National Library of Energy BETA

Sample records for lifecycle attack protection

  1. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  2. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  3. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  4. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  5. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  6. Lifecycle Model

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    This chapter describes the lifecycle model used for the Departmental software engineering methodology.

  7. CHALLENGES AND OPPORTUNITIES--INTEGRATED LIFE-CYCLE OPTIMIZATION INITIATIVES FOR THE HANFORD RIVER PROTECTION PROJECT--WASTE TREATMENT PLANT

    SciTech Connect (OSTI)

    Auclair, K. D.

    2002-02-25

    This paper describes the ongoing integrated life-cycle optimization efforts to achieve both design flexibility and design stability for activities associated with the Waste Treatment Plant at Hanford. Design flexibility is required to support the Department of Energy Office of River Protection Balance of Mission objectives, and design stability to meet the Waste Treatment Plant construction and commissioning requirements in order to produce first glass in 2007. The Waste Treatment Plant is a large complex project that is driven by both technology and contractual requirements. It is also part of a larger overall mission, as a component of the River Protection Project, which is driven by programmatic requirements and regulatory, legal, and fiscal constraints. These issues are further complicated by the fact that both of the major contractors involved have a different contract type with DOE, and neither has a contract with the other. This combination of technical and programmatic drivers, constraints, and requirements will continue to provide challenges and opportunities for improvement and optimization. The Bechtel National, Inc. team is under contract to engineer, procure, construct, commission and test the Waste Treatment Plant on or ahead of schedule, at or under cost, and with a throughput capacity equal to or better than specified. The Department of Energy is tasked with the long term mission of waste retrieval, treatment, and disposal. While each mission is a compliment and inextricably linked to one another, they are also at opposite ends of the spectrum, in terms of expectations of one another. These mission requirements, that are seemingly in opposition to one another, pose the single largest challenge and opportunity for optimization: one of balance. While it is recognized that design maturation and optimization are the normal responsibility of any engineering firm responsible for any given project, the aspects of integrating requirements and the management

  8. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  9. Hanford Lifecycle Reports - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hanford Lifecycle Reports Hanford Lifecycle Reports Hanford Lifecycle Reports Hanford Lifecycle Reports Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size 2016 Hanford Lifecycle Report 2015 Hanford Lifecycle Report 2014 Hanford Lifecycle Report 2013 Hanford Lifecycle Report 2012 Hanford Lifecycle Report 2011 Hanford Lifecycle Report Share on Last Updated 02/22/2016 2:54

  10. HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134

    SciTech Connect (OSTI)

    PIERSON KL; MEINERT FL

    2012-01-26

    Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

  11. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  12. Model of the Product Development Lifecycle.

    SciTech Connect (OSTI)

    He, Sunny L.; Roe, Natalie H.; Wood, Evan; Nachtigal, Noel M.; Helms, Jovana

    2015-10-01

    While the increased use of Commercial Off-The-Shelf information technology equipment has presented opportunities for improved cost effectiveness and flexibility, the corresponding loss of control over the product's development creates unique vulnerabilities and security concerns. Of particular interest is the possibility of a supply chain attack. A comprehensive model for the lifecycle of hardware and software products is proposed based on a survey of existing literature from academic, government, and industry sources. Seven major lifecycle stages are identified and defined: (1) Requirements, (2) Design, (3) Manufacturing for hardware and Development for software, (4) Testing, (5) Distribution, (6) Use and Maintenance, and (7) Disposal. The model is then applied to examine the risk of attacks at various stages of the lifecycle.

  13. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  14. Performance Measure Unit Lifecycle Total Estimate Pre-2016 Lifecycle...

    Office of Environmental Management (EM)

    Measure Unit Lifecycle Total Estimate Pre-2016 Lifecycle Values 2016 Target 2017 Target Pu packaged for long-term disposition Number of Containers 5,089 5,089 5,089 5,089 eU ...

  15. Lifecycle Analysis Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GREET TM Life-Cycle Analysis Model Advanced Water Splitting Materials Workshop Stanford University, Stanford CA April 14, 2016 Amgad Elgowainy Energy Systems Division Argonne National Laboratory The GREET (Greenhouse gases, Regulated Emissions, and Energy use in Transportation) Model GREET 1 model: Fuel-cycle (or well-to-wheels, WTW) modeling of vehicle/fuel systems Stochastic Simulation Tool Algae Process Description (APD) Carbon Calculator for Land Use Change from Biofuels (CCLUB) GREET 2

  16. Photovoltaics: Life-cycle Analyses

    SciTech Connect (OSTI)

    Fthenakis V. M.; Kim, H.C.

    2009-10-02

    Life-cycle analysis is an invaluable tool for investigating the environmental profile of a product or technology from cradle to grave. Such life-cycle analyses of energy technologies are essential, especially as material and energy flows are often interwoven, and divergent emissions into the environment may occur at different life-cycle-stages. This approach is well exemplified by our description of material and energy flows in four commercial PV technologies, i.e., mono-crystalline silicon, multi-crystalline silicon, ribbon-silicon, and cadmium telluride. The same life-cycle approach is applied to the balance of system that supports flat, fixed PV modules during operation. We also discuss the life-cycle environmental metrics for a concentration PV system with a tracker and lenses to capture more sunlight per cell area than the flat, fixed system but requires large auxiliary components. Select life-cycle risk indicators for PV, i.e., fatalities, injures, and maximum consequences are evaluated in a comparative context with other electricity-generation pathways.

  17. Background Information for Independent Review Team. Lifecycle...

    Office of Scientific and Technical Information (OSTI)

    Background Information for Independent Review Team. Lifecycle Plan and FY14 Quarterly ... Visit OSTI to utilize additional information resources in energy science and technology. A ...

  18. Roles and Lifecycle | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roles and Lifecycle Roles and Lifecycle Employee Property Responsibilities by Role Director, Office of Administration The Director, Office of Administration, has the following responsibilities: *Establish a personal property management program for DOE Headquarters, except for the Federal Energy Regulatory Commission (FERC); *Appoint an Organizational Property Management Officer (OPMO) who is responsible for the Headquarters personal property management program; and *Approve, conditionally

  19. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products PDF icon ...

  20. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...

    Office of Environmental Management (EM)

    Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy ...

  1. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  2. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A ...

  3. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Energy Savers [EERE]

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Part I: Review of the Life-Cycle Energy Consumption of Incandescent, Compact Fluorescent, and LED ...

  4. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne ...

  5. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Energy Savers [EERE]

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products This March 28, ...

  6. Life-Cycle Analysis of Geothermal Technologies | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cycle Analysis of Geothermal Technologies Life-Cycle Analysis of Geothermal Technologies The results and tools from this project will help GTP and stakeholders determine and communicate GT energy and GHG benefits and water impacts. The life-cycle analysis (LCA) approach is taken to address these effects. analysis_wang_lifecycle_analysis.pdf (878.83 KB) More Documents & Publications AAPG Low-Temperature Webinar GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems

  7. Life-cycle environmental analysis--A three dimensional view

    SciTech Connect (OSTI)

    Sutherlin, K.L.; Black, R.E. )

    1993-01-01

    Both the US Air Force and the US Army have recently increased their emphasis on life-cycles of weapons systems. Along with that emphasis, there has also been an increase in emphasis in life-cycle National Environmental Policy Act (NEPA) documentation. Conflicts and inefficiencies arise when a weapon system is fielded and prompts the need for a site-specific environmental analysis. In their research and experience, the authors found no real link between life-cycle environmental analysis and site-specific environmental analyses required at various points within the life-cycle of a weapon. This other look at the relation between life-cycle and site-specific environmental analyses has the potential to increase efficiency in NEPA compliance actions and save tax dollars in the process. The authors present a three-dimensional model that relates life-cycle analyses to site-specific analyses.

  8. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  9. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Office of Scientific and Technical Information (OSTI)

    the Life-Cycle Energy Consumption of Incandescent, Compact ... upstream generation of electricity drives themore total ... However, a more detailed understanding of end-of-life ...

  10. Lifecycle of laser-produced air sparks

    SciTech Connect (OSTI)

    Harilal, S. S. Brumfield, B. E.; Phillips, M. C.

    2015-06-15

    We investigated the lifecycle of laser-generated air sparks or plasmas using multiple plasma diagnostic tools. The sparks were generated by focusing the fundamental radiation from an Nd:YAG laser in air, and studies included early and late time spark dynamics, decoupling of the shock wave from the plasma core, emission from the spark kernel, cold gas excitation by UV radiation, shock waves produced by the air spark, and the spark's final decay and turbulence formation. The shadowgraphic and self-emission images showed similar spark morphology at earlier and late times of its lifecycle; however, significant differences are seen in the midlife images. Spectroscopic studies in the visible region showed intense blackbody-type radiation at early times followed by clearly resolved ionic, atomic, and molecular emission. The detected spectrum at late times clearly contained emission from both CN and N{sub 2}{sup +}. Additional spectral features have been identified at late times due to emission from O and N atoms, indicating some degree of molecular dissociation and excitation. Detailed spatially and temporally resolved emission analysis provides insight about various physical mechanisms leading to molecular and atomic emission by air sparks, including spark plasma excitation, heating of cold air by UV radiation emitted by the spark, and shock-heating.

