, Scott C. (Pullman, WA)

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  4. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  6. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  7. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, ... - Using Technology to Increase Transparency V-057: eXtplorer "extfinduser()" ...

  8. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  9. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  10. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks....

  11. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  12. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  13. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  14. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  15. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  16. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)

    Energy Savers [EERE]

    17/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be

  17. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  18. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  19. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  20. Advanced laser remote sensing

    SciTech Connect (OSTI)

    Schultz, J.; Czuchlewski, S.; Karl, R.

    1996-11-01

    This is the final report of a three-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory. Remote measurement of wind velocities is critical to a wide variety of applications such as environmental studies, weather prediction, aircraft safety, the accuracy of projectiles, bombs, parachute drops, prediction of the dispersal of chemical and biological warfare agents, and the debris from nuclear explosions. Major programs to develop remote sensors for these applications currently exist in the DoD and NASA. At present, however, there are no real-time, three-dimensional wind measurement techniques that are practical for many of these applications and we report on two new promising techniques. The first new technique uses an elastic backscatter lidar to track aerosol patterns in the atmosphere and to calculate three dimensional wind velocities from changes in the positions of the aerosol patterns. This was first done by Professor Ed Eloranta of the University of Wisconsin using post processing techniques and we are adapting Professor Eloranta`s algorithms to a real-time data processor and installing it in an existing elastic backscatter lidar system at Los Alamos (the XM94 helicopter lidar), which has a compatible data processing and control system. The second novel wind sensing technique is based on radio-frequency (RF) modulation and spatial filtering of elastic backscatter lidars. Because of their compactness and reliability, solid state lasers are the lasers of choice for many remote sensing applications, including wind sensing.

  1. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  2. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  3. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  4. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of solar energy systems in the United States. <a href="http://www.energy.gov/eere/articles/help-solve-solar-s-big-challenge">Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems.</a> | Infographic by SunShot Learn how soft costs are

  5. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department

  6. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Office of Environmental Management (EM)

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your retirement savings statements and feel like you're sending your money down the drain? Do you deposit more money each paycheck into your retirement account, but find the balance goes down, not up? Pssst, want to invest in a "sure thing?" No, this isn't a scam. It's a device that has no moving parts to break down, but

  7. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  8. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  9. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  10. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

    1988-01-01

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  11. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  12. Remote Alaskan Communities Energy Efficiency Competition Social...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Alaska Stakeholders-Below you ...

  13. Hyperspectral Remote Sensing Techniques For Locating Geothermal...

    Open Energy Info (EERE)

    Remote Sensing Techniques For Locating Geothermal Resources Jump to: navigation, search OpenEI Reference LibraryAdd to library Poster: Hyperspectral Remote Sensing Techniques For...

  14. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  15. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  16. Robotics and remote systems applications

    SciTech Connect (OSTI)

    Rabold, D.E.

    1996-05-01

    This article is a review of numerous remote inspection techniques in use at the Savannah River (and other) facilities. These include: (1) reactor tank inspection robot, (2) californium waste removal robot, (3) fuel rod lubrication robot, (4) cesium source manipulation robot, (5) tank 13 survey and decontamination robots, (6) hot gang valve corridor decontamination and junction box removal robots, (7) lead removal from deionizer vessels robot, (8) HB line cleanup robot, (9) remote operation of a front end loader at WIPP, (10) remote overhead video extendible robot, (11) semi-intelligent mobile observing navigator, (12) remote camera systems in the SRS canyons, (13) cameras and borescope for the DWPF, (14) Hanford waste tank camera system, (15) in-tank precipitation camera system, (16) F-area retention basin pipe crawler, (17) waste tank wall crawler and annulus camera, (18) duct inspection, and (19) deionizer resin sampling.

  17. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce All About Contractors Austin Energy, a municipally owned utility, has a long history of collaborating closely with the building contractors in its area to deliver energy efficiency programs, which benefits both parties involved. Because contractors understand that Austin Energy has made a long-term commitment to supporting energy efficiency, they have been willing to invest time and money into the technical

  18. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. The REMOTE SENSlNf

    Office of Legacy Management (LM)

    REMOTE SENSlNf ' . 1 ARllRllRRv OF THE UNITED STATES DEPARTMENT OF ENERGY . . . . .a. * ~~&hrEAWWMms Gap ~~&hrEAwwMms Gap ECT FOLLdW-UP REPORT ECT FOLLdW-UP REPORT NOVEMBER 1979 NOVEMBER 1979 AN AERIAL RADIOLOGICAL SURVEY OF THE CURTIS BAY FACILITY OF THE W. FL GRACE COMPANY Baltimore, Maryland t. Kent Hilton Project Scientist APPROVED FORPUBLlCATlON ' : T. P. Stuart, Manager Remote Sensing Sciences Department ATTACHMENT 4- ECT Follow-Up Report AN AERIAL RADIOLOGICAL SURVEY OF THE

  1. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger ...

  2. REMOTE ACCESS SERVICES | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Energy IT Services (EITS) Remote Access Services: Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network As of May 1, 2014, only Government-Furnished Equipment (GFE) provisioned by EITS will be allowed to connect via EITS Virtual Private Networking (VPN) service. The required software to connect to VPN is pre-installed on the device. Citrix Workplace--Legacy

  3. Working with SRNL - Our Facilities - Remote Systems Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Systems Laboratory Remote Systems Laboratory Working with SRNL Our Facilities - Remote Systems Laboratory The Remote Systems Laboratory is used for the design, development, fabrication, and testing of unique equipment systems for use in radioactive, hazardous or inaccessible environments

  4. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  5. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

    2006-03-21

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  6. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  7. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  8. Remote Access Options | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Access Options Remote Access Options A Virtual Private Network (VPN) is a private connection between two resources that uses the public telecommunication infrastructure. It maintains privacy through the use of a tunneling protocol and security procedures and provides the following abilities. * Messaging via Outlook Web Access (OWA) * Remote desktop and application access via VDI and Citrix(tm) Workplace * Secure access to DOE Headquarters mission-specific internal network resources PDF

  9. Request for Information -- Remote Alaskan Communities Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    competitive effort to elicit the best approaches. The competition is being designed to empower remote Alaskan communities to develop and implement solutions that can effectively...

  10. Quick-connect coupler for remote manipulation

    DOE Patents [OSTI]

    Dobbins, James C. (Idaho Falls, ID)

    1990-01-01

    An adaptor for a single-point attachment, push-to-connect/pull-to-disconnect, quick-connect fluid coupler which enables the coupler to be remotely manipulated.

  11. Geobotanical Remote Sensing For Geothermal Exploration | Open...

    Open Energy Info (EERE)

    Exploration Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Geobotanical Remote Sensing For Geothermal Exploration Abstract This paper presents a...

  12. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  13. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert (Santa Fe, NM); Swift, Gregory W. (Los Alamos, NM); Garrett, Steven L. (Pebble Beach, CA)

    1986-01-01

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  14. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.31Ś0.31Ś0.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  15. Remote-controlled NDA (nondestructive assay) systems for feed and product storage at an automated MOX (mixed oxide) facility

    SciTech Connect (OSTI)

    Menlove, H.O.; Augustson, R.H.; Ohtani, T.; Seya, M.; Takahashi, S.; Abedin-Zadeh, R.; Hassan, B.; Napoli, S.

    1989-01-01

    Nondestructive assay (NDA) systems have been developed for use in an automated mixed oxide (MOX) fabrication facility. Unique features have been developed for the NDA systems to accommodate robotic sample handling and remote operation. In addition, the systems have been designed to obtain International Atomic Energy Agency inspection data without the need for an inspector at the facility at the time of the measurements. The equipment is being designed to operate continuously in an unattended mode with data storage for periods of up to one month. The two systems described in this paper include a canister counter for the assay of MOX powder at the input to the facility and a capsule counter for the assay of complete liquid-metal fast breeder reactor fuel assemblies at the output of the plant. The design, performance characteristics, and authentication of the two systems will be described. The data related to reliability, precision, and stability will be presented. 5 refs., 10 figs., 4 tabs.

  16. Remotely Monitored Sealing Array Software

    SciTech Connect (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to last for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.

  17. Remotely Monitored Sealing Array Software

    Energy Science and Technology Software Center (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to lastmore » for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.« less

  18. Remote Whispering Applying Time Reversal

    SciTech Connect (OSTI)

    Anderson, Brian Eric

    2015-07-16

    The purpose of this project was to explore the use of time reversal technologies as a means for communication to a targeted individual or location. The idea is to have the privacy of whispering in one’s ear, but to do this remotely from loudspeakers not located near the target. Applications of this work include communicating with hostages and survivors in rescue operations, communicating imaging and operational conditions in deep drilling operations, monitoring storage of spent nuclear fuel in storage casks without wires, or clandestine activities requiring signaling between specific points. This technology provides a solution in any application where wires and radio communications are not possible or not desired. It also may be configured to self calibrate on a regular basis to adjust for changing conditions. These communications allow two people to converse with one another in real time, converse in an inaudible frequency range or medium (i.e. using ultrasonic frequencies and/or sending vibrations through a structure), or send information for a system to interpret (even allowing remote control of a system using sound). The time reversal process allows one to focus energy to a specific location in space and to send a clean transmission of a selected signal only to that location. In order for the time reversal process to work, a calibration signal must be obtained. This signal may be obtained experimentally using an impulsive sound, a known chirp signal, or other known signals. It may also be determined from a numerical model of a known environment in which the focusing is desired or from passive listening over time to ambient noise.

  19. Advanced Remote Maintenance Design for Pilot-Scale Centrifugal...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Citation Details In-Document Search Title: Advanced Remote Maintenance Design for ...

  20. Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring...

    Open Energy Info (EERE)

    Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Hyperspectral Geobotanical Remote...

  1. Category:Remote Sensing Techniques | Open Energy Information

    Open Energy Info (EERE)

    Remote Sensing Techniques Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermalpower.jpg Looking for the Remote Sensing Techniques page? For detailed information...

  2. Remote Control of Laboratory Equipment for Educational Purposes...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Control of Laboratory Equipment for Educational Purposes This invention consists of a method to remote control many types of laboratory equipment that is typically found in...

  3. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  4. Remotely operated submersible underwater suction apparatus

    DOE Patents [OSTI]

    Kristan, Louis L. (2111 Brentwood Dr., Idaho Falls, ID 83402)

    1990-01-01

    A completely submersible, remotely operated underwater suction device for collection of irradiated materials in a nuclear pool is disclosed. The device includes a pump means for pumping water through the device, a filter means for capturing irradiated debris, remotely operated releasable connector means, a collection means and a means for remotely maneuvering the collection means. The components of the suction device may be changed and replaced underwater to take advantage of the excellent radiation shielding ability of water to thereby minimize exposure of personnel to radiation.

  5. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  6. Apparatus for remotely handling components

    DOE Patents [OSTI]

    Szkrybalo, Gregory A.; Griffin, Donald L.

    1994-01-01

    The inventive apparatus for remotely handling bar-like components which define a longitudinal direction includes a gripper mechanism for gripping the component including first and second gripper members longitudinally fixedly spaced from each other and oriented parallel to each other in planes transverse to the longitudinal direction. Each gripper member includes a jaw having at least one V-groove with opposing surfaces intersecting at a base and extending radially relative to the longitudinal direction for receiving the component in an open end between the opposing surfaces. The V-grooves on the jaw plate of the first and second gripper members are aligned in the longitudinal direction to support the component in the first and second gripper members. A jaw is rotatably mounted on and a part of each of the first and second gripper members for selectively assuming a retracted mode in which the open end of the V-groove is unobstructed and active mode in which the jaw spans the open end of the V-groove in the first and second gripper members. The jaw has a locking surface for contacting the component in the active mode to secure the component between the locking surface of the jaw and the opposing surfaces of the V-groove. The locking surface has a plurality of stepped portions, each defining a progressively decreasing radial distance between the base of the V-groove and the stepped portion opposing the base to accommodate varying sizes of components.