  11. Product Lifecycle Management Architecture: A Model Based Systems Engineering Analysis.

    SciTech Connect (OSTI)

    Noonan, Nicholas James

    2015-07-01

    This report is an analysis of the Product Lifecycle Management (PLM) program. The analysis is centered on a need statement generated by a Nuclear Weapons (NW) customer. The need statement captured in this report creates an opportunity for the PLM to provide a robust service as a solution. Lifecycles for both the NW and PLM are analyzed using Model Based System Engineering (MBSE).

  12. Building Life-Cycle Cost (BLCC) Program | Open Energy Information

    Open Energy Info (EERE)

    useful for evaluating the costs and benefits of energy and water conservation and renewable energy projects. The life-cycle cost (LCC) of two or more alternative designs are...

  13. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electrical Energy Storage | Department of Energy Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage This report presents the results of an analysis evaluating the economic viability of hydrogen for medium- to large-scale electrical energy storage applications compared with three other storage technologies: batteries, pumped hydro, and compressed air energy

  14. New Tool Yields Custom Environmental Data for Lifecycle Analysis |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. Beyond pollution prevention: Managing life-cycle costs

    SciTech Connect (OSTI)

    Cohan, D.; Gess, D. )

    1993-01-01

    Companies that purchases and use chemicals and materials in their everyday operation are finding that disposing of these products is becoming increasingly expensive. These disposal and liability costs have been the motivating factor behind recent efforts at pollution prevention. This paper suggests an alternative approach: considering the full life-cycle costs of chemicals and materials at the time purchase decisions are made. Life-cycle cost is the sum of all the costs that a product is expected to incur from the time of its purchase, during its use, until the disposal of any wastes or by-products and beyond as long as liabilities may remain. It represents the product's real cost to the company, and as such is a better basis for making cost-effective decisions. By using life-cycle costs to make decisions, companies can prevent uneconomical decisions on potentially hazardous materials and more effectively minimize overall costs. Life-cycle cost management can also help in the formulation of pollution prevention plans by identifying cost-effective waste-reduction alternatives. Although the concepts of life-cycle cost management are straightforward and intuitive, applying these concepts to real decisions may be challenging. This paper presents an overview of life-cycle cost management, discusses some of the challenges companies face applying this approach to real decisions, and provides solutions that meet these challenges.

  17. Lifecycle-analysis for heavy vehicles.

    SciTech Connect (OSTI)

    Gaines, L.

    1998-04-16

    Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

  18. Commissioning tools for life-cycle building performance assurance

    SciTech Connect (OSTI)

    Piette, M.A.

    1996-05-01

    This paper discusses information systems for building life-cycle performance analysis and the use of computer-based commissioning tools within this context. There are many reasons why buildings do not perform in practice as well as intended at the design stage. One reason is the lack of commissioning. A second reason is that design intent is not well documented, and performance targets for building components and systems are not well specified. Thus, criteria for defining verification and functional tests is unclear. A third reason is that critical information is often lost throughout the building life-cycle, which causes problems such as misunderstanding of operational characteristics and sequences and reduced overall performance. The life-cycle building performance analysis tools project discussed in this paper are focused on chillers and cooling systems.

  19. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. Guidance on Life-Cycle Cost Analysis Required by Executive Order...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Cost Analysis Required by Executive Order 13123 Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guide describes the clarification of how agencies ...

  1. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual ...

  2. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, ...

  3. 2016 Lifecycle Estimate for Los Alamos National Laboratory's Environmental Legacy Cleanup Responsibilities

    Broader source: Energy.gov [DOE]

    At the July 27, 2016 meeting: Doug Hintze, DOE EM-LA, Presented on the Environmental Management Lifecycle Baseline

  4. Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the clarification of how agencies determine the life-cycle cost for investments required by Executive Order 13123.

  5. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  6. Integrating a life-cycle assessment with NEPA: Does it make sense?

    SciTech Connect (OSTI)

    ECCLESTON, C.H.

    1998-09-03

    The National Environmental Policy Act (NEPA) of 1969 provides the basic national charter for protection of the environment in the US. Today NEPA has provided an environmental policy model which has been emulated by nations around the world. Recently, questions have been raised regarding the appropriateness and under what conditions it makes sense to combine the preparation of a NEPA analysis with the International Organization for Stnadardization (ISO) - 14000 Standards for Life-Cycle Assessment (LCA). This paper advantages a decision making tool consisting of six discrete criteria which can be employed by a user in reaching a decision regarding the integration of NEPA analysis and LCA. Properly applied, this tool should reduce the risk that a LCA may be inappropriately prepared and integrated with a NEPA analysis.

  7. Life-cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Peer Review Report | Department of Energy cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology Program Peer Review Report Life-cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology Program Peer Review Report DOE 2010 Geothermal Technologies Program Peer Review adse_005_wang.pdf (192.84 KB) More Documents & Publications Detecting Fractures Using Technology at High Temperatures and Depths - Geothermal Ultrasonic Fracture Imager (GUFI); 2010

  8. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  9. Life-Cycle Assessment of Pyrolysis Bio-Oil Production*

    SciTech Connect (OSTI)

    Steele, Philip; Puettmann, Maureen E.; Penmetsa, Venkata Kanthi; Cooper, Jerome E.

    2012-07-01

    As part ofthe Consortium for Research on Renewable Industrial Materials' Phase I life-cycle assessments ofbiofuels, lifecycle inventory burdens from the production of bio-oil were developed and compared with measures for residual fuel oil. Bio-oil feedstock was produced using whole southern pine (Pinus taeda) trees, chipped, and converted into bio-oil by fast pyrolysis. Input parameters and mass and energy balances were derived with Aspen. Mass and energy balances were input to SimaPro to determine the environmental performance of bio-oil compared with residual fuel oil as a heating fuel. Equivalent functional units of 1 MJ were used for demonstrating environmental preference in impact categories, such as fossil fuel use and global warming potential. Results showed near carbon neutrality of the bio-oil. Substituting bio-oil for residual fuel oil, based on the relative carbon emissions of the two fuels, estimated a reduction in CO2 emissions by 0.075 kg CO2 per MJ of fuel combustion or a 70 percent reduction in emission over residual fuel oil. The bio-oil production life-cycle stage consumed 92 percent of the total cradle-to-grave energy requirements, while feedstock collection, preparation, and transportation consumed 4 percent each. This model provides a framework to better understand the major factors affecting greenhouse gas emissions related to bio-oil production and conversion to boiler fuel during fast pyrolysis.

  10. Life-cycle analysis of shale gas and natural gas.

    SciTech Connect (OSTI)

    Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M.

    2012-01-27

    The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

  11. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  12. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2015 | Department of Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual supplements to the NIST Handbook 135 and NBS Special Publication 709. Download the handbook. (564.47 KB) More Documents & Publications Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Vehicle Technologies Office Merit Review 2015: Fuel-Neutral Studies of

  13. Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Power Systems | Department of Energy Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  14. GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Questions | Department of Energy GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions November 23, 2015 - 2:57pm Addthis GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model allows researchers and analysts to fully evaluate the energy and emission

  15. Hanford Advisory Board Budgets and Contracts Committee Meeting 2011 Hanford Lifecycle Scope, Schedule and Cost Report

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 Lifecycle Scope, Schedule and Cost Report Stephen Korenkiewicz, Project Manager US Department of Energy - Richland Operations Office June 6, 2013 1 2 Tri-Party Project Managers The U.S. Department of Energy (DOE), Richland Operations Office (RL) Project Integration and Control (PIC) organization is responsible for Tri-Party Agreement (TPA) Milestone M-036-01C, 2013 Hanford Lifecycle Scope, Schedule and Cost Report (Lifecycle Report) * Stephen Korenkiewicz is the RL Project Manager * David

  16. GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    modules; an update of combustion equipment emission factors; and new data on land management change effects on stover-derived biofuel life-cycle greenhouse gas emissions. ...

  17. An Assessment of Lifecycle Cost in the U.S. over Time

    SciTech Connect (OSTI)

    Previsic, Mirko

    2011-10-06

    Presentation from the 2011 Water Peer Review in which principal investigator discussed project progress to assess Lifecycle cost of Wave, Tidal, River, and Ocean Current Technologies

  18. Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products" webcast, held March 28, 2013.

  19. TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.

    SciTech Connect (OSTI)

    Willenbring, James M.; Bartlett, Roscoe Ainsworth; Heroux, Michael Allen

    2012-01-01

    Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

  20. T-693: Symantec Endpoint Protection Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site...

  1. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and In-Stream Hydrokinetic Power | Department of Energy Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power 16_life_revision_previsic_update.ppt (2.64 MB) More Documents & Publications 2014 Water Power Program Peer Review

  2. National Infrastructure Protection Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural,

  3. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-11-01

    This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

  4. Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems

    Office of Energy Efficiency and Renewable Energy (EERE)

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  5. Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL...

  6. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  7. A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conventional Fuels in the Transportation Sector | Department of Energy A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with Conventional Fuels in the Transportation Sector A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with Conventional Fuels in the Transportation Sector 2004 Diesel Engine Emissions Reduction (DEER) Conference Presentation: ConocoPhillips and Nexant Corporatin 2004_deer_abbott.pdf (160.87 KB) More Documents & Publications Shell Gas to Liquids

  8. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  11. Life-Cycle Analysis of Alternative Aviation Fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S.

    2012-06-01

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1_2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or(2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55–85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources — such as natural gas and coal — could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet

  12. Life-cycle analysis of alternative aviation fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S.

    2012-07-23

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet

  13. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  14. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  15. GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems | Department of Energy GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting van002_wang_2013_o.pdf (1.64 MB) More Documents & Publications Fuel-Cycle Energy and Emissions Analysis with the GREET Model Vehicle Technologies Office Merit Review 2015:

  16. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  17. A Review of Battery Life-Cycle Analysis. State of Knowledge and Critical Needs

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.

    2010-10-01

    This report examines battery life-cycle assessments with a focus on cradle-to-gate (CTG) energy and greenhouse gas (GHG) and criteria emissions. This includes battery manufacturing and as the production of materials that make up batteries. The report covers both what is known about battery life cycles, as well as what needs to be established for better environmental evaluations.

  18. A review of battery life-cycle analysis : state of knowledge and critical needs.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.; Energy Systems

    2010-12-22

    A literature review and evaluation has been conducted on cradle-to-gate life-cycle inventory studies of lead-acid, nickel-cadmium, nickel-metal hydride, sodium-sulfur, and lithium-ion battery technologies. Data were sought that represent the production of battery constituent materials and battery manufacture and assembly. Life-cycle production data for many battery materials are available and usable, though some need updating. For the remaining battery materials, lifecycle data either are nonexistent or, in some cases, in need of updating. Although battery manufacturing processes have occasionally been well described, detailed quantitative information on energy and material flows is missing. For all but the lithium-ion batteries, enough constituent material production energy data are available to approximate material production energies for the batteries, though improved input data for some materials are needed. Due to the potential benefit of battery recycling and a scarcity of associated data, there is a critical need for life-cycle data on battery material recycling. Either on a per kilogram or per watt-hour capacity basis, lead-acid batteries have the lowest production energy, carbon dioxide emissions, and criteria pollutant emissions. Some process-related emissions are also reviewed in this report.

  19. Emergency Operating Records Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-10-23

    To establish the policy, responsibilities, and requirements for a Departmental Emergency Operating Records Protection Program to safeguard that core or records deemed necessary to assure continuity of essential Governmental activities during and following disaster and attack-related emergency conditions. Cancels DOE 5500.7A. Chanceled by DOE O 151.1 of 9-25-1995.

  20. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  1. Product Life-Cycle Management: The future of product and packaging design

    SciTech Connect (OSTI)

    Jung, L.B. )

    1993-01-01

    Product Life-Cycle Management (PLCM) is the control of environmental impacts associated with all the life phases of a product, from design through manufacture, packaging and disposal. PLCM dictates that products be manufactured using less harmful chemicals and fewer resources. Product packaging must be minimal and made of renewable and recyclable resources. Both the product and the package must contain recycled material. Packaging and products must also be collected for recycle at the end of their intended use, requiring infrastructure to collect, transport and process these materials. European legislation now requires the return and recycle of packaging materials by the end of 1993. Requirements are also being imposed on manufacturers of automobile related products; automotive batteries, tires and even automobiles themselves must now be accepted back and recycled. Increasing public concerns and awareness of environmental impacts plus the decreasing availability of natural resources will continue to push product life-cycle legislation forward.

  2. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  3. Waste-To-Energy Techno-Economic Analysis and Life-Cycle Analysis Presentation for BETO 2015 Project Peer Review

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Waste-To-Energy Techno-Economic Analysis and Life-Cycle Analysis March 24, 2015 Conversion Ling Tao†, Jeongwoo Han* †National Renewable Energy Laboratory *Argonne National Laboratory DOE Bioenergy Technologies Office (BETO) 2015 Project Peer Review 2 | Bioenergy Technologies Office Goal Statement * Conduct the techno-economic analysis (TEA) and life-cycle analysis (LCA) of Waste-To-Energy (WTE) pathways to evaluate their economic viability and environmental sustainability - Strategic

  4. Life-Cycle Evaluation of Concrete Building Construction as a Strategy for Sustainable Cities

    SciTech Connect (OSTI)

    Stadel, Alexander; Gursel, Petek; Masanet, Eric

    2012-01-18

    Structural materials in commercial buildings in the United States account for a significant fraction of national energy use, resource consumption, and greenhouse gas (GHG) emissions. Robust decisions for balancing and minimizing these various environmental effects require that structural materials selections follow a life-cycle, systems modeling approach. This report provides a concise overview of the development and use of a new life-cycle assessment (LCA) model for structural materials in U.S. commercial buildings-the Berkeley Lab Building Materials Pathways (B-PATH) model. B-PATH aims to enhance environmental decision-making in the commercial building LCA, design, and planning communities through the following key features: (1) Modeling of discrete technology options in the production, transportation, construction, and end of life processes associated U.S. structural building materials; (2) Modeling of energy supply options for electricity provision and directly combusted fuels across the building life cycle; (3) Comprehensiveness of relevant building mass and energy flows and environmental indicators; (4) Ability to estimate modeling uncertainties through easy creation of different life-cycle technology and energy supply pathways for structural materials; and (5) Encapsulation of the above features in a transparent public use model. The report summarizes literature review findings, methods development, model use, and recommendations for future work in the area of LCA for commercial buildings.

  5. Using life-cycle cost management to cut costs and reduce waste

    SciTech Connect (OSTI)

    Gess, D.; Cohan, D.; McLearn, M.

    1995-12-01

    Increasing competition is forcing electric utility companies to reduce costs and improve efficiency. At the same time, increasing costs for waste disposal and emissions control and growing environmental regulatory pressure are providing powerful incentives for firms in virtually every industry to investigate opportunities to reduce or even eliminate the adverse environmental impacts associated with their operations. companies are also striving toward environmental stewardship to realize the potential benefits to the firms`s public image, employees, an shareholders. Motivated by these cost and environmental concerns, the Electric Power Research Institute (EPRI), Decision Focus Inc. (DFI), and a consortium of electric utility companies have developed techniques and tools to help electric utility companies to make purchase and operating decisions based on their full life-cycle costs, which explicitly include environmental, health, and safety costs. The process, called Life-Cycle Cost Management (LCCM), helps utilities to efficiently assemble the appropriate life-cycle information and bring it to bear on their business decisions. To date, several utilities have used LCCM to evaluate a range of product substitution and process improvement decisions and to implement cost-savings actions. This paper summarizes some of these applications.

  6. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  7. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  8. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  9. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  10. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  11. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Revised) (Fact Sheet), Hydrogen and Fuel Cell Technical Highlights (HFCTH)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power Systems | Department of Energy Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  12. Development and Validation of a Lifecycle-based Prognostics Architecture with Test Bed Validation

    SciTech Connect (OSTI)

    Hines, J. Wesley; Upadhyaya, Belle; Sharp, Michael; Ramuhalli, Pradeep; Jeffries, Brien; Nam, Alan; Strong, Eric; Tong, Matthew; Welz, Zachary; Barbieri, Federico; Langford, Seth; Meinweiser, Gregory; Weeks, Matthew

    2014-11-06

    On-line monitoring and tracking of nuclear plant system and component degradation is being investigated as a method for improving the safety, reliability, and maintainability of aging nuclear power plants. Accurate prediction of the current degradation state of system components and structures is important for accurate estimates of their remaining useful life (RUL). The correct quantification and propagation of both the measurement uncertainty and model uncertainty is necessary for quantifying the uncertainty of the RUL prediction. This research project developed and validated methods to perform RUL estimation throughout the lifecycle of plant components. Prognostic methods should seamlessly operate from beginning of component life (BOL) to end of component life (EOL). We term this "Lifecycle Prognostics." When a component is put into use, the only information available may be past failure times of similar components used in similar conditions, and the predicted failure distribution can be estimated with reliability methods such as Weibull Analysis (Type I Prognostics). As the component operates, it begins to degrade and consume its available life. This life consumption may be a function of system stresses, and the failure distribution should be updated to account for the system operational stress levels (Type II Prognostics). When degradation becomes apparent, this information can be used to again improve the RUL estimate (Type III Prognostics). This research focused on developing prognostics algorithms for the three types of prognostics, developing uncertainty quantification methods for each of the algorithms, and, most importantly, developing a framework using Bayesian methods to transition between prognostic model types and update failure distribution estimates as new information becomes available. The developed methods were then validated on a range of accelerated degradation test beds. The ultimate goal of prognostics is to provide an accurate assessment for

  13. Life-cycle cost and impacts: alternatives for managing KE basin sludge

    SciTech Connect (OSTI)

    Alderman, C.J.