  7. Remote Area Modular Monitoring (RAMM) infographic | Argonne National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory Remote Area Modular Monitoring (RAMM) infographic PDF icon ramminfographic

  8. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  9. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, Melvin A. (Santa Barbara, CA)

    1992-01-01

    A fiber optically isolated and remotely stabilized data transmission system s described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber.

  10. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  11. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Energy Savers [EERE]

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition As part of President Obama's commitment to fight climate change and assist remote Alaskan Communities, the Energy Department (DOE) is proposing a new $4 million initiative to significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies. The competition is intended to empower

  12. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition As part of President Obama's commitment to fight climate change and assist remote Alaskan Communities, the Energy Department (DOE) is proposing a new $4 million initiative to significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies. The competition is intended to empower

  13. Remote inspection system for hazardous sites

    SciTech Connect (OSTI)

    Redd, J.; Borst, C.; Volz, R.A.; Everett, L.J.

    1999-04-01

    Long term storage of special nuclear materials poses a number of problems. One of these is a need to inspect the items being stored from time to time. Yet the environment is hostile to man, with significant radiation exposure resulting from prolonged presence in the storage facility. This paper describes research to provide a remote inspection capability, which could lead to eliminating the need for humans to enter a nuclear storage facility. While there are many ways in which an RI system might be created, this paper describes the development of a prototype remote inspection system, which utilizes virtual reality technology along with robotics. The purpose of this system is to allow the operator to establish a safe and realistic telepresence in a remote environment. In addition, it was desired that the user interface for the system be as intuitive to use as possible, thus eliminating the need for extensive training. The goal of this system is to provide a robotic platform with two cameras, which are capable of providing accurate and reliable stereographic images of the remote environment. One application for the system is that it might be driven down the corridors of a nuclear storage facility and utilized to inspect the drums inside, all without the need for physical human presence. Thus, it is not a true virtual reality system providing simulated graphics, but rather an augmented reality system, which performs remote inspection of an existing, real environment.

  14. V-163: Red Hat Network Satellite Server Inter-Satellite Sync...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May...

  15. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J.; King, W.C.

    1993-06-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  16. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J. ); King, W.C. . Dept. of Geography and Environmental Engineering)

    1993-01-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  17. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

  18. NREL: Technology Deployment - Remote Shading Tool Has Potential...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to determine the accuracy of Solar Census' remote online shading tool. NREL conducted a blind study to determine the accuracy of the remote shading algorithms in the software and...

  19. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  20. Request for Information -- Remote Alaskan Communities Energy Efficiency

    Energy Savers [EERE]

    Competition | Department of Energy Request for Information -- Remote Alaskan Communities Energy Efficiency Competition Request for Information -- Remote Alaskan Communities Energy Efficiency Competition As part of President Obama's commitment to fight climate change and assist remote Alaskan Communities, the Energy Department (DOE) is proposing a new $4 million initiative to significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies, through a

  1. Solar Energy Prospecting in Remote Alaska | Department of Energy

    Energy Savers [EERE]

    Solar Energy Prospecting in Remote Alaska Solar Energy Prospecting in Remote Alaska Solar-Prospecting-AK-final.jpg A new report from the U.S. Department of Energy Office of Indian Energy, "Solar Energy Prospecting in Remote Alaska: An Economic Analysis of Solar Photovoltaics in the Last Frontier State," focuses on two of the most pressing issues for remote Alaska Native villages: reducing or stabilizing the unsustainably high cost of diesel generation, and providing reliable and

  2. Analysis of Bright Harvest Remote Analysis for Residential Solar Installations

    SciTech Connect (OSTI)

    Nangle, John; Simon, Joseph

    2015-06-17

    Bright Harvest provides remote shading analysis and design products for residential PV system installers. The National Renewable Energy Laboratory (NREL) through the NREL Commercialization Assistance Program, completed comparative assessments between on-site measurements and remotely calculated values to validate the accuracy of Bright Harvest’s remote shading and power generation.

  3. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, Patrick E. (157 Greenwood Dr., Martinez, GA 30907); Prather, William S. (2419 Dickey Rd., Augusta, GA 30906); Livingston, Ronald R. (137 Breckenridge Dr., N. Augusta, GA)

    1991-01-01

    A probe for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables.

  4. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

    1991-08-13

    A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

  5. Small geothermal electric systems for remote powering

    SciTech Connect (OSTI)

    Entingh, Daniel J.; Easwaran, Eyob.; McLarty, Lynn

    1994-08-08

    This report describes conditions and costs at which quite small (100 to 1,000 kilowatt) geothermal systems could be used for off-grid powering at remote locations. This is a first step in a larger process of determining locations and conditions at which markets for such systems could be developed. The results suggest that small geothermal systems offer substantial economic and environmental advantages for powering off-grid towns and villages. Geothermal power is most likely to be economic if the system size is 300 kW or greater, down to reservoir temperatures of 100{degree}C. For system sizes smaller than 300 kW, the economics can be favorable if the reservoir temperature is about 120{degree}C or above. Important markets include sites remote from grids in many developing and developed countries. Estimates of geothermal resources in many developing countries are shown.

  6. Aerosol Remote Sealing System - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Aerosol Remote Sealing System Lawrence Berkeley National Laboratory Contact LBL About This Technology Technology Marketing SummaryMark Modera and Francois Remi Carrie from Berkeley National Laboratory have developed a rapid, economical technique to seal duct and other enclosed systems by means of an internally injected aerosol. DescriptionBerkeley National Laboratory's aerosol compound seals holes in enclosed systems and is effective even after bends and junctions. A unique, in situ aerosol

  7. Remote Sensing Laboratory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Remote Sensing Laboratory | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  8. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, David W. (San Diego, CA); Hager, E. Randolph (La Jolla, CA)

    1986-01-01

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  9. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  10. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, D.W.; Hager, E.R.

    1984-02-22

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  11. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

    1998-10-06

    A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

  12. Implantable, remotely-programmable insulin infusion system

    SciTech Connect (OSTI)

    Carlson, G.A.; Bair, R.E.; Gaona, J.I. Jr.; Love, J.T.; Urenda, R.S.

    1981-10-01

    An implantable, remotely-programmable insulin infusion system is described which has a mass of 280 grams and an implanted lifetime exceeding two years. The system uses a rotary solenoid-driven peristaltic pump controlled by low power CMOS timing circuitry which provides bimodal insulin delivery. Fifteen low rates from 0.39 to 5.9 units/hour and 15 high doses from 0.84 to 12.5 units are available using U100 insulin. The system has been tested in the laboratory, evaluated in diabetic dogs, and implanted in one diabetic human.

  13. PV Charging System for Remote Area Operations

    SciTech Connect (OSTI)

    Ilsemann, Frederick; Thompson, Roger

    2008-07-31

    The objective of this project is to provide the public with a study of new as well existing technology to recharge batteries used in the field. A new product(s) will also be built based upon the information ascertained. American Electric Vehicles, Inc. (AEV) developed systems and methods suitable for charging state-of-the-art lithium-ion batteries in remote locations under both ideal and cloudy weather conditions. Conceptual designs are described for existing and next generation technology, particularly as regards solar cells, peak power trackers and batteries. Prototype system tests are reported.

  14. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, Martin J. (Pittsburgh, PA); Fiscus, Gregory M. (McMurray, PA); Sammel, Alfred G. (Pittsburgh, PA)

    1998-01-01

    A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

  15. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, S.B.; Milanovich, F.P.

    1995-11-14

    A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

  16. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, Steve B. (Livermore, CA); Milanovich, Fred P. (Lafayette, CA)

    1995-01-01

    A miniature dual syringe-type pump assembly which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor.

  17. REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS

    SciTech Connect (OSTI)

    NELSON RL

    2008-07-18

    The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

  18. Estimation of the relationship between remotely sensed anthropogenic heat

    Office of Scientific and Technical Information (OSTI)

    discharge and building energy use (Journal Article) | SciTech Connect SciTech Connect Search Results Journal Article: Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use Citation Details In-Document Search Title: Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use This paper examined the relationship between remotely sensed anthropogenic heat discharge and energy use from

  19. Special Section Guest Editorial. Advances in Remote Sensing for Monitoring

    Office of Scientific and Technical Information (OSTI)

    Global Environmental Changes (Journal Article) | SciTech Connect Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes This paper focuses on advances in remote sensing for monitoring global environmental changes, and discussed10 papers selected from a number of areas of expertise. Authors: Zhou,

  20. Special Section Guest Editorial. Advances in Remote Sensing for Monitoring

    Office of Scientific and Technical Information (OSTI)

    Global Environmental Changes (Journal Article) | SciTech Connect Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes This paper focuses on advances in remote sensing for monitoring global environmental changes, and discussed10 papers selected from a number of areas of expertise. Authors: Zhou,

  1. FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | Department of Energy FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition The Remote Alaska Communities Energy Efficiency Competition will empower Alaskan communities and native Alaskan villages to develop effective tools to advance the use of reliable, affordable, and energy efficient solutions that are replicable throughout Alaska and other Arctic regions. Download the fact sheet below for

  2. Energy Department Announces Request for Information on the Remote Alaskan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communities Energy Efficiency Competition | Department of Energy Request for Information on the Remote Alaskan Communities Energy Efficiency Competition Energy Department Announces Request for Information on the Remote Alaskan Communities Energy Efficiency Competition September 30, 2015 - 12:52pm Addthis The Energy Department announced today a Request for Information (RFI) to help shape the design of a newly proposed initiative - a Remote Alaskan Communities Energy Efficiency Competition.

  3. Sandia National Laboratories: Employee & Retiree Resources: Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee & Retiree Resources Emergency Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Resources you can access directly with a CryptoCard from any computing device Webmail - includes Outlook calendar and web-based IM Expense Report HR Self Service Techweb Portal Corporate Training (TEDS) SharePoint External Collaboration Network Enterprise Information Management Services (EIMS) Remote.sandia.gov Portal for RDP

  4. Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet

    Energy Savers [EERE]

    15 Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet Background Remote Alaskan communities face a number of unique energy challenges, with the harsh climate and isolation combining to drive up energy costs. The remote locations, in many cases only reached by air or boat, add significant costs to any fuel imported to the communities which on the average are nearly double the medium amount spent throughout the United States, according to the U. S. Energy Information

  5. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Energy Savers [EERE]

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition February 2, 2016 5:00PM EST DOE Office of Indian Energy and Office of Energy Efficiency and Renewable Energy The U.S. Department of Energy's (DOE's) Office of Indian Energy and Office of Energy Efficiency and Renewable Energy (EERE) have issued a Notice of Technical Assistance (NOTA) to significantly accelerate efforts by remote Alaskan communities to adopt sustainable

  6. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition January 26, 2016 5:00PM EST DOE Office of Indian Energy and Office of Energy Efficiency and Renewable Energy The U.S. Department of Energy's (DOE's) Office of Indian Energy and Office of Energy Efficiency and Renewable Energy (EERE) have issued a Notice of Technical Assistance (NOTA) to significantly accelerate efforts by remote Alaskan communities to adopt sustainable

  7. Remote Duct Sealing in Residential and Commercial Buildings | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings: "Saving Money, Saving Energy and Improving Performance," Lawrence Berkeley National Laboratory, presented by Dr. Mark Modera, staff scientist, Environmental Energy Technologies Division. PDF icon LBNL Duct Sealing Presentation More Documents & Publications Ventilation in Multifamily Buildings

  8. River Turbine Provides Clean Energy to Remote Alaskan Village | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy River Turbine Provides Clean Energy to Remote Alaskan Village River Turbine Provides Clean Energy to Remote Alaskan Village August 18, 2015 - 10:36am Addthis River Turbine Provides Clean Energy to Remote Alaskan Village Alison LaBonte Marine and Hydrokinetic Technology Manager To date, Ocean Renewable Power Company (ORPC) is the only company to have built, operated and delivered power to a utility grid from a hydrokinetic tidal project, and to a local microgrid from a hydrokinetic

  9. Method of determining forest production from remotely sensed forest parameters

    DOE Patents [OSTI]

    Corey, J.C.; Mackey, H.E. Jr.