    1997-06-27

    This document presents the results of a life-cycle cost and impacts evaluation of alternatives for managing sludge that will be removed from the K Basins. The two basins are located in the 100-K Area of the Hanford Site. This evaluation was conducted by Fluor Daniel Hanford, Inc. (FDH) and its subcontractors to support decisions regarding the ultimate disposition of the sludge. The long-range plan for the Hanford Site calls for spent nuclear fuel (SNF), sludge, debris, and water to be removed from the K East (KE) and K West (KW) Basins. This activity will be conducted as a removal action under the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA). The scope of the CERCLA action will be limited to removing the SNF, sludge, debris, and water from the basins and transferring them to authorized facilities for interim storage and/or treatment and disposal. The scope includes treating the sludge and water in the 100-K Area prior to the transfer. Alternatives for the removal action are evaluated in a CERCLA engineering evaluation/cost analysis (EE/CA) and include different methods for managing sludge from the KE Basins. The scope of the removal action does not include storing, treating, or disposing of the sludge once it is transferred to the receiving facility and the EE/CA does not evaluate those downstream activities. This life-cycle evaluation goes beyond the EE/CA and considers the full life-cycle costs and impacts of dispositioning sludge.

  14. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report

  15. Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications

    SciTech Connect (OSTI)

    Aden, Nathaniel; Qin, Yining; Fridley, David

    2010-09-15

    Buildings are at the locus of three trends driving China's increased energy use and emissions: urbanization, growing personal consumption, and surging heavy industrial production. Migration to cities and urban growth create demand for new building construction. Higher levels of per-capita income and consumption drive building operational energy use with demand for higher intensity lighting, thermal comfort, and plug-load power. Demand for new buildings, infrastructure, and electricity requires heavy industrial production. In order to quantify the implications of China's ongoing urbanization, rising personal consumption, and booming heavy industrial sector, this study presents a lifecycle assessment (LCA) of the energy use and carbon emissions related to residential and commercial buildings. The purpose of the LCA model is to quantify the impact of a given building and identify policy linkages to mitigate energy demand and emissions growth related to China's new building construction. As efficiency has become a higher priority with growing energy demand, policy and academic attention to buildings has focused primarily on operational energy use. Existing studies estimate that building operational energy consumption accounts for approximately 25% of total primary energy use in China. However, buildings also require energy for mining, extracting, processing, manufacturing, and transporting materials, as well as energy for construction, maintenance, and decommissioning. Building and supporting infrastructure construction is a major driver of industry consumption--in 2008 industry accounted for 72% of total Chinese energy use. The magnitude of new building construction is large in China--in 2007, for example, total built floor area reached 58 billion square meters. During the construction boom in 2007 and 2008, more than two billion m{sup 2} of building space were added annually; China's recent construction is estimated to account for half of global construction

  16. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  17. Impacts of Vehicle Weight Reduction via Material Substitution on Life-Cycle Greenhouse Gas Emissions

    SciTech Connect (OSTI)

    Kelly, Jarod C.; Sullivan, John L.; Burnham, Andrew; Elgowainy, Amgad

    2015-10-20

    This study examines the vehicle-cycle impacts associated with substituting lightweight materials for those currently found in light-duty passenger vehicles. We determine part-based energy use and greenhouse gas (GHG) emission ratios by collecting material substitution data from both the literature and automotive experts and evaluating that alongside known mass-based energy use and GHG emission ratios associated with material pair substitutions. Several vehicle parts, along with full vehicle systems, are examined for lightweighting via material substitution to observe the associated impact on GHG emissions. Results are contextualized by additionally examining fuel-cycle GHG reductions associated with mass reductions relative to the baseline vehicle during the use phase and also determining material pair breakeven driving distances for GHG emissions. The findings show that, while material substitution is useful in reducing vehicle weight, it often increases vehicle-cycle GHGs depending upon the material substitution pair. However, for a vehicle’s total life cycle, fuel economy benefits are greater than the increased burdens associated with the vehicle manufacturing cycle, resulting in a net total life-cycle GHG benefit. The vehicle cycle will become increasingly important in total vehicle life-cycle GHGs, since fuel-cycle GHGs will be gradually reduced as automakers ramp up vehicle efficiency to meet fuel economy standards.

  18. Design and life-cycle considerations for unconventional-reservoir wells

    SciTech Connect (OSTI)

    Miskimins, J.L.

    2009-05-15

    This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

  19. Life-Cycle Cost Analysis for Utility Combinations (LCCA) (for microcomputers). Software

    SciTech Connect (OSTI)

    Corin, N.

    1989-09-01

    The Life-Cycle Cost Analysis for Utility Combinations (LCCA) system evaluates housing project utility systems. The system determines the cost-effectiveness and aids in the selection of the utility combination with the lowest life-cycle cost. Because of the large number of possible combinations of fuels, purchasing methods, types of installations and utility rates, a systematic analysis of costs must be made. The choice of utilities may substantially influence construction cost. LCCA calculates initial and monthly costs of both individual dwelling units and project totals. Therefore, the LCCA system calculates costs for four combinations of fuel/energy. LCCA analyzes the following four utility combinations: Combination 1--Electricity; Combination 2--Electricity and Gas; Combination 3--Electricity and Oil; and Combination 4--Electricity, Gas and Oil. Software Description: The software is written in the Lotus 1-2-3 programming language for implementation on an IBM PC microcomputer using Lotus 1-2-3. Software requires 160K of disk storage, with a hard disk and one floppy or two floppy disk drives.

  20. Performance metrics and life-cycle information management for building performance assurance

    SciTech Connect (OSTI)

    Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

    1998-06-01

    Commercial buildings account for over $85 billion per year in energy costs, which is far more energy than technically necessary. One of the primary reasons buildings do not perform as well as intended is that critical information is lost, through ineffective documentation and communication, leading to building systems that are often improperly installed and operated. A life-cycle perspective on the management of building information provides a framework for improving commercial building energy performance. This paper describes a project to develop strategies and techniques to provide decision-makers with information needed to assure the desired building performance across the complete life cycle of a building project. A key element in this effort is the development of explicit performance metrics that quantitatively represent performance objectives of interest to various building stakeholders. The paper begins with a discussion of key problems identified in current building industry practice, and ongoing work to address these problems. The paper then focuses on the concept of performance metrics and their use in improving building performance during design, commissioning, and on-going operations. The design of a Building Life-cycle Information System (BLISS) is presented. BLISS is intended to provide an information infrastructure capable of integrating a variety of building information technologies that support performance assurance. The use of performance metrics in case study building projects is explored to illustrate current best practice. The application of integrated information technology for improving current practice is discussed.

  1. Updated Life-Cycle Assessment of Aluminum Production and Semi-fabrication for the GREET Model

    SciTech Connect (OSTI)

    Dai, Qiang; Kelly, Jarod C.; Burnham, Andrew; Elgowainy, Amgad

    2015-09-01

    This report serves as an update for the life-cycle analysis (LCA) of aluminum production based on the most recent data representing the state-of-the-art of the industry in North America. The 2013 Aluminum Association (AA) LCA report on the environmental footprint of semifinished aluminum products in North America provides the basis for the update (The Aluminum Association, 2013). The scope of this study covers primary aluminum production, secondary aluminum production, as well as aluminum semi-fabrication processes including hot rolling, cold rolling, extrusion and shape casting. This report focuses on energy consumptions, material inputs and criteria air pollutant emissions for each process from the cradle-to-gate of aluminum, which starts from bauxite extraction, and ends with manufacturing of semi-fabricated aluminum products. The life-cycle inventory (LCI) tables compiled are to be incorporated into the vehicle cycle model of Argonne National Laboratory’s Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) Model for the release of its 2015 version.

  2. Life-cycle cost analysis 200-West Weather Enclosure: Multi-function Waste Tank Facility

    SciTech Connect (OSTI)

    Umphrey, M.R.

    1995-01-16

    The Multi-Function Waste Tank Facility (MWTF)will provide environmentally safe and acceptable storage capacity for handling wastes resulting from the remediation of existing single-shell and double-shell tanks on the Hanford Site. The MWTF will construct two tank farm facilities at two separate locations. A four-tank complex will be constructed in the 200-East Area of the Hanford Site; a two-tank complex will be constructed in the 200-West Area. This report documents the results of a life-cycle cost analysis performed by ICF Kaiser Hanford Company (ICF KH) for the Weather Enclosure proposed to be constructed over the 200-West tanks. Currently, all tank farm operations on the Hanford Site are conducted in an open environment, with weather often affecting tank farm maintenance activities. The Weather Enclosure is being proposed to allow year-round tank farm operation and maintenance activities unconstrained by weather conditions. Elimination of weather-related delays at the MWTF and associated facilities will reduce operational costs. The life-cycle cost analysis contained in this report analyzes potential cost savings based on historical weather information, operational and maintenance costs, construction cost estimates, and other various assumptions.

  3. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  4. FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2

    SciTech Connect (OSTI)

    Templeton, K.J.

    1996-05-23

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on

  5. Comprehensive Lifecycle Planning and Management System For Addressing Water Issues Associated With Shale Gas Development In New York, Pennsylvania, And West Virginia

    SciTech Connect (OSTI)

    Arthur, J. Daniel

    2012-07-01

    The objective of this project is to develop a modeling system to allow operators and regulators to plan all aspects of water management activities associated with shale gas development in the target project area of New York, Pennsylvania, and West Virginia (target area ), including water supply, transport, storage, use, recycling, and disposal and which can be used for planning, managing, forecasting, permit tracking, and compliance monitoring. The proposed project is a breakthrough approach to represent the entire shale gas water lifecycle in one comprehensive system with the capability to analyze impacts and options for operational efficiency and regulatory tracking and compliance, and to plan for future water use and disposition. It will address all of the major water-related issues of concern associated with shale gas development in the target area, including water withdrawal, transport, storage, use, treatment, recycling, and disposal. It will analyze the costs, water use, and wastes associated with the available options, and incorporate constraints presented by permit requirements, agreements, local and state regulations, equipment and material availability, etc. By using the system to examine the water lifecycle from withdrawals through disposal, users will be able to perform scenario analysis to answer "what if" questions for various situations. The system will include regulatory requirements of the appropriate state and regional agencies and facilitate reporting and permit applications and tracking. These features will allow operators to plan for more cost effective resource production. Regulators will be able to analyze impacts of development over an entire area. Regulators can then make informed decisions about the protections and practices that should be required as development proceeds. This modeling system will have myriad benefits for industry, government, and the public. For industry, it will allow planning all water management operations for a

  6. System Evaluation and Life-Cycle Cost Analysis of a Commercial-Scale High-Temperature Electrolysis Hydrogen Production Plant

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-11-01

    Results of a system evaluation and lifecycle cost analysis are presented for a commercial-scale high-temperature electrolysis (HTE) central hydrogen production plant. The plant design relies on grid electricity to power the electrolysis process and system components, and industrial natural gas to provide process heat. The HYSYS process analysis software was used to evaluate the reference central plant design capable of producing 50,000 kg/day of hydrogen. The HYSYS software performs mass and energy balances across all components to allow optimization of the design using a detailed process flow sheet and realistic operating conditions specified by the analyst. The lifecycle cost analysis was performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes Microsoft Excel spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. The results of the lifecycle analyses indicate that for a 10% internal rate of return, a large central commercial-scale hydrogen production plant can produce 50,000 kg/day of hydrogen at an average cost of $2.68/kg. When the cost of carbon sequestration is taken into account, the average cost of hydrogen production increases by $0.40/kg to $3.08/kg.

  7. Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews

    2007-09-15

    The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

  8. Life-cycle cost and payback period analysis for commercial unitary air conditioners

    SciTech Connect (OSTI)

    Rosenquist, Greg; Coughlin, Katie; Dale, Larry; McMahon, James; Meyers, Steve

    2004-03-31

    This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results show how the savings vary among customers facing different electricity prices and other conditions. At 11.5 EER, at least 80% of the users achieve a positive LCC savings. At 12.0 EER, the maximum efficiency analyzed, mean LCC savings are lower but still positive. For the {ge} $65,000 Btu/h to <135,000 Btu/h equipment class, 59% of users achieve a positive LCC savings. For the $135,000 Btu/h to <240,000 Btu/h equipment class, 91% of users achieve a positive LCC savings.

  9. System Evaluations and Life-Cycle Cost Analyses for High-Temperature Electrolysis Hydrogen Production Facilities

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-05-01

    This report presents results of system evaluations and lifecycle cost analyses performed for several different commercial-scale high-temperature electrolysis (HTE) hydrogen production concepts. The concepts presented in this report rely on grid electricity and non-nuclear high-temperature process heat sources for the required energy inputs. The HYSYS process analysis software was used to evaluate both central plant designs for large-scale hydrogen production (50,000 kg/day or larger) and forecourt plant designs for distributed production and delivery at about 1,500 kg/day. The HYSYS software inherently ensures mass and energy balances across all components and it includes thermodynamic data for all chemical species. The optimized designs described in this report are based on analyses of process flow diagrams that included realistic representations of fluid conditions and component efficiencies and operating parameters for each of the HTE hydrogen production configurations analyzed. As with previous HTE system analyses performed at the INL, a custom electrolyzer model was incorporated into the overall process flow sheet. This electrolyzer model allows for the determination of the average Nernst potential, cell operating voltage, gas outlet temperatures, and electrolyzer efficiency for any specified inlet steam, hydrogen, and sweep-gas flow rates, current density, cell active area, and external heat loss or gain. The lifecycle cost analyses were performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. There are standard default sets of assumptions that the methodology uses to ensure consistency when comparing the cost of different production or plant design options. However, these assumptions may also be varied within the

  10. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  11. Life-cycle analysis results of geothermal systems in comparison to other power systems.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

    2010-10-11

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET

  12. Life-cycle assessment of corn-based butanol as a potential transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2007-12-31

    Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

  13. material protection

    National Nuclear Security Administration (NNSA)

    %2A en Office of Weapons Material Protection http:nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-1

  14. material protection

    National Nuclear Security Administration (NNSA)

    %2A en Office of Weapons Material Protection http:www.nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-1

  15. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  16. FY 1996 solid waste integrated life-cycle forecast container summary volume 1 and 2

    SciTech Connect (OSTI)

    Valero, O.J.

    1996-04-23

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the containers expected to be used for these waste shipments from 1996 through the remaining life cycle of the Hanford Site. In previous years, forecast data have been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to the more detailed report on waste volumes: WHC-EP0900, FY 1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary. Both of these documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on the types of containers that will be used for packaging low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major waste generators for each waste category and container type are also discussed. Containers used for low-level waste (LLW) are described in Appendix A, since LLW requires minimal treatment and storage prior to onsite disposal in the LLW burial grounds. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste are expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters.

  17. Analysis of material recovery facilities for use in life-cycle assessment

    SciTech Connect (OSTI)

    Pressley, Phillip N.; Levis, James W.; Damgaard, Anders; Barlaz, Morton A.; DeCarolis, Joseph F.

    2015-01-15

    Highlights: • Life-cycle assessment of solid waste management relies on accurate process models. • Material recovery facility (MRF) processes were modeled with new primary data. • Single stream, dual stream, pre-sorted, and mixed waste MRFs were considered. • MRF electricity consumption ranges from 4.7 to 7.8 kW h per Mg input. • Total cost ranges from $19.8 to $24.9 per Mg input. - Abstract: Insights derived from life-cycle assessment of solid waste management strategies depend critically on assumptions, data, and modeling at the unit process level. Based on new primary data, a process model was developed to estimate the cost and energy use associated with material recovery facilities (MRFs), which are responsible for sorting recyclables into saleable streams and as such represent a key piece of recycling infrastructure. The model includes four modules, each with a different process flow, for separation of single-stream, dual-stream, pre-sorted recyclables, and mixed-waste. Each MRF type has a distinct combination of equipment and default input waste composition. Model results for total amortized costs from each MRF type ranged from $19.8 to $24.9 per Mg (1 Mg = 1 metric ton) of waste input. Electricity use ranged from 4.7 to 7.8 kW h per Mg of waste input. In a single-stream MRF, equipment required for glass separation consumes 28% of total facility electricity consumption, while all other pieces of material recovery equipment consume less than 10% of total electricity. The dual-stream and mixed-waste MRFs have similar electricity consumption to a single-stream MRF. Glass separation contributes a much larger fraction of electricity consumption in a pre-sorted MRF, due to lower overall facility electricity consumption. Parametric analysis revealed that reducing separation efficiency for each piece of equipment by 25% altered total facility electricity consumption by less than 4% in each case. When model results were compared with actual data for an

  18. protective force

    National Nuclear Security Administration (NNSA)

    ntex%20-%20protective%20force%20-%20edited.jpg" alt"successfully completed a recent assessment by the U.S. Department " >

    Members of Pantex's Protective Force on...