    1987-08-31

    A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

  10. Active and Passive Remote Sensing Diagram | Open Energy Information

    Open Energy Info (EERE)

    Active and Passive Remote Sensing Diagram Author National Aeronautics and Space Administration Published Nasa.gov, 2013 DOI Not Provided Check for DOI availability: http:...

  11. Energy Department Announces Request for Information on the Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the design of a newly proposed initiative - a Remote Alaskan Communities Energy Efficiency Competition. Aligning with President Obama's commitment to combat climate change and ...

  12. An Integrated Mapping And Remote Sensing Investigation Of The...

    Open Energy Info (EERE)

    Mapping And Remote Sensing Investigation Of The Structural Control For Fumarole Location In The Eburru Volcanic Complex, Kenya Rift Jump to: navigation, search OpenEI Reference...

  13. Special Section Guest Editorial. Advances in Remote Sensing for...

    Office of Scientific and Technical Information (OSTI)

    Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global ...

  14. Estimation of the relationship between remotely sensed anthropogenic...

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Search Results Journal Article: Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use Citation Details ...

  15. Testing a Cloud Condensation Nuclei Remote Sensing Method

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Cloud Condensation Nuclei Remote Sensing Method S. J. Ghan Climate Physics Pacific Northwest National Laboratory Richland, Washington D. R. Collin Department of Atmospheric...

  16. Remote Gas Well Monitoring Technology Applied to Marcellus Shale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... for Improved Enhanced Oil Recovery Technique Remote Gas Well Monitoring Technology Applied to Marcellus Shale Site New Breathalyzer Offers Hope of Pain-Free Diabetes Monitoring

  17. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guest Lecturer Discusses Hurricane Hunting - By Remote Control On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and...

  18. Advanced Network Toolkit for Assessments and Remote Mapping ...

    Broader source: Energy.gov (indexed) [DOE]

    Uses existing information to passively map control systems networks and identify cyber security perimeters Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)...

  19. System and method for controlling remote devices

    DOE Patents [OSTI]

    Carrender, Curtis Lee; Gilbert, Ronald W.; Scott, Jeff W.; Clark, David A.

    2006-02-07

    A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.

  20. Remote control for anode-cathode adjustment

    DOE Patents [OSTI]

    Roose, Lars D. (Albuquerque, NM)

    1991-01-01

    An apparatus for remotely adjusting the anode-cathode gap in a pulse power machine has an electric motor located within a hollow cathode inside the vacuum chamber of the pulse power machine. Input information for controlling the motor for adjusting the anode-cathode gap is fed into the apparatus using optical waveguides. The motor, controlled by the input information, drives a worm gear that moves a cathode tip. When the motor drives in one rotational direction, the cathode is moved toward the anode and the size of the anode-cathode gap is diminished. When the motor drives in the other direction, the cathode is moved away from the anode and the size of the anode-cathode gap is increased. The motor is powered by batteries housed in the hollow cathode. The batteries may be rechargeable, and they may be recharged by a photovoltaic cell in combination with an optical waveguide that receives recharging energy from outside the hollow cathode. Alternatively, the anode-cathode gap can be remotely adjusted by a manually-turned handle connected to mechanical linkage which is connected to a jack assembly. The jack assembly converts rotational motion of the handle and mechanical linkage to linear motion of the cathode moving toward or away from the anode.

  1. Conceptual design analyses for Hanford Site deployable remote spectroscopy systems

    SciTech Connect (OSTI)

    Philipp, B.L.; Reich, F.R.

    1994-09-01

    This document identifies potential remote, NIR spectroscopic waste surface moisture monitoring system design alternatives to be operated inside one of the Hanford Site, high level, nuclear waste storage tanks. Potential tank waste moisture data impacts from the remote NIR signal transfer through high humidity vapor space is evaluated.

  2. User Guide Remote Access to VDI/Workplace Using PIV

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Access to VDI/Workplace Using PIV Innovation & Engineering Office (IM-64) May 2015 U. S. Department of Energy | Remote Access to VDI/Workplace Using a PIV 2 Table of Contents 1 Overview .............................................................................................................................................. 3 1.1 Web Browsers ............................................................................................................................... 3

  3. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one month after irradiation (IR). At four months post-IR, these animals were comparable to sham-treated controls with regards to the abovementioned structural parameters. Irradation at 1 or 10 cGy did not result in any significant changes in bone structural parameters. (3) Irradiation of 16-wk old male mice with high doses of 56Fe or proton (50 or 200cGy), but not at low doses (5 or 10cGy), showed a similar loss of cancellous BV/TV and trabecular number at five weeks post-IR. (4) Age-related bone loss overtook acute radiation-induced decrements in bone structure within four months post-IR with 100 cGy gamma and 12 months post-IR with 200 cGy iron. Transgenic mice globally overexpressing human catalase gene in mitochondria did not exhibit cancellous bone loss as assessed at four month post-IR with 10 cGy proton, 50 cGy iron, or in combination. (5) The cellular and molecular mechanisms responsible for loss of bone with radiation are mediated primarily through increased osteoclastogenesis. Our data provide evidence that there are increases in gene expression of TNF alpha and MCP1 in the bone marrow cells 24 hours post-IR and of osteoclastogenic differentiation factor RANKL by day 3. These cytokines in the marrow may stimulate mature osteoclasts or drive osteoclastogenesis from precursors. (6) Osteoblastogenesis from marrow progenitors evaluated ex vivo decreased following whole body 56Fe irradiation at a dose threshold between 20 and 50 cGy whereas osteoclastogenesis ex vivo increased with doses as low as 10cGy two days post-IR of mice. However, the latter finding was not observed in more than a single experiment. (7) Gamma irradiation of cells in vitro requires relatively high doses (200cGy) to disturb normal osteoblastogenesis and osteoclastogenesis as evidenced by decrements in mineralized nodule formation, osteoclast counts, and expression of osteoblast related genes such as runx2, col1a1. (8) We also investigated the effect of antioxidants on osteoblastogenesis following low dose in vitro gamma irradiation (15cGy) on day four bone marrow stromal cell cultures. Super

  4. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan (Knoxville, TN); Britton, Charles L. (Alcoa, TN); Pearce, James (Lenoir City, TN); Jagadish, Usha (Knoxville, TN); Sikka, Vinod K. (Oak Ridge, TN)

    2008-11-11

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interference circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitting with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  5. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan (Knoxville, TN) [Knoxville, TN; Britton, Charles L. (Alcoa, TN) [Alcoa, TN; Pearce, James (Lenoir City, TN) [Lenoir City, TN; Jagadish, Usha (Knoxville, TN) [Knoxville, TN; Sikka, Vinod K. (Oak Ridge, TN) [Oak Ridge, TN

    2010-11-02

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interface circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitter with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  6. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  7. Method to analyze remotely sensed spectral data

    DOE Patents [OSTI]

    Stork, Christopher L. (Albuquerque, NM); Van Benthem, Mark H. (Middletown, DE)

    2009-02-17

    A fast and rigorous multivariate curve resolution (MCR) algorithm is applied to remotely sensed spectral data. The algorithm is applicable in the solar-reflective spectral region, comprising the visible to the shortwave infrared (ranging from approximately 0.4 to 2.5 .mu.m), midwave infrared, and thermal emission spectral region, comprising the thermal infrared (ranging from approximately 8 to 15 .mu.m). For example, employing minimal a priori knowledge, notably non-negativity constraints on the extracted endmember profiles and a constant abundance constraint for the atmospheric upwelling component, MCR can be used to successfully compensate thermal infrared hyperspectral images for atmospheric upwelling and, thereby, transmittance effects. Further, MCR can accurately estimate the relative spectral absorption coefficients and thermal contrast distribution of a gas plume component near the minimum detectable quantity.

  8. Remote adjustable focus Raman spectroscopy probe

    DOE Patents [OSTI]

    Schmucker, John E.; Blasi, Raymond J.; Archer, William B.

    1999-01-01

    A remote adjustable focus Raman spectroscopy probe allows for analyzing Raman scattered light from a point of interest external probe. An environmental barrier including at least one window separates the probe from the point of interest. An optical tube is disposed adjacent to the environmental barrier and includes a long working length compound lens objective next to the window. A beam splitter and a mirror are at the other end. A mechanical means is used to translated the prove body in the X, Y, and Z directions resulting in a variable focus optical apparatus. Laser light is reflected by the beam splitter and directed toward the compound lens objective, then through the window and focused on the point of interest. Raman scattered light is then collected by the compound lens objective and directed through the beam splitter to a mirror. A device for analyzing the light, such as a monochrometer, is coupled to the mirror.

  9. Remote control of a scanning electron microscope aperture and gun alignment

    DOE Patents [OSTI]

    Cramer, Charles E.; Campchero, Robert J.

    2003-10-07

    This invention relates to a remote control system which through gear motors coupled to the scanning electron microscope (SEM) manual control knobs readily permits remote adjustments as necessary.

  10. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  11. Remote handling facility and equipment used for space truss assembly

    SciTech Connect (OSTI)

    Burgess, T.W.

    1987-01-01

    The ACCESS truss remote handling experiments were performed at Oak Ridge National Laboratory's (ORNL's) Remote Operation and Maintenance Demonstration (ROMD) facility. The ROMD facility has been developed by the US Department of Energy's (DOE's) Consolidated Fuel Reprocessing Program to develop and demonstrate remote maintenance techniques for advanced nuclear fuel reprocessing equipment and other programs of national interest. The facility is a large-volume, high-bay area that encloses a complete, technologically advanced remote maintenance system that first began operation in FY 1982. The maintenance system consists of a full complement of teleoperated manipulators, manipulator transport systems, and overhead hoists that provide the capability of performing a large variety of remote handling tasks. This system has been used to demonstrate remote manipulation techniques for the DOE, the Power Reactor and Nuclear Fuel Development Corporation (PNC) of Japan, and the US Navy in addition to the National Aeronautics and Space Administration. ACCESS truss remote assembly was performed in the ROMD facility using the Central Research Laboratory's (CRL) model M-2 servomanipulator. The model M-2 is a dual-arm, bilateral force-reflecting, master/slave servomanipulator which was jointly developed by CRL and ORNL and represents the state of the art in teleoperated manipulators commercially available in the United States today. The model M-2 servomanipulator incorporates a distributed, microprocessor-based digital control system and was the first successful implementation of an entirely digitally controlled servomanipulator. The system has been in operation since FY 1983. 3 refs., 2 figs.