  19. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  20. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protections: Sampling Protections: Sampling Protection #3: Sampling for known and unexpected contaminants August 1, 2013 Monitoring stormwater in Los Alamos Canyon Monitoring stormwater in Los Alamos Canyon The Environmental Sampling Board, a key piece of the Strategy, ensures that LANL collects relevant and appropriate data to answer questions about the protection of human and environmental health, and to satisfy regulatory requirements. LANL must demonstrate the data are technically justified

  1. MARVEL: A PC-based interactive software package for life-cycle evaluations of hybrid/electric vehicles

    SciTech Connect (OSTI)

    Marr, W.W.; He, J.

    1995-07-01

    As a life-cycle analysis tool, MARVEL has been developed for the evaluation of hybrid/electric vehicle systems. It can identify the optimal combination of battery and heat engine characteristics for different vehicle types and performance requirements, on the basis of either life-cycle cost or fuel efficiency. Battery models that allow trade-offs between specific power and specific energy, between cycle life and depth of discharge, between peak power and depth of discharge, and between other parameters, are included in the software. A parallel hybrid configuration, using an internal combustion engine and a battery as the power sources, can be simulated with a user-specified energy management strategy. The PC-based software package can also be used for cost or fuel efficiency comparisons among conventional, electric, and hybrid vehicles.

  2. Novel pathways for fuels and lubricants from biomass optimized using life-cycle greenhouse gas assessment

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Balakrishnan, Madhesan; Sacia, Eric R.; Sreekumar, Sanil; Gunbas, Gorkem; Gokhale, Amit A.; Scown, Corinne D.; Toste, F. Dean; Bell, Alexis T.

    2015-06-08

    Decarbonizing the transportation sector is critical to achieving global climate change mitigation. Although biofuels will play an important role in conventional gasoline and diesel applications, bioderived solutions are particularly important in jet fuels and lubricants, for which no other viable renewable alternatives exist. Producing compounds for jet fuel and lubricant base oil applications often requires upgrading fermentation products, such as alcohols and ketones, to reach the appropriate molecular-weight range. Ketones possess both electrophilic and nucleophilic functionality, which allows them to be used as building blocks similar to alkenes and aromatics in a petroleum refining complex. Here, we develop a methodmore » for selectively upgrading biomass-derived alkyl methyl ketones with >95% yields into trimer condensates, which can then be hydrodeoxygenated in near-quantitative yields to give a new class of cycloalkane compounds. The basic chemistry developed here can be tailored for aviation fuels as well as lubricants by changing the production strategy. We demonstrate that a sugarcane biorefinery could use natural synergies between various routes to produce a mixture of lubricant base oils and jet fuels that achieve net life-cycle greenhouse gas savings of up to 80%.« less

  3. Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities

    SciTech Connect (OSTI)

    Lu, Hongyou; Masanet, Eric; Price, Lynn

    2009-05-29

    The use of life-cycle assessment (LCA) to understand the embodied energy, environmental impacts, and potential energy-savings of manufactured products has become more widespread among researchers in recent years. This paper reviews recent LCA studies in the cement industry in China and in other countries and provides an assessment of the methodology used by the researchers compared to ISO LCA standards (ISO 14040:2006, ISO 14044:2006, and ISO/TR 14048:2002). We evaluate whether the authors provide information on the intended application, targeted audience, functional unit, system boundary, data sources, data quality assessment, data disaggregation and other elements, and draw conclusions regarding the level of adherence to ISO standards for the papers reviewed. We found that China researchers have gained much experience during last decade, but still have room for improvement in establishing boundaries, assessing data quality, identifying data sources, and explaining limitations. The paper concludes with a discussion of directions for future LCA research in China.

  4. Novel pathways for fuels and lubricants from biomass optimized using life-cycle greenhouse gas assessment

    SciTech Connect (OSTI)

    Balakrishnan, Madhesan; Sacia, Eric R.; Sreekumar, Sanil; Gunbas, Gorkem; Gokhale, Amit A.; Scown, Corinne D.; Toste, F. Dean; Bell, Alexis T.

    2015-06-08

    Decarbonizing the transportation sector is critical to achieving global climate change mitigation. Although biofuels will play an important role in conventional gasoline and diesel applications, bioderived solutions are particularly important in jet fuels and lubricants, for which no other viable renewable alternatives exist. Producing compounds for jet fuel and lubricant base oil applications often requires upgrading fermentation products, such as alcohols and ketones, to reach the appropriate molecular-weight range. Ketones possess both electrophilic and nucleophilic functionality, which allows them to be used as building blocks similar to alkenes and aromatics in a petroleum refining complex. Here, we develop a method for selectively upgrading biomass-derived alkyl methyl ketones with >95% yields into trimer condensates, which can then be hydrodeoxygenated in near-quantitative yields to give a new class of cycloalkane compounds. The basic chemistry developed here can be tailored for aviation fuels as well as lubricants by changing the production strategy. We demonstrate that a sugarcane biorefinery could use natural synergies between various routes to produce a mixture of lubricant base oils and jet fuels that achieve net life-cycle greenhouse gas savings of up to 80%.

  5. Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.

    SciTech Connect (OSTI)

    Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M.

    2012-02-08

    A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

  6. Life-cycle energy savings potential from aluminum-intensive vehicles

    SciTech Connect (OSTI)

    Stodolsky, F.; Vyas, A.; Cuenca, R.; Gaines, L.

    1995-07-01

    The life-cycle energy and fuel-use impacts of US-produced aluminum-intensive passenger cars and passenger trucks are assessed. The energy analysis includes vehicle fuel consumption, material production energy, and recycling energy. A model that stimulates market dynamics was used to project aluminum-intensive vehicle market shares and national energy savings potential for the period between 2005 and 2030. We conclude that there is a net energy savings with the use of aluminum-intensive vehicles. Manufacturing costs must be reduced to achieve significant market penetration of aluminum-intensive vehicles. The petroleum energy saved from improved fuel efficiency offsets the additional energy needed to manufacture aluminum compared to steel. The energy needed to make aluminum can be reduced further if wrought aluminum is recycled back to wrought aluminum. We find that oil use is displaced by additional use of natural gas and nonfossil energy, but use of coal is lower. Many of the results are not necessarily applicable to vehicles built outside of the United States, but others could be used with caution.

  7. Levelized life-cycle costs for four residue-collection systems and four gas-production systems

    SciTech Connect (OSTI)

    Thayer, G.R.; Rood, P.L.; Williamson, K.D. Jr.; Rollett, H.

    1983-01-01

    Technology characterizations and life-cycle costs were obtained for four residue-collection systems and four gas-production systems. All costs are in constant 1981 dollars. The residue-collection systems were cornstover collection, wheat-straw collection, soybean-residue collection, and wood chips from forest residue. The life-cycle costs ranged from $19/ton for cornstover collection to $56/ton for wood chips from forest residues. The gas-production systems were low-Btu gas from a farm-size gasifier, solar flash pyrolysis of biomass, methane from seaweed farms, and hydrogen production from bacteria. Life-cycle costs ranged from $3.3/10/sup 6/ Btu for solar flash pyrolysis of biomass to $9.6/10/sup 6/ Btu for hydrogen from bacteria. Sensitivity studies were also performed for each system. The sensitivity studies indicated that fertilizer replacement costs were the dominate costs for the farm-residue collection, while residue yield was most important for the wood residue. Feedstock costs were most important for the flash pyrolysis. Yields and capital costs are most important for the seaweed farm and the hydrogen from bacteria system.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  9. Influence of corn oil recovery on life-cycle greenhouse gas emissions of corn ethanol and corn oil biodiesel

    SciTech Connect (OSTI)