  12. Remote Chemical Sensing Using Quantum Cascade Lasers

    SciTech Connect (OSTI)

    Harper, Warren W.; Strasburg, Jana D.; Aker, Pam M.; Schultz, John F.

    2004-01-20

    Research done by the IR sensors team at PNNL is focused on developing advanced spectroscopic methods for detecting signatures of nuclear, chemical, biological and explosives weapons or weapons production. The sensors we develop fall into two categories: remote sensors that can be operated at distances ranging from 150 m to 10 km, and point sensors that are used for in-situ inspection and detection. FY03 has seen an explosion in FM DIAL progress with the net result being solid confirmation that FM DIAL is a technique capable of remote chemical monitoring in a wide variety of venues. For example, FM DIAL was used to detect a small plume of hydrogen sulfide, a candidate CW agent, released in the desert environment of the Hanford 200 Area site. These experiments were conducted over a range of physical conditions including outside temperatures ranging from 70 F to 105 F and turbulence conditions ranging from quiescent to chaotic. We are now rapidly developing the information needed to design prototype FM DIAL systems that are optimized for specific applications that include scenarios such as fixed position stand-off detection and mobile UAV mounted remote monitoring. Just as an example, in FY04 we will use FM DIAL to detect both in-facility and outdoor release of enriched UF6. The rapid progress in FM DIAL research made in FY03 is attributed to several advances. First, final construction of a custom-designed trailer allowed the instrument to be housed in a mobile temperature-controlled environment. This allowed the experiment to be transported to several locations so that data could be collected under a range of physical conditions. This has led to a better understanding of a variety of experimental noise sources. With this knowledge, we have been able to implement several changes in the way the FM DIAL data is collected and processed, with the net result being a drastic improvement in our confidence of analyte concentration measurement and an improvement i n the instrument detection limit. The range of chemicals detectable by FM DIAL has also been extended. Prior to FY03 only water and nitrous oxide (N2O) had been seen. Experiments on extending the tuning range of the quantum cascade laser (QCL) currently used in the experiments demonstrate that many more species are now accessible including H2S, C2F4H2, and CH4. We additionally demonstrated that FM DIAL measurements can be made using short wave infrared (SWIR) telecommunications lasers. While measurements made using these components are noisier because turbulence and particulate matter cause more interference in this spectral region, monitoring in this region enables larger species to be detected simply because these lasers have a greater tuning range. In addition, SWIR monitoring also allows for the detection of second-row hydride species such as HF and HCl, which are important nuclear and CWA proliferation signatures.

  13. Project Plan Remote Target Fabrication Refurbishment Project

    SciTech Connect (OSTI)

    Bell, Gary L; Taylor, Robin D

    2009-08-01

    In early FY2009, the DOE Office of Science - Nuclear Physics Program reinstated a program for continued production of {sup 252}Cf and other transcurium isotopes at the Radiochemical Engineering Development Center (REDC) at Oak Ridge National Laboratory (ORNL). The FY2009 major elements of the workscope are as follows: (1) Recovery and processing of seven transuranium element targets undergoing irradiation at the High Flux Isotope Reactor (HFIR) at ORNL; (2) Development of a plan to manufacture new targets for irradiation beginning in early- to mid-FY10 to supply irradiated targets for processing Campaign 75 (TRU75); and (3) Refurbishment of the target manufacturing equipment to allow new target manufacture in early FY10 The {sup 252}Cf product from processing Campaign 74 (recently processed and currently shipping to customers) is expected to supply the domestic demands for a period of approximately two years. Therefore it is essential that new targets be introduced for irradiation by the second quarter of FY10 (HFIR cycle 427) to maintain supply of {sup 252}Cf; the average irradiation period is {approx}10 HFIR cycles, requiring about 1.5 calendar years. The strategy for continued production of {sup 252}Cf depends upon repairing and refurbishing the existing pellet and target fabrication equipment for one additional target production campaign. This equipment dates from the mid-1960s to the late 1980s, and during the last target fabrication campaign in 2005- 2006, a number of component failures and operations difficulties were encountered. It is expected that following the target fabrication and acceptance testing of the targets that will supply material for processing Campaign 75 a comprehensive upgrade and replacement of the remote hot-cell equipment will be required prior to subsequent campaigns. Such a major refit could start in early FY 2011 and would take about 2 years to complete. Scope and cost estimates for the repairs described herein were developed, and authorization for the work was received in July 2009 under the Remote Target Fabrication Refurbishment Task of the Enhanced Utilization of Isotope Facilities project (Project Identification Code 2005230) funded by the American Recovery and Reinvestment Act of 2009. The goal of this project is to recover the capability to produce 4-5 curium targets for the irradiation period starting with HFIR cycle 427, currently scheduled to begin 2/17/10. Assuming success, the equipment would then be used to fabricate 6-7 additional targets to hold for the next irradiation campaign specified by the program. Specific objectives are the return to functionality of the Cubicle 3 Pellet Fabrication Line; Cubicle 2 Target Assembly equipment; and Cubicle 1 Target Inspection and Final Assembly system.

  14. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code.

  15. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  16. LNG links remote supplies and markets

    SciTech Connect (OSTI)

    Avidan, A.A.; Gardner, R.E.; Nelson, D.; Borrelli, E.N.; Rethore, T.J.

    1997-06-02

    Liquefied natural gas (LNG) has established a niche for itself by matching remote gas supplies to markets that both lacked indigenous gas reserves and felt threatened in the aftermath of the energy crises of the 1970s and 1980s. It has provided a cost-effective energy source for these markets, while also offering an environmentally friendly fuel long before that was fashionable. The introduction of natural-gas use via LNG in the early years (mostly into France and Japan) has also allowed LNG to play a major role in developing gas infrastructure. Today, natural gas, often supplied as LNG, is particularly well-suited for use in the combined cycle technology used in independent power generation projects (IPPs). Today, LNG players cannot simply focus on monetizing gas resources. Instead, they must adapt their projects to meet the needs of changing markets. The impact of these changes on the LNG industry has been felt throughout the value chain from finding and producing gas, gas treatment, liquefaction, transport as a liquid, receiving terminals and regasification, and finally, to consumption by power producers, industrial users, and households. These factors have influenced the evolution of the LNG industry and have implications for the future of LNG, particularly in the context of worldwide natural gas.

  17. Remote Systems Experience at the Oak Ridge National Laboratory...

    Office of Scientific and Technical Information (OSTI)

    a long history in the development of remote systems to ... be the first microcomputer-based implementation of dual-arm ... base of working knowledge as to what works when and ...

  18. WIPP Receives First Remote-Handled Waste Shipment From Sandia...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For immediate release WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs CARLSBAD, N.M., December 21, 2011 - The U.S. Department of Energy's (DOE) Waste Isolation...

  19. The Fundamental Limitation of Atmospheric Remote Sensing by Dissection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing by Dissection of Single-Photon State Space, and the Paradigms that Lie Beyond Illustrated with WAIL, O2 A-BandLine Spectroscopy, Etc. Davis, Anthony Los Alamos...

  20. Remote Alaskan Communities Energy Efficiency Competition Social Media Kit

    Broader source: Energy.gov [DOE]

    Alaska Stakeholders—Below you will find some pre-written Facebook post suggestions for getting the word out about the Remote Alaskan Communities Energy Efficiency Competition to communities. Please check back throughout the month for more updates.

  1. Remote System for Characterizing, Monitoring and Inspecting the Inside of

    Office of Scientific and Technical Information (OSTI)

    Contaminated Nuclear Stacks (Conference) | SciTech Connect Conference: Remote System for Characterizing, Monitoring and Inspecting the Inside of Contaminated Nuclear Stacks Citation Details In-Document Search Title: Remote System for Characterizing, Monitoring and Inspecting the Inside of Contaminated Nuclear Stacks The Stack Characterization System (SCS) is a collaborative project with the Robotics and Energetic Systems Group (RESG) at Oak Ridge National Laboratory (ORNL) and the Applied

  2. Powering Remote Northern Villages with the Midnight Sun

    Office of Environmental Management (EM)

    FY2003 Program and Project Review Meeting Golden, Colorado POWERING REMOTE POWERING REMOTE NORTHERN VILLAGES WITH NORTHERN VILLAGES WITH THE MIDNIGHT SUN THE MIDNIGHT SUN Lance Whitwell, Lance Whitwell, Tribal Energy Manager Tribal Energy Manager Marjorie John, Marjorie John, Assistant Energy Manager Assistant Energy Manager Joshua Roberts, Joshua Roberts, Energy Intern Energy Intern Myles Myles O'Kelly O'Kelly , , Independence Power & Energy Consulting Independence Power & Energy

  3. Solid state laser media driven by remote nuclear powered fluorescence

    DOE Patents [OSTI]

    Prelas, Mark A.

    1992-01-01

    An apparatus is provided for driving a solid state laser by a nuclear powered fluorescence source which is located remote from the fluorescence source. A nuclear reaction produced in a reaction chamber generates fluorescence or photons. The photons are collected from the chamber into a waveguide, such as a fiber optic waveguide. The waveguide transports the photons to the remote laser for exciting the laser.

  4. Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors

    Office of Scientific and Technical Information (OSTI)

    (Journal Article) | SciTech Connect Journal Article: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Citation Details In-Document Search Title: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Advanced designs of used nuclear fuel recycling processes and radioactive waste treatment processes are expected to include more ambitious goals for aqueous based separations including; higher separations efficiency, high-level waste minimization, and

  5. Advanced polychromator systems for remote chemical sensing (LDRD project

    Office of Scientific and Technical Information (OSTI)

    52575). (Technical Report) | SciTech Connect Advanced polychromator systems for remote chemical sensing (LDRD project 52575). Citation Details In-Document Search Title: Advanced polychromator systems for remote chemical sensing (LDRD project 52575). The objective of this LDRD project was to develop a programmable diffraction grating fabricated in SUMMiT V{trademark}. Two types of grating elements (vertical and rotational) were designed and demonstrated. The vertical grating element utilized

  6. Power plant emissions verified remotely at Four Corners sites

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power plant emissions verified remotely Power plant emissions verified remotely at Four Corners sites The study is the first to show that space-based techniques can successfully verify international regulations on fossil energy emissions. May 19, 2014 The Four Corners coal-fired power plant, near Farmington, N.M. is a major source of pollutants, with measurements confirmed by Los Alamos National Laboratory researchers. The Four Corners coal-fired power plant, near Farmington, N.M. is a major

  7. DOE Seeks Independent Evaluation of Remote-Handled Waste Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Seeks Independent Evaluation Of Remote-Handled Waste Program CARLSBAD, N.M., July 24, 2001 - An independent panel of scientific and engineering experts will convene July 30 in Carlsbad to evaluate U.S. Department of Energy (DOE) plans for managing remote-handled (RH) transuranic (TRU) waste at the Waste Isolation Pilot Plant (WIPP). DOE's Carlsbad Field Office has asked the American Society of Mechanical Engineers and the Institute for Regulatory Science to review its proposed RH-TRU waste

  8. Draft Environmental Assessment on the Remote-handled Waste Disposition

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project available for public review and comment Draft Environmental Assessment on the Remote-handled Waste Disposition Project available for public review and comment The U.S. Department of Energy invites the public to review and comment on a draft environmental assessment that the Department issued today, for a proposal to process approximately 327 cubic meters of remote-handled waste currently stored at the Idaho National Laboratory. An additional five cubic meters of waste stored at the

  9. Microsoft Word - remote handled waste comment extension.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extends public comment period on the Remote-handled Waste Disposition Project Environmental Assessment Jan. 26, 2009 Media contact: Brad Bugger, (208) 526-0833 In response to a request from the public, the U.S. Department of Energy has extended the deadline to comment on the draft environmental assessment for a proposal to process approximately 327 cubic meters of remote-handled radioactive waste currently stored at Idaho National Laboratory. The public comment period, which originally expired

  10. Visapult: A Prototype Remote and Distributed Visualization Application and

    Office of Scientific and Technical Information (OSTI)

    Framework (Conference) | SciTech Connect Conference: Visapult: A Prototype Remote and Distributed Visualization Application and Framework Citation Details In-Document Search Title: Visapult: A Prototype Remote and Distributed Visualization Application and Framework We describe an approach used for implementing a highly efficient and scalable method for direct volume rendering. Our approach uses a pipelined-parallel decomposition composed of parallel computers and commodity desktop hardware.