    Wang, Zhichao; Dunn, Jennifer B.; Han, Jeongwoo; Wang, Michael

    2015-11-04

    Corn oil recovery and conversion to biodiesel has been widely adopted at corn ethanol plants recently. The US EPA has projected 2.6 billion liters of biodiesel will be produced from corn oil in 2022. Corn oil biodiesel may qualify for federal renewable identification number (RIN) credits under the Renewable Fuel Standard, as well as for low greenhouse gas (GHG) emission intensity credits under California’s Low Carbon Fuel Standard. Because multiple products [ethanol, biodiesel, and distiller’s grain with solubles (DGS)] are produced from one feedstock (corn), however, a careful co-product treatment approach is required to accurately estimate GHG intensities of both ethanol and corn oil biodiesel and to avoid double counting of benefits associated with corn oil biodiesel production. This study develops four co-product treatment methods: (1) displacement, (2) marginal, (3) hybrid allocation, and (4) process-level energy allocation. Life-cycle GHG emissions for corn oil biodiesel were more sensitive to the choice of co-product allocation method because significantly less corn oil biodiesel is produced than corn ethanol at a dry mill. Corn ethanol life-cycle GHG emissions with the displacement, marginal, and hybrid allocation approaches are similar (61, 62, and 59 g CO2e/MJ, respectively). Although corn ethanol and DGS share upstream farming and conversion burdens in both the hybrid and process-level energy allocation methods, DGS bears a higher burden in the latter because it has lower energy content per selling price as compared to corn ethanol. As a result, with the process-level allocation approach, ethanol’s life-cycle GHG emissions are lower at 46 g CO2e/MJ. Corn oil biodiesel life-cycle GHG emissions from the marginal, hybrid allocation, and process-level energy allocation methods were 14, 59, and 45 g CO2e/MJ, respectively. Sensitivity analyses were conducted to investigate the influence corn oil yield, soy biodiesel, and

  10. Influence of corn oil recovery on life-cycle greenhouse gas emissions of corn ethanol and corn oil biodiesel

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wang, Zhichao; Dunn, Jennifer B.; Han, Jeongwoo; Wang, Michael

    2015-11-04

    Corn oil recovery and conversion to biodiesel has been widely adopted at corn ethanol plants recently. The US EPA has projected 2.6 billion liters of biodiesel will be produced from corn oil in 2022. Corn oil biodiesel may qualify for federal renewable identification number (RIN) credits under the Renewable Fuel Standard, as well as for low greenhouse gas (GHG) emission intensity credits under California’s Low Carbon Fuel Standard. Because multiple products [ethanol, biodiesel, and distiller’s grain with solubles (DGS)] are produced from one feedstock (corn), however, a careful co-product treatment approach is required to accurately estimate GHG intensities of bothmore » ethanol and corn oil biodiesel and to avoid double counting of benefits associated with corn oil biodiesel production. This study develops four co-product treatment methods: (1) displacement, (2) marginal, (3) hybrid allocation, and (4) process-level energy allocation. Life-cycle GHG emissions for corn oil biodiesel were more sensitive to the choice of co-product allocation method because significantly less corn oil biodiesel is produced than corn ethanol at a dry mill. Corn ethanol life-cycle GHG emissions with the displacement, marginal, and hybrid allocation approaches are similar (61, 62, and 59 g CO2e/MJ, respectively). Although corn ethanol and DGS share upstream farming and conversion burdens in both the hybrid and process-level energy allocation methods, DGS bears a higher burden in the latter because it has lower energy content per selling price as compared to corn ethanol. As a result, with the process-level allocation approach, ethanol’s life-cycle GHG emissions are lower at 46 g CO2e/MJ. Corn oil biodiesel life-cycle GHG emissions from the marginal, hybrid allocation, and process-level energy allocation methods were 14, 59, and 45 g CO2e/MJ, respectively. Sensitivity analyses were conducted to investigate the influence corn oil yield, soy biodiesel, and defatted DGS displacement

  11. Protecting Wildlife

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Wildlife Protecting Wildlife We monitor and protect the wildlife and their habitats on Laboratory property. February 2, 2015 Mule deer on LANL property LANL has been home to mule deer since its creation in 1942 and has seasonally been home to elk since their reintroduction to New Mexico in the 1960s. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Protecting our wildlife Since the early 1940s, LANL's

  12. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection 3: Sampling for known and unexpected contaminants August 1, 2013 Monitoring stormwater in Los Alamos Canyon Monitoring stormwater in Los Alamos Canyon The Environmental ...

  13. Glass Composition Constraint Recommendations for Use in Life-Cycle Mission Modeling

    SciTech Connect (OSTI)

    McCloy, John S.; Vienna, John D.

    2010-05-03

    The component concentration limits that most influence the predicted Hanford life-cycle HLW glass volume by HTWOS were re-evaluated. It was assumed that additional research and development work in glass formulation and melter testing would be performed to improve the understanding of component effects on the processability and product quality of these HLW glasses. Recommendations were made to better estimate the potential component concentration limits that could be applied today while technology development is underway to best estimate the volume of HLW glass that will eventually be produced at Hanford. The limits for concentrations of P2O5, Bi2O3, and SO3 were evaluated along with the constraint used to avoid nepheline formation in glass. Recommended concentration limits were made based on the current HLW glass property models being used by HTWOS (Vienna et al. 2009). These revised limits are: 1) The current ND should be augmented by the OB limit of OB ≤ 0.575 so that either the normalized silica (NSi) is less that the 62% limit or the OB is below the 0.575 limit. 2) The mass fraction of P2O5 limit should be revised to allow for up to 4.5 wt%, depending on CaO concentrations. 3) A Bi2O3 concentration limit of 7 wt% should be used. 4) The salt accumulation limit of 0.5 wt% SO3 may be increased to 0.6 wt%. Again, these revised limits do not obviate the need for further testing, but make it possible to more accurately predict the impact of that testing on ultimate HLW glass volumes.

  14. A life-cycle model approach to multimedia waste reduction measuring performance for environmental cleanup projects

    SciTech Connect (OSTI)

    Phifer, B.E. Jr.; George, S.M.

    1993-07-01

    The Martin Marietta Energy Systems, Inc. (Energy Systems), Environmental Restoration (ER) Program adopted a Pollution Prevention Program in March 1991. The program`s mission is to minimize waste and prevent pollution in remedial investigations (RIs), feasibility studies, decontamination and decommissioning, and surveillance and maintenance site program activities. Mission success will result in volume and/or toxicity reduction of generated waste. The ER Program waste generation rates are projected to steadily increase through the year 2005 for all waste categories. Standard production units utilized to measure waste minimization apply to production/manufacturing facilities. Since ER inherited contaminated waste from previous production processes, no historical production data can be applied. Therefore, a more accurate measure for pollution prevention was identified as a need for the ER Program. The Energy Systems ER Program adopted a life-cycle model approach and implemented the concept of numerically scoring their waste generators to measure the effectiveness of pollution prevention/waste minimization programs and elected to develop a numerical scoring system (NSS) to accomplish these measurements. The prototype NSS, a computerized, user-friendly information management database system, was designed to be utilized in each phase of the ER Program. The NSS was designed to measure a generator`s success in incorporating pollution prevention in their work plans and reducing investigation-derived waste (IDW) during RIs. Energy Systems is producing a fully developed NSS and actually scoring the generators of IDW at six ER Program sites. Once RI waste generators are scored utilizing the NSS, the numerical scores are distributed into six performance categories: training, self-assessment, field implementation, documentation, technology transfer, and planning.

  15. Fire Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-05

    This Standard was developed to provide acceptable methods and approaches for meeting DOE fire protection program and design requirements and to address special or unique fire protection issues at DOE facilities that are not comprehensively or adequately addressed in national consensus standards or other design criteria.

  16. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  17. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  18. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, David E.; Czanderna, Alvin W.; Kennedy, Cheryl E.

    1996-01-01

    A protective diffusion barrier having adhesive qualifies for metalized surfaces is provided by a passivating agent having the formula HS--(CH.sub.2).sub.11 --COOH Which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces.

  19. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, D.E.; Czanderna, A.W.; Kennedy, C.E.

    1996-01-30

    A protective diffusion barrier having adhesive qualities for metalized surfaces is provided by a passivating agent having the formula HS--(CH{sub 2}){sub 11}--COOH which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces. 8 figs.

  20. Fire Protection

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... room application. (Refer to NFPA 318, Standard for the Protection of Semiconductor Fabrication Facilities.) See also Appendix A of DOE-STD-1066-99 for information on other types ...

  1. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for management and operation of the DOE Protective Force (PF), establishes requirements for firearms operations and defines the firearms courses of fire. Cancels: DOE M 473.2-1A DOE M 473.2-2

  2. Corrosion protection

    DOE Patents [OSTI]

    Brown, Donald W.; Wagh, Arun S.

    2003-05-27

    There has been invented a chemically bonded phosphate corrosion protection material and process for application of the corrosion protection material for corrosion prevention. A slurry of iron oxide and phosphoric acid is used to contact a warm surface of iron, steel or other metal to be treated. In the presence of ferrous ions from the iron, steel or other metal, the slurry reacts to form iron phosphates which form grains chemically bonded onto the surface of the steel.