  11. Powering Remote Northern Villages with the Midnight Sun

    Energy Savers [EERE]

    Office of Energy Efficiency and Renewable Energy TRIBAL ENERGY PROGRAM Project Review Meeting Denver, Colorado October 2005 POWERING REMOTE POWERING REMOTE NORTHERN VILLAGES WITH NORTHERN VILLAGES WITH THE MIDNIGHT SUN THE MIDNIGHT SUN Lance Whitwell, Lance Whitwell, Tribal Energy Manager Tribal Energy Manager Myles O'Kelly, Myles O'Kelly, Independence Power & Energy Consulting Independence Power & Energy Consulting Brian Hirsch, Brian Hirsch, Earth Energy Systems Earth Energy Systems

  12. Powering Remote Northern Villages with the Midnight Sun

    Energy Savers [EERE]

    POWERING REMOTE POWERING REMOTE NORTHERN VILLAGES WITH NORTHERN VILLAGES WITH THE MIDNIGHT SUN THE MIDNIGHT SUN Lance Whitwell, Lance Whitwell, Tribal Energy Manager Tribal Energy Manager Marjorie John, Marjorie John, Assistant Energy Manager Assistant Energy Manager Myles O'Kelly, Myles O'Kelly, Independence Power & Energy Consulting Independence Power & Energy Consulting Department of Energy Office of Energy Efficiency and Renewable Energy TRIBAL ENERGY PROGRAM FY2004 Year End Project

  13. Energy storage for hybrid remote power systems

    SciTech Connect (OSTI)

    Isherwood, W., LLNL

    1998-03-01

    Energy storage can be a cost-effective component of hybrid remote power systems. Storage serves the special role of taking advantage of intermittent renewable power sources. Traditionally this role has been played by lead-acid batteries, which have high life-cycle costs and pose special disposal problems. Hydrogen or zinc-air storage technologies can reduce life-cycle costs and environmental impacts. Using projected data for advanced energy storage technologies, LLNL ran an optimization for a hypothetical Arctic community with a reasonable wind resource (average wind speed 8 m/s). These simulations showed the life-cycle annualized cost of the total energy system (electric plus space heating) might be reduced by nearly 40% simply by adding wind power to the diesel system. An additional 20 to 40% of the wind-diesel cost might be saved by adding hydrogen storage or zinc-air fuel cells to the system. Hydrogen produced by electrolysis of water using intermittent, renewable power provides inexpensive long-term energy storage. Conversion back to electricity with fuel cells can be accomplished with available technology. The advantages of a hydrogen electrolysis/fuel cell system include low life-cycle costs for long term storage, no emissions of concern, quiet operation, high reliability with low maintenance, and flexibility to use hydrogen as a direct fuel (heating, transportation). Disadvantages include high capital costs, relatively low electrical turn-around efficiency, and lack of operating experience in utility settings. Zinc-air fuel cells can lower capital and life-cycle costs compared to hydrogen, with most of the same advantages. Like hydrogen systems, zinc-air technology promises a closed system for long-term storage of energy from intermittent sources. The turn around efficiency is expected to exceed 60%, while use of waste heat can potentially increase overall energy efficiency to over 80%.

  14. Alternative Fuels Data Center: Students Power Remote-Controlled Cars With

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    Biodiesel Students Power Remote-Controlled Cars With Biodiesel to someone by E-mail Share Alternative Fuels Data Center: Students Power Remote-Controlled Cars With Biodiesel on Facebook Tweet about Alternative Fuels Data Center: Students Power Remote-Controlled Cars With Biodiesel on Twitter Bookmark Alternative Fuels Data Center: Students Power Remote-Controlled Cars With Biodiesel on Google Bookmark Alternative Fuels Data Center: Students Power Remote-Controlled Cars With Biodiesel on

  15. Remote sensing for wind power potential: a prospector's handbook

    SciTech Connect (OSTI)

    Wade, J.E.; Maule, P.A.; Bodvarsson, G.; Rosenfeld, C.L.; Woolley, S.G.; McClenahan, M.R.

    1983-02-01

    Remote sensing can aid in identifying and locating indicators of wind power potential from the terrestrial, marine, and atmospheric environments (i.e.: wind-deformed trees, white caps, and areas of thermal flux). It is not considered as a tool for determining wind power potential. A wide variety of remotely sensed evidence is described in terms of the scale at which evidence of wind power can be identified, and the appropriate remote sensors for finding such evidence. Remote sensing can be used for regional area prospecting using small-scale imagery. The information from such small-scale imagery is most often qualitative, and if it is transitory, examination of a number of images to verify presistence of the feature may be required. However, this evidence will allow rapid screening of a large area. Medium-scale imagery provides a better picture of the evidence obtained from small-scale imagery. At this level it is best to use existing imagery. Criteria relating to land use, accessibility, and proximity of candidate sites to nearby transmission lines can also be effectively evaluated from medium-scale imagery. Large-scale imagery provides the most quantitative evidence of the strength of wind. Wind-deformed trees can be identified at a large number of sites using only a few hours in locally chartered aircraft. A handheld 35mm camera can adequately document any evidence of wind. Three case studies that employ remote sensing prospecting techniques are described. Based on remotely sensed evidence, the wind power potential in three geographically and climatically diverse areas of the United States is estimated, and the estimates are compared to actual wind data in those regions. In addition, the cost of each survey is discussed. The results indicate that remote sensing for wind power potential is a quick, cost effective, and fairly reliable method for screening large areas for wind power potential.

  16. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  17. Remote Engineering progress report, January-December 1984

    SciTech Connect (OSTI)

    Phillips, D.E.

    1985-12-23

    This report summarizes progress on work performed in the Remote Engineering group at Rocky Flats from January to December 1984. Remote Engineering's goals in all 1984 projects were to help increase production capacity, reduce radiation exposure, improve operation safety, improve product quality, or alleviate material-accounting errors. To convert manual operations to automated operations, Remote Engineering provided design, fabrication, and assembly of new equipment for varied plant operations. Seventeen separate projects were handled by Remote Engineering in 1984. Four of the projects automate related operations in Building 559, the Chemical Analytical Laboratory. In Building 559, the following operations needed mechanizing: Sample Cutting, Storage and Retrieval, Pneumatic Transfer System, and Chemical Operations Robotic System. Remote Engineering has completed the design of the hot-dip zinc-galvanizing furnace, and Maintenance will complete the assembly and installation. Three systems are in production use but are still undergoing development: the Unimate robot, the Laser Marker, and the Ingot Gripper. The Plutonium Oxide/Skull-Burn Furnace is awaiting installation. The other projects are at various states of design and development. These reports reflect the status of the projects as they existed December 31, 1984, except the Future Work sections which were updated August 27, 1985.

  18. Remote-Handled Low Level Waste Disposal Project Alternatives Analysis

    SciTech Connect (OSTI)

    David Duncan

    2010-10-01

    This report identifies, evaluates, and compares alternatives for meeting the U.S. Department of Energy’s mission need for management of remote-handled low-level waste generated by the Idaho National Laboratory and its tenants. Each alternative identified in the Mission Need Statement for the Remote-Handled Low-Level Waste Treatment Project is described and evaluated for capability to fulfill the mission need. Alternatives that could meet the mission need are further evaluated and compared using criteria of cost, risk, complexity, stakeholder values, and regulatory compliance. The alternative for disposal of remote-handled low-level waste that has the highest confidence of meeting the mission need and represents best value to the government is to build a new disposal facility at the Idaho National Laboratory Site.

  19. Remote Sealing of Canisters for Hot Isostatic Pressing

    SciTech Connect (OSTI)

    Wahlquist, Dennis; Bateman, Ken; Malewitz, Tim

    2015-03-01

    Battelle Energy Alliance, LLC, has successfully tested a remote welding process to seal radioactive waste containers prior to hot isostatic pressing (HIP). Since the 1990s, a variety of radioactive and hazardous waste forms have been remotely treated using HIP during trials within Idaho National Laboratory (INL) hot cells. For HIP treatment at INL, waste was loaded into a stainless-steel or aluminum canister, which was evacuated, seal welded, and placed in a HIP furnace. HIP simultaneously heats and pressurizes the waste, reducing its volume and increasing its stability, thus lowering the cost and risk associated with disposal. Weld integrity must be ensured in order to prevent the spread of contamination during HIP. This paper presents a process for sealing HIP canisters remotely using modified, commercially available equipment. This process includes evacuation, heating, welding, and weld inspection. The process and equipment have proven to reliably seal canisters in continued HIP trials.

  20. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  1. JTAG-based remote configuration of FPGAs over optical fibers

    SciTech Connect (OSTI)

    Deng, B.; Xu, H.; Liu, C.; Chen, J.; Chen, K.; Gong, D.; Guo, D.; Hou, S.; D. Huang; Liu, T.; Teng, P. -K.; Xiang, A. C.; You, Y.; Ye, J.; Li, X.

    2015-01-28

    In this study, a remote FPGA-configuration method based on JTAG extension over optical fibers is presented. The method takes advantage of commercial components and ready-to-use software such as iMPACT and does not require any hardware or software development. The method combines the advantages of the slow remote JTAG configuration and the fast local flash memory configuration. The method has been verified successfully and used in the Demonstrator of Liquid-Argon Trigger Digitization Board (LTDB) for the ATLAS liquid argon calorimeter Phase-I trigger upgrade. All components on the FPGA side are verified to meet the radiation tolerance requirements.

  2. Sustainable Energy in Remote Indonesian Grids. Accelerating Project Development

    SciTech Connect (OSTI)

    Hirsch, Brian; Burman, Kari; Davidson, Carolyn; Elchinger, Michael; Hardison, R.; Karsiwulan, D.; Castermans, B.

    2015-06-30

    Sustainable Energy for Remote Indonesian Grids (SERIG) is a U.S. Department of Energy (DOE) funded initiative to support Indonesia’s efforts to develop clean energy and increase access to electricity in remote locations throughout the country. With DOE support, the SERIG implementation team consists of the National Renewable Energy Laboratory (NREL) and Winrock International’s Jakarta, Indonesia office. Through technical assistance that includes techno-economic feasibility evaluation for selected projects, government-to-government coordination, infrastructure assessment, stakeholder outreach, and policy analysis, SERIG seeks to provide opportunities for individual project development and a collective framework for national replication office.

  3. ARM - Field Campaign - Remote Cloud Sensing (RCS) Field Evaluation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govCampaignsRemote Cloud Sensing (RCS) Field Evaluation ARM Data Discovery Browse Data Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Remote Cloud Sensing (RCS) Field Evaluation 1994.04.01 - 1994.05.31 Lead Scientist : Robert Kropfli Data Availability CPRS Cloud Data (from the University of Massachusetts Cloud Profiling Radar System (CPRS)) For data sets, see below. Abstract The primary purpose of the field evaluation and calibration

  4. ARM - Field Campaign - Remote Cloud Sensing (RCS) Field Evaluation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govCampaignsRemote Cloud Sensing (RCS) Field Evaluation ARM Data Discovery Browse Data Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Remote Cloud Sensing (RCS) Field Evaluation 1995.04.01 - 1995.05.31 Lead Scientist : Robert Kropfli Data Availability CPRS Cloud Data (from the University of Massachusetts Cloud Profiling Radar System (CPRS)) For data sets, see below. Abstract The primary purpose of the field evaluation and calibration

  5. ARM - Evaluation Product - KAZR Active Remotely-Sensed Cloud Locations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (KAZRARSCL) Active Remotely-Sensed Cloud Locations (KAZRARSCL) ARM Data Discovery Browse Data Documentation Use the Data File Inventory tool to view data availability at the file level. Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Evaluation Product : KAZR Active Remotely-Sensed Cloud Locations (KAZRARSCL) [ ARM research - evaluation data product ] The KAZR-ARSCL VAP provides cloud boundaries and best-estimate time-height fields of radar

  6. ARM - Field Campaign - Scintillometry and Soil Moisture Remote Sensing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govCampaignsScintillometry and Soil Moisture Remote Sensing Related Campaigns Enhanced Soundings for Local Coupling Studies 2015.06.15, Ferguson, SGP Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Scintillometry and Soil Moisture Remote Sensing 2015.06.01 - 2015.10.31 Lead Scientist : Jan Hendrickx Abstract The technical goal was to support the campaign "Enhanced soundings for local coupling studies" of Dr. Craig Ferguson by

  7. Research Call Issued for Design Support Tool for Remote Microgrids

    Broader source: Energy.gov [DOE]

    DOE’s National Energy Technology Laboratory, on behalf of the Office of Electricity Delivery and Energy Reliability, has issued a research call for proposals for a “Design Support Tool for Remote Off-grid Microgrids” which facilitates the design of microgrids that encompass mixes of generation assets and load profiles typical of remote communities. In addition, the tool must be capable of conducting such analyses as may be necessary to validate that corresponding design parameters, planned operational performance, and expected benefits of microgrids can be achieved effectively and economically.

  8. Synthesis of the unmanned aerial vehicle remote control augmentation system

    SciTech Connect (OSTI)

    Tomczyk, Andrzej

    2014-12-10

    Medium size Unmanned Aerial Vehicle (UAV) usually flies as an autonomous aircraft including automatic take-off and landing phases. However in the case of the on-board control system failure, the remote steering is using as an emergency procedure. In this reason, remote manual control of unmanned aerial vehicle is used more often during take-of and landing phases. Depends on UAV take-off mass and speed (total energy) the potential crash can be very danger for airplane and environment. So, handling qualities of UAV is important from pilot-operator point of view. In many cases the dynamic properties of remote controlling UAV are not suitable for obtaining the desired properties of the handling qualities. In this case the control augmentation system (CAS) should be applied. Because the potential failure of the on-board control system, the better solution is that the CAS algorithms are placed on the ground station computers. The method of UAV handling qualities shaping in the case of basic control system failure is presented in this paper. The main idea of this method is that UAV reaction on the operator steering signals should be similar - almost the same - as reaction of the 'ideal' remote control aircraft. The model following method was used for controller parameters calculations. The numerical example concerns the medium size MP-02A UAV applied as an aerial observer system.

  9. Factors affecting the remotely sensed response of coniferous forest plantations

    SciTech Connect (OSTI)

    Danson, F.M. ); Curran, P.J. )

    1993-01-01

    Remote sensing of forest biophysical properties has concentrated upon forest sites with a wide range of green vegetation amount and thereby leaf area index and canopy cover. However, coniferous forest plantations, an important forest type in Europe, are managed to maintain a large amount of green vegetation with little spatial variation. Therefore, the strength of the remotely sensed signal will, it is hypothesized, be determined more by the structure of this forest than by its cover. Airborne Thematic Mapper (ATM) and SPOT-1 HRV data were used to determine the effects of this structural variation on the remotely sensed response of a coniferous forest plantation in the United Kingdom. Red and near infrared radiance were strongly and negatively correlated with a range of structural properties and with the age of the stands but weakly correlated with canopy cover. A composite variable, related to the volume of the canopy, accounted for over 75% of the variation in near infrared radiance. A simple model that related forest structural variables to the remotely sensed response was used to understand and explain this response from a coniferous forest plantation.

  10. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  11. Structural acceptance criteria Remote Handling Building Tritium Extraction Facility

    SciTech Connect (OSTI)

    Mertz, G.

    1999-12-16

    This structural acceptance criteria contains the requirements for the structural analysis and design of the Remote Handling Building (RHB) in the Tritium Extraction Facility (TEF). The purpose of this acceptance criteria is to identify the specific criteria and methods that will ensure a structurally robust building that will safely perform its intended function and comply with the applicable Department of Energy (DOE) structural requirements.

  12. Researcher, Los Alamos National Laboratory - Space and Remote Sensing Group

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration and Remote Sensing Group | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo

  13. OE Announces Awardees Under the Remote Off-Grid Microgrid Design...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call September ...

  14. Deadlock during first touch of upc_alloc'd remote memory when...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier Deadlock during first touch of upcalloc'd remote memory when target is in...

  15. T-685: Cisco Warranty CD May Load Malware From a Remote Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Warranty CD May Load Malware From a Remote Site T-685: Cisco Warranty CD May Load Malware From a Remote Site August 5, 2011 - 3:26pm Addthis PROBLEM: A vulnerability was...

  16. 0.4 kV remote control (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    .4 kV remote control (Smart Grid Project) Jump to: navigation, search Project Name 0.4 kV remote control Country Denmark Coordinates 56.26392, 9.501785 Loading map......

  17. U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data.

  18. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  19. DEVELOPMENT OF REMOTE HANFORD CONNECTOR GASKET REPLACEMENT TOOLING FOR DWPF

    SciTech Connect (OSTI)

    Krementz, D.; Coughlin, Jeffrey

    2009-05-05

    The Defense Waste Processing Facility (DWPF) requested the Savannah River National Laboratory (SRNL) to develop tooling and equipment to remotely replace gaskets in mechanical Hanford connectors to reduce personnel radiation exposure as compared to the current hands-on method. It is also expected that radiation levels will continually increase with future waste streams. The equipment is operated in the Remote Equipment Decontamination Cell (REDC), which is equipped with compressed air, two master-slave manipulators (MSM's) and an electro-mechanical manipulator (EMM) arm for operation of the remote tools. The REDC does not provide access to electrical power, so the equipment must be manually or pneumatically operated. The MSM's have a load limit at full extension of ten pounds, which limited the weight of the installation tool. In order to remotely replace Hanford connector gaskets several operations must be performed remotely, these include: removal of the spent gasket and retaining ring (retaining ring is also called snap ring), loading the new snap ring and gasket into the installation tool and installation of the new gasket into the Hanford connector. SRNL developed and tested tools that successfully perform all of the necessary tasks. Removal of snap rings from horizontal and vertical connectors is performed by separate air actuated retaining ring removal tools and is manipulated in the cell by the MSM. In order install a new gasket, the snap ring loader is used to load a new snap ring into a groove in the gasket installation tool. A new gasket is placed on the installation tool and retained by custom springs. An MSM lifts the installation tool and presses the mounted gasket against the connector block. Once the installation tool is in position, the gasket and snap ring are installed onto the connector by pneumatic actuation. All of the tools are located on a custom work table with a pneumatic valve station that directs compressed air to the desired tool and vents the tools as needed. Extensive testing of tooling operation was performed in the DWPF manipulator repair shop. This testing allowed the operators to gain confidence before the equipment was exposed to radioactive contamination. The testing also led to multiple design improvements. On July 17 and 29, 2008 the Remote Gasket Replacement Tooling was successfully demonstrated in the REDC at the DWPF of The Savannah River Site.

  20. Geotechnical applications of remote sensing and remote data transmission; Proceedings of the Symposium, Cocoa Beach, FL, Jan. 31-Feb. 1, 1986

    SciTech Connect (OSTI)

    Johnson, A.I.; Pettersson, C.B.

    1988-01-01

    Papers and discussions concerning the geotechnical applications of remote sensing and remote data transmission, sources of remotely sensed data, and glossaries of remote sensing and remote data transmission terms, acronyms, and abbreviations are presented. Aspects of remote sensing use covered include the significance of lineaments and their effects on ground-water systems, waste-site use and geotechnical characterization, the estimation of reservoir submerging losses using CIR aerial photographs, and satellite-based investigation of the significance of surficial deposits for surface mining operations. Other topics presented include the location of potential ground subsidence and collapse features in soluble carbonate rock, optical Fourier analysis of surface features of interest in geotechnical engineering, geotechnical applications of U.S. Government remote sensing programs, updating the data base for a Geographic Information System, the joint NASA/Geosat Test Case Project, the selection of remote data telemetry methods for geotechnical applications, the standardization of remote sensing data collection and transmission, and a comparison of airborne Goodyear electronic mapping system/SAR with satelliteborne Seasat/SAR radar imagery.

  1. The Fermilab CMTF cryogenic distribution remote control system

    SciTech Connect (OSTI)

    Pei, L.; Theilacker, J.; Klebaner, A.; Martinez, A.; Bossert, R.

    2014-01-29

    The Cryomodule Test Facility (CMTF) is able to provide the necessary test bed for measuring the performance of Superconducting Radio Frequency (SRF) cavities in a cryomodule (CM). The CMTF have seven 300 KW screw compressors, two liquid helium refrigerators, and two Cryomodule Test Stands (CMTS). CMTS1 is designed for 1.3 GHz cryomodule operating in a pulsed mode (PM) and CMTS2 is for cryomodule operating in Half-Wave (HW) and Continuous Wave (CW) mode. Based on the design requirement, each subsystem has to be far away from each other and be placed in distant locations. Therefore choosing Siemens Process Control System 7-400, DL205 PLC, Synoptic and Fermilab ACNET are the ideal choices for CMTF cryogenic distribution real-time remote control system. This paper presents a method which has been successfully used by many Fermilab distribution cryogenic real-time remote control systems.

  2. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W.

    1992-07-01

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  3. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W. )

    1993-01-15

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  4. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J

    2012-09-18

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  5. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J.

    2007-11-27

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  6. Remote System Technologies for Deactivating Hanford Hot Cells

    SciTech Connect (OSTI)

    Berlin, G.; Walton, T.

    2003-02-25

    Remote system technologies are being deployed by Fluor Hanford to help accelerate the deactivation of highly-radioactive hot cell facilities. These technologies offer improved methods for accessing difficult-to-reach spaces and performing tasks such as visual inspection, radiological characterization, decontamination, waste handling, and size reduction. This paper is focused on the application of remote systems in support of deactivation work being performed in several legacy facilities at Hanford (i.e., the 324 and 327 Buildings). These facilities were previously used for fuel fabrication, materials examination, and the development of waste treatment processes. The technologies described in this paper represent significant improvements to Hanford's baseline methods, and may offer benefits to other U.S. Department of Energy (DOE) sites and commercial operations.

  7. PCDAS Version 2. 2: Remote network control and data acquisition

    SciTech Connect (OSTI)

    Fishbaugher, M.J.

    1987-09-01

    This manual is intended for both technical and non-technical people who want to use the PCDAS remote network control and data acquisition software. If you are unfamiliar with remote data collection hardware systems designed at Pacific Northwest Laboratory (PNL), this introduction should answer your basic questions. Even if you have some experience with the PNL-designed Field Data Acquisition Systems (FDAS), it would be wise to review this material before attempting to set up a network. This manual was written based on the assumption that you have a rudimentary understanding of personal computer (PC) operations using Disk Operating System (DOS) version 2.0 or greater (IBM 1984). You should know how to create subdirectories and get around the subdirectory tree.

  8. Remote sensing of soil radionuclide fluxes in a tropical ecosystem

    SciTech Connect (OSTI)

    Clegg, B.; Koranda, J.; Robinson, W.; Holladay, G.

    1980-11-06

    We are using a transponding geostationary satellite to collect surface environmental data to describe the fate of soil-borne radionuclides. The remote, former atomic testing grounds at the Eniwetok and Bikini Atolls present a difficult environment in which to collect continuous field data. Our land-based, solar-powered microprocessor and environmental data systems remotely acquire measurements of net and total solar radiation, rain, humidity, temperature, and soil-water potentials. For the past year, our water flux model predicts wet season plant transpiration rates nearly equal to the 6 to 7 mm/d evaporation pan rate, which decreases to 2 to 3 mm/d for the dry season. Radioisotopic analysis confirms the microclimate-estimated 1:3 to 1:20 soil to plant /sup 137/Cs dry matter concentration ratio. This ratio exacerbates the dose to man from intake of food plants. Nephelometer measurements of airborne particulates presently indicate a minimum respiratory radiological dose.

  9. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  10. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  11. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    DOE Patents [OSTI]

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  12. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  13. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  14. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  15. Televised remote control system of a continuous mining machine

    SciTech Connect (OSTI)

    Lansberry, J.B.

    1981-08-04

    A method of recovering particulate material from a seam of such material within the earth bounded above and below by different material which comprises the steps of positioning in mining relation to the seam a continuous mining machine having a power driven mechanism thereon for moving the machine through successive seam material cutting cycles which include an advancing movement along a mined entry within the seam in a direction toward the working face of the seam; illuminating portions of the space surrounding the continuous mining machine including portions of the working face disposed forwardly thereof and adjacent portions of the roof, floor and side walls of the mined entry rearwardly of the working face; establishing electromagnetic signals indicative of the appearance of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; transmitting the established electromagnetic signals to a remote control station; converting at the remote control station the transmitted electromagnetic signals to a continuous picture of the appearance of at least a selected portion of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; and controlling from the remote control station the cutting cycle of the continuous mining machine so that the material cut during a cycle is cut from the seam up to the different material defining the roof and down to the different material defining the floor based upon visually distinguishing between the material of the seam and the different material which forms the roof and floor by viewing the continuous picture provided at the remote control station and apparatus for carrying out the method.

  16. Photovoltaic (PV) Module Level Remote Safety Disconnect - Energy Innovation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Portal Find More Like This Return to Search Photovoltaic (PV) Module Level Remote Safety Disconnect National Renewable Energy Laboratory Contact NREL About This Technology Figure 1: System configuration of emergency module-level disconnect using module-level &lsquo;Isolation Detection Units&rsquo; (IDU).<br /> Figure 1: System configuration of emergency module-level disconnect using module-level 'Isolation Detection Units' (IDU). Technology Marketing Summary The ability to

  17. Remote Visualization on Cooley Using VNC | Argonne Leadership Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facility Changes from Tukey to Cooley Compiling and Linking Using Cobalt on Cooley Visit on Cooley Paraview on Cooley ParaView Tutorial VNC on Cooley Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Remote Visualization on Cooley Using VNC When running graphics applications on Cooley, it is best to use the client/server mode, when available, where a lightweight client can run on

  18. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 14 | Jefferson Lab JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and National Aeronautics and Space Administration are using an unmanned aircraft system to gain information never before gathered about tropical storm systems and how this data is helping them better understand these powerful storms. Dr. Joseph J. Cione, with the NOAA Hurricane Research

  19. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  20. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  1. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  2. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  3. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  4. Contact-Handled and Remote-Handled Transuranic Waste Packaging

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-08-09

    Provides specific instructions for packaging and/or repackaging contact-handled transuranic (CH-TRU) and remote-handled transuranic (RH-TRU) waste in a manner consistent with DOE O 435.1, Radioactive Waste Management, DOE M 435.1-1 Chg 1, Radioactive Waste Management Manual, CH-TRU and RH-TRU waste transportation requirements, and Waste Isolation Pilot Plant (WIPP) programmatic requirements. Does not cancel/supersede other directives.

  5. Amplification of Xenon NMR and MRI by remote detection

    SciTech Connect (OSTI)

    Moule, Adam J.; Spence, Megan M.; Han, Song-I.; Seeley, JulietteA.; Pierce, Kimberly L.; Saxena, Sunil; Pines, Alexander

    2003-03-31

    A novel technique is proposed in which a nuclear magneticresonance (NMR) spectrum or magnetic resonance image (MRI) is encoded andstored as spin polarization and is then moved to a different physicallocation to be detected. Remote detection allows the separateoptimization of the encoding and detection steps, permitting theindependent choice of experimental conditions, and excitation anddetection methodologies. In the first experimental demonstration of thistechnique, we show that NMR signal can be amplified by taking diluted129Xe from a porous sample placed inside a large encoding coil, andconcentrating it into a smaller detection coil. In general, the study ofNMR active molecules at low concentration that have low physical fillingfactor is facilitated by remote detection. In the second experiment, MRIinformation encoded in a very low field magnet (4-7mT) is transferred toa high field magnet (4.2 T) in order to be detected under optimizedconditions. Furthermore, remote detection allows the utilization ofultra-sensitive optical or superconducting detection techniques, whichbroadens the horizon of NMR experimentation.

  6. Perm Web: remote parallel and distributed volume visualization

    SciTech Connect (OSTI)

    Wittenbrink, C.M.; Kim, K.; Story, J.; Pang, A.; Hollerbach, K.; Max, N.

    1997-01-01

    In this paper we present a system for visualizing volume data from remote supercomputers (PermWeb). We have developed both parallel volume rendering algorithms, and the World Wide Web software for accessing the data at the remote sites. The implementation uses Hypertext Markup Language (HTML), Java, and Common Gateway Interface (CGI) scripts to connect World Wide Web (WWW) servers/clients to our volume renderers. The front ends are interactive Java classes for specification of view, shading, and classification inputs. We present performance results, and implementation details for connections to our computing resources at the University of California Santa Cruz including a MasPar MP-2, SGI Reality Engine-RE2, and SGI Challenge machines. We apply the system to the task of visualizing trabecular bone from finite element simulations. Fast volume rendering on remote compute servers through a web interface allows us to increase the accessibility of the results to more users. User interface issues, overviews of parallel algorithm developments, and overall system interfaces and protocols are presented. Access is available through Uniform Resource Locator (URL) http://www.cse.ucsc.edu/research/slvg/. 26 refs., 7 figs.

  7. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  8. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  9. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

  10. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  11. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  12. Remote power systems with advanced storage technologies for Alaskan villages

    SciTech Connect (OSTI)

    Isherwood, W.; Smith, R.; Aceves, S.; Berry, G.; Clark, W.; Johnson, R.; Das, D.; Goering, D.; Seifert, R.

    1997-12-01

    Remote Alaskan communities pay economic and environmental penalties for electricity, because they must import diesel as their primary fuel for electric power production, paying heavy transportation costs and potentially causing environmental damage with empty drums, leakage, and spills. For these reasons, remote villages offer a viable niche market where sustainable energy systems based on renewable resources and advanced energy storage technologies can compete favorably on purely economic grounds, while providing environmental benefits. These villages can also serve as a robust proving ground for systematic analysis, study, improvement, and optimization of sustainable energy systems with advanced technologies. This paper presents an analytical optimization of a remote power system for a hypothetical Alaskan village. The analysis considers the potential of generating renewable energy (e.g., wind and solar), along with the possibility of using energy storage to take full advantage of the intermittent renewable sources available to these villages. Storage in the form of either compressed hydrogen or zinc pellets can then provide electricity from hydrogen or zinc-air fuel cells when renewable sources are unavailable.The analytical results show a great potential to reduce fossil fuel consumption and costs basing renewable energy combined with advanced energy storage devices. The best solution for our hypothetical village appears to be a hybrid energy system, which can reduce consumption of diesel fuel by over 50% with annualized cost savings by over 30% by adding wind turbines to the existing diesel generators. When energy storage devices are added, diesel fuel consumption and costs can be reduced substantially more. With optimized energy storage, use of the diesel generatorss can be reduced to almost zero, with the existing equipment only maintained for added reliability. However about one quarter of the original diesel consumption is still used for heating purposes. (We use the term diesel to encompass the fuel, often called heating or fuel oil, of similar or identical properties.)

  13. Remote-site power generation opportunities for Alaska

    SciTech Connect (OSTI)

    Jones, M.L.

    1997-03-01

    The Energy and Environmental Research Center (EERC) has been working with the Federal Energy Technology Center in Morgantown, West Virginia, to assess options for small, low-cost, environmental acceptable power generation for application in remote areas of Alaska. The goal of this activity was to reduce the use of fuel in Alaskan villages by developing small, low-cost power generation applications. Because of the abundance of high-quality coal throughout Alaska, emphasis was placed on clean coal applications, but other energy sources, including geothermal, wind, hydro, and coalbed methane, were also considered. The use of indigenous energy sources would provide cheaper cleaner power, reduce the need for PCE (Power Cost Equalization program) subsidies, increase self-sufficiency, and retain hard currency in the state while at the same time creating jobs in the region. The introduction of economical, small power generation systems into Alaska by US equipment suppliers and technology developers aided by the EERC would create the opportunities for these companies to learn how to engineer, package, transport, finance, and operate small systems in remote locations. All of this experience would put the US developers and equipment supply companies in an excellent position to export similar types of small power systems to rural areas or developing countries. Thus activities in this task that relate to determining the generic suitability of these technologies for other countries can increase US competitiveness and help US companies sell these technologies in foreign countries, increasing the number of US jobs. The bulk of this report is contained in the two appendices: Small alternative power workshop, topical report and Global market assessment of coalbed methane, fluidized-bed combustion, and coal-fired diesel technologies in remote applications.

  14. Frequency Modulation Spectroscopy Modeling for Remote Chemical Detection

    SciTech Connect (OSTI)

    Sheen, David M.

    2000-09-30

    Frequency modulation (FM) spectroscopy techniques show promise for active infrared remote chemical sensing. FM spectroscopy techniques have reduced sensitivity to optical and electronic noise, and are relatively immune to the effects of various electronic and mechanical drifts. FM systems are responsive to sharp spectral features and can therefore reduce the effects of spectral clutter due to interfering chemicals in the plume or in the atmosphere. The relatively high modulation frequencies used for FM also reduces the effects of albedo (reflectance) and plume variations. Conventional differential absorption lidar (DIAL) systems are performance limited by the noise induced by speckle. Analysis presented in this report shows that FM based sensors may reduce the effects of speckle by one to two orders of magnitude. This can result in reduced dwell times and faster area searches, as well as reducing various forms of spatial clutter. FM systems will require a laser system that is continuously tunable at relatively high frequencies (0.1 to 20 MHz). One promising candidate is the quantum-cascade (QC) laser [1, 2]. The QC laser is potentially capable of power levels on the order of 1 Watt and frequency tuning on the order of 3 - 6 GHz, which is the performance level required for FM spectroscopy based remote sensing. In this report we describe a high-level numerical model for an FM spectroscopy based remote sensing system, and application to two unmanned airborne vehicle (UAV) scenarios. A Predator scenario operating at a slant range of 6.5 km with a 10 cm diameter telescope, and a Global Hawk scenario operating at a range of 30 km with a 20 cm diameter telescope, has been assumed to allow estimation of the performance of potential FM systems.

  15. An Assessment of Remote Visual Testing System Capabilities for the Detection of Service Induced Cracking

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cumblidge, Stephen E.; Doctor, Steven R.

    2005-09-01

    Remote visual testing is typically employed to ascertain the condition of materials in components that are inaccessible for direct examination. In the power and petrochemical industries, remote visual testing is used to assess whether service-related degradation is being manifested that, if left unchecked, may eventually impair the structural reliability of a component. Several codes and standards require that visual examinations be periodically conducted. Many of these inspections must be performed remotely due to harsh environments or design geometries of the subject components. This paper describes the attributes and limitations of remote visual testing, performance demonstration standards for camera systems, typical dimensions for service-induced cracking phenomena, and an assessment of the reliability of remote video camera systems at finding cracks. Because many forms of service-induced cracks have very small crack opening dimensions, the reliability of remote visual testing may not be adequate to ensure component integrity, given the capabilities of current camera systems and application practices.

  16. Advanced spent fuel conditioning process (ACP) progress with respect to remote operation and maintenance

    SciTech Connect (OSTI)

    Lee, Hyo Jik; Lee, Jong Kwang; Park, Byung Suk; Yoon, Ji Sup

    2007-07-01

    Korea Atomic Energy Research Institute (KAERI) has been developing an Advanced Spent Fuel Conditioning Process (ACP) to reduce the volume of spent fuel, and the construction of the ACP facility (ACPF) for a demonstration of its technical feasibility has been completed. In 2006 two inactive demonstrations were performed with simulated fuels in the ACPF. Accompanied by process equipment performance tests, its remote operability and maintainability were also tested during that time. Procedures for remote operation tasks are well addressed in this study and evaluated thoroughly. Also, remote maintenance and repair tasks are addressed regarding some important modules with a high priority order. The above remote handling test's results provided a lot of information such as items to be revised to improve the efficiency of the remote handling tasks. This paper deals with the current status of ACP and the progress of remote handling of ACPF. (authors)

  17. SMALL SCALE FUEL CELL AND REFORMER SYSTEMS FOR REMOTE POWER

    SciTech Connect (OSTI)

    Dennis Witmer

    2003-12-01

    New developments in fuel cell technologies offer the promise of clean, reliable affordable power, resulting in reduced environmental impacts and reduced dependence on foreign oil. These developments are of particular interest to the people of Alaska, where many residents live in remote villages, with no roads or electrical grids and a very high cost of energy, where small residential power systems could replace diesel generators. Fuel cells require hydrogen for efficient electrical production, however. Hydrogen purchased through conventional compressed gas suppliers is very expensive and not a viable option for use in remote villages, so hydrogen production is a critical piece of making fuel cells work in these areas. While some have proposed generating hydrogen from renewable resources such as wind, this does not appear to be an economically viable alternative at this time. Hydrogen can also be produced from hydrocarbon feed stocks, in a process known as reforming. This program is interested in testing and evaluating currently available reformers using transportable fuels: methanol, propane, gasoline, and diesel fuels. Of these, diesel fuels are of most interest, since the existing energy infrastructure of rural Alaska is based primarily on diesel fuels, but this is also the most difficult fuel to reform, due to the propensity for coke formation, due to both the high vaporization temperature and to the high sulfur content in these fuels. There are several competing fuel cell technologies being developed in industry today. Prior work at UAF focused on the use of PEM fuel cells and diesel reformers, with significant barriers identified to their use for power in remote areas, including stack lifetime, system efficiency, and cost. Solid Oxide Fuel Cells have demonstrated better stack lifetime and efficiency in demonstrations elsewhere (though cost still remains an issue), and procuring a system for testing was pursued. The primary function of UAF in the fuel cell industry is in the role of third party independent testing. In order for tests to be conducted, hardware must be purchased and delivered. The fuel cell industry is still in a pre-commercial state, however. Commercial products are defined as having a fixed set of specifications, fixed price, fixed delivery date, and a warrantee. Negotiations with fuel cell companies over these issues are often complex, and the results of these discussions often reveal much about the state of development of the technology. This work includes some of the results of these procurement experiments. Fuel cells may one day replace heat engines as the source of electrical power in remote areas. However, the results of this program to date indicate that currently available hardware is not developed sufficiently for these environments, and that significant time and resources will need to be committed for this to occur.

  18. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  19. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  20. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  1. Continuous remote unattended monitoring for safeguards data collection systems

    SciTech Connect (OSTI)

    Klosterbuer, S.F.; Halbig, J.K.; Harker, W.C.; Menlove, H.O.; Painter, J.A.; Stewart, J.E.

    1994-02-01

    To meet increased inspection requirements, unattended and remote monitoring systems have been developed and installed in several large facilities to perform safeguards functions. These unattended monitoring systems are based on instruments originally developed for traditional safeguards and the domestic nuclear industry to nondestructively assay nuclear materials. Through specialized measurement procedures, these instruments have been adapted to be unattended monitors. This paper defines the parts of these unattended monitoring systems, describes the systems that have been installed in the field and their status, and discusses future trends for unattended systems.

  2. Remote Systems Experience at the Oak Ridge National Laboratory--A Summary

    Office of Scientific and Technical Information (OSTI)

    of Lessons Learned (Conference) | SciTech Connect Conference: Remote Systems Experience at the Oak Ridge National Laboratory--A Summary of Lessons Learned Citation Details In-Document Search Title: Remote Systems Experience at the Oak Ridge National Laboratory--A Summary of Lessons Learned Oak Ridge National Laboratory (ORNL) has a long history in the development of remote systems to support the nuclear environment. ORNL, working in conjunction with Central Research Laboratories, created

  3. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  4. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  5. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  6. Antitrust implications of utility participation in the market for remote photovoltaic systems

    SciTech Connect (OSTI)

    Starrs, T.J.

    1994-12-31

    Remote photovoltaic systems are an important niche market in the development of a viable photovoltaics industry. Electric utilities in the US have started offering remote photovoltaic service. Utilities have the potential to use their monopoly power in regulated markets to unfair competitive advantage in competitive markets. Therefore, utility participation in remote photovoltaic markets raises potentially significant issues of antitrust law and policy. This paper describes some of the legal and factual criteria that US courts and regulatory agencies are likely to use in assessing the antitrust implications of utility participation in the market for remote photovoltaic systems.

  7. T-598: Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

    Broader source: Energy.gov [DOE]

    When using HTTP pipelining, the system may return information from a different request to a remote user. The vulnerability resides in the HTTP BIO connector.

  8. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  9. MHK ISDB/Instruments/HOBO RX3000 Remote Monitoring System | Open...

    Open Energy Info (EERE)

    Pro processing software recommended. Weatherproof enclosure ( NEMA 4x), powered by ONSET solar panel, AC adapter, or DC power supply. Ethernet, WiFi, and Cellular remote...

  10. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  11. Deterministic generation of remote entanglement with active quantum feedback

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less

  12. Deterministic generation of remote entanglement with active quantum feedback

    SciTech Connect (OSTI)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can be modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.

  13. Cooling tower and plume modeling for satellite remote sensing applications

    SciTech Connect (OSTI)

    Powers, B.J.

    1995-05-01

    It is often useful in nonproliferation studies to be able to remotely estimate the power generated by a power plant. Such information is indirectly available through an examination of the power dissipated by the plant. Power dissipation is generally accomplished either by transferring the excess heat generated into the atmosphere or into bodies of water. It is the former method with which we are exclusively concerned in this report. We discuss in this report the difficulties associated with such a task. In particular, we primarily address the remote detection of the temperature associated with the condensed water plume emitted from the cooling tower. We find that the effective emissivity of the plume is of fundamental importance for this task. Having examined the dependence of the plume emissivity in several IR bands and with varying liquid water content and droplet size distributions, we conclude that the plume emissivity, and consequently the plume brightness temperature, is dependent upon not only the liquid water content and band, but also upon the droplet size distribution. Finally, we discuss models dependent upon a detailed point-by-point description of the hydrodynamics and thermodynamics of the plume dynamics and those based upon spatially integrated models. We describe in detail a new integral model, the LANL Plume Model, which accounts for the evolution of the droplet size distribution. Some typical results obtained from this model are discussed.

  14. Increasing the effectiveness of reachback and remote command and control

    SciTech Connect (OSTI)

    McGee, David R.

    2002-12-02

    Commanders and their staff, when geographically dispersed, continue to choose what they find to be the most effective remote collaboration tools: email and radio messages. Even command and control systems that provide a unified view of the battlefield among remote collaborators are often supplanted by more traditional tools, such as a large paper map (McGee, Cohen & Wu, 2000). Indeed, today's computer interfaces often impose too high a barrier for the capture and delivery of situational assessment (McGee, Cohen, Wesson & Horman, 2002). To compensate, commanders traditionally meet face-to-face at least once daily to debrief each other on the outcome of the day's fight and to coordinate a strategy for the next day's engagement. Each of these meetings presents a risk to commanders, in addition to lost time during travel and various other concerns. Ongoing activity at higher echelons may consist of this activity continuously. At lower echelons, coordination is typically mediated by a radio or other messaging platform. Common to each of these scenarios, the coordination and collaboration is mediated by physical tools, e.g., an up-to-date common operational picture. Much of the promise of collaboration technology, from video-conferencing to realtime collaboration tools, is meant to alleviate the need for face-to-face meetings and improve moment-to-moment coordination. However, these tools fall woefully short of meeting the needs of commanders in the battlefield.

  15. Reliability review of the remote tool delivery system locomotor

    SciTech Connect (OSTI)

    Chesser, J.B.

    1999-04-01

    The locomotor being built by RedZone Robotics is designed to serve as a remote tool delivery (RID) system for waste retrieval, tank cleaning, viewing, and inspection inside the high-level waste tanks 8D-1 and 8D-2 at West Valley Nuclear Services (WVNS). The RTD systm is to be deployed through a tank riser. The locomotor portion of the RTD system is designed to be inserted into the tank and is to be capable of moving around the tank by supporting itself and moving on the tank internal structural columns. The locomotor will serve as a mounting platform for a dexterous manipulator arm. The complete RTD system consists of the locomotor, dexterous manipulator arm, cameras, lights, cables, hoses, cable/hose management system, power supply, and operator control station.

  16. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1989-01-24

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  17. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1986-12-02

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  18. Field Deployable Tritium Assay System Remote Control Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTASmore » auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.« less

  19. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, Tomas B. (Livermore, CA)

    1989-01-01

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby.

  20. System and method for inventorying multiple remote objects

    DOE Patents [OSTI]

    Carrender, Curtis L.; Gilbert, Ronald W.

    2009-12-29

    A system and method of inventorying multiple objects utilizing a multi-level or a chained radio frequency identification system. The system includes a master tag and a plurality of upper level tags and lower level tags associated with respective objects. The upper and lower level tags communicate with each other and the master tag so that reading of the master tag reveals the presence and absence of upper and lower level tags. In the chained RF system, the upper and lower level tags communicate locally with each other in a manner so that more remote tags that are out of range of some of the upper and lower level tags have their information relayed through adjacent tags to the master tag and thence to a controller.