  3. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-03-07

    The manual establishes requirements for management and operation of the DOE Protective Force, establishes requirements for firearms operations and defines the firearms courses of fire. Chg 1 dated 3/7/06. DOE M 470.4-3A cancels DOE M 470.4-3, Chg 1, Protective Force, dated 3-7-06, Attachment 2, Contractor Requirement Document (CRD) only (except for Section C). Chg 1, dated 3-7-06, cancels DOE M 470.4-3

  4. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Chg 1, dated 3/7/06. Cancels: DOE M 473.1-1 and DOE M 471.2-1B

  5. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Cancels: DOE M 473.1-1 and DOE M 471.2-1B.

  6. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.

    1986-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  7. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.

    1987-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  8. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.; Zymboly, Gregory E.

    1985-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  9. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  10. ORISE: Human Subjects Protection Resource Protection Book

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Protection Resource Book The Human Subjects Protection Resource Book synthesizes information currently available on the protection of human subjects in research, the ...

  11. Physical protection

    SciTech Connect (OSTI)

    Myre, W.C.; DeMontmollin, J.M. )

    1989-07-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratories which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by insiders .

  12. Preliminary evaluation of the lifecycle costs and market barriers of reflective pavements

    SciTech Connect (OSTI)

    Ting, M.; Koomey, J.G.; Pomerantz, M.

    2001-11-21

    , which we call the chipping and aggregate methods, and calculated their potential life cycle costs. By analyzing the potential for increased pavement durability resulting from these conceptual approaches, we then estimated the incremental costs that would allow them to be cost-effective compared to conventional AC. For our example case of Los Angeles, we found that those allowable incremental costs range from less than dollar 1 to more than dollar 11 per square yard (dollar 1 to dollar 13 per square meter) depending on street type and the condition of the original pavement. Finally, we evaluated the main actors in the pavement market and the existing and potential market barriers associated with reflective pavements. Apart from situations where lifecycle costs are high compared to conventional AC, all reflective paving technologies face a cultural barrier based on the belief that black is better. For PCC, high first costs were found to be the most significant economic barrier, particularly where agencies are cons trained by first cost. Lack of developer standards was found to be a significant institutional barrier to PCC since developers are often not held accountable for the long-term maintenance of roads after initial construction, which creates a misplaced incentive to build low first-cost pavements. PCC also faces site-specific barriers such as poorly compacted base soils and proximity to areas of frequent utility cutting.

  13. weapons material protection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material protection

  14. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-23

    This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys (DOEs) purview ranging from facilities, buildings, Government property, and employees to national security interests such as classified information, special nuclear material (SNM), and nuclear weapons. Cancels Section A of DOE M 470.4-2 Chg 1. Canceled by DOE O 473.3.

  15. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  16. Life-cycle assessment of municipal solid waste management alternatives with consideration of uncertainty: SIWMS development and application

    SciTech Connect (OSTI)

    El Hanandeh, Ali; El-Zein, Abbas

    2010-05-15

    This paper describes the development and application of the Stochastic Integrated Waste Management Simulator (SIWMS) model. SIWMS provides a detailed view of the environmental impacts and associated costs of municipal solid waste (MSW) management alternatives under conditions of uncertainty. The model follows a life-cycle inventory approach extended with compensatory systems to provide more equitable bases for comparing different alternatives. Economic performance is measured by the net present value. The model is verified against four publicly available models under deterministic conditions and then used to study the impact of uncertainty on Sydney's MSW management 'best practices'. Uncertainty has a significant effect on all impact categories. The greatest effect is observed in the global warming category where a reversal of impact direction is predicted. The reliability of the system is most sensitive to uncertainties in the waste processing and disposal. The results highlight the importance of incorporating uncertainty at all stages to better understand the behaviour of the MSW system.

  17. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  18. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  19. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  20. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  1. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  2. Waters LANL Protects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waters LANL Protects Waters LANL Protects LANL watersheds source in the Jemez Mountains and end at the Rio Grande.

  3. Comparative life-cycle energy payback analysis of multi-junction a-SiGe and nanocrystalline/a-Si modules

    SciTech Connect (OSTI)

    Fthenakis, V.; Kim, H.

    2010-07-15

    Despite the publicity of nanotechnologies in high tech industries including the photovoltaic sector, their life-cycle energy use and related environmental impacts are understood only to a limited degree as their production is mostly immature. We investigated the life-cycle energy implications of amorphous silicon (a-Si) PV designs using a nanocrystalline silicon (nc-Si) bottom layer in the context of a comparative, prospective life-cycle analysis framework. Three R and D options using nc-Si bottom layer were evaluated and compared to the current triple-junction a-Si design, i.e., a-Si/a-SiGe/a-SiGe. The life-cycle energy demand to deposit nc-Si was estimated from parametric analyses of film thickness, deposition rate, precursor gas usage, and power for generating gas plasma. We found that extended deposition time and increased gas usages associated to the relatively high thickness of nc-Si lead to a larger primary energy demand for the nc-Si bottom layer designs, than the current triple-junction a-Si. Assuming an 8% conversion efficiency, the energy payback time of those R and D designs will be 0.7-0.9 years, close to that of currently commercial triple-junction a-Si design, 0.8 years. Future scenario analyses show that if nc-Si film is deposited at a higher rate (i.e., 2-3 nm/s), and at the same time the conversion efficiency reaches 10%, the energy-payback time could drop by 30%.

  4. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncoveredmore » that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.« less

  5. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    SciTech Connect (OSTI)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncovered that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.

  6. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  7. Physical protection technologies for the reconfigured weapons complex

    SciTech Connect (OSTI)

    Jaeger, C.D.

    1994-08-01

    Sandia National Laboratories was a memtier of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S&S) team providing assistance to the Department of Energy`s (DOE) Office of Weapons Complex Reconfigaration. New and improved S&S concepts, approaches and technologies were needed to support both new and upgraded facilities. Physical protection technologies used in these facilities were to use proven state-of-the-art systems in such areas as image processing, alarm communications and display, entry control, contraband detection, intrusion detection and video assessment, access delay, automation and robotics, and various insider protection systems. Factors considered in the selection of these technologies were protection against the design basis threat, reducing S&S life-cycle costs, automation of S&S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, increasing the amount of delay to an outsider adversary and having reliable and maintainable systems. This paper will discuss the S&S issues, requirements, technology opportunities and needs. Physical protection technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed.

  8. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  9. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    SciTech Connect (OSTI)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  10. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C.E.; Benson, D.K.

    1984-07-20

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate prior to metal deposition thereon to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  11. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C. Edwin; Benson, David K.

    1988-01-01

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate before metal deposition to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  12. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  13. Encapsulants for protecting MEMS devices during post-packaging release etch

    DOE Patents [OSTI]

    Peterson, Kenneth A.

    2005-10-18

    The present invention relates to methods to protect a MEMS or microsensor device through one or more release or activation steps in a "package first, release later" manufacturing scheme: This method of fabrication permits wirebonds, other interconnects, packaging materials, lines, bond pads, and other structures on the die to be protected from physical, chemical, or electrical damage during the release etch(es) or other packaging steps. Metallic structures (e.g., gold, aluminum, copper) on the device are also protected from galvanic attack because they are protected from contact with HF or HCL-bearing solutions.

  14. Protections = Defenses in Depth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protections: Cleanup Cleanup 101 Corrective Measures Process Protection 1: Remove the Source Example Cleanup: Removal of Polychlorinated Biphenyls from Hillside 140 Environmental ...

  15. Office of Physical Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Physical Protection is comprised of a team of security specialists engaged in providing Headquarters-wide physical protection.

  16. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    This program demonstrates acceptable methods and examples to assist each DOE site in meeting the fire protection objectives provided in DOE Order 5480.7A, "Fire Protection."

  17. Fire Protection Program

    Broader source: Energy.gov [DOE]

    Department of Energy (DOE) Fire Protection Program provides published fire safety directives (orders, standards, and guidance documents), a range of oversight activities, an annual fire protection program summary.

  18. ORISE: Protecting Human Subjects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Human Subjects Protecting Human Subjects The U.S. Department of Energy (DOE) Human Subjects Research Program exists to ensure that all research conducted at DOE ...

  19. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-04-30

    {alpha} - Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}). The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor.

  20. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-08-31

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray onto to the surface of YSZ coating. Oxidation at high temperature and hot corrosion tests showed that Al{sub 2}O{sub 3} overlay deposited on the YSZ TBCs surface can not only reduce the hot corrosion rate, but also significantly prevents the bond coat from oxidation.

  1. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  2. Voluntary Protection Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Voluntary Protection Program

  3. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  4. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  5. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  6. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  7. Prospective life-cycle modeling of a carbon capture and storage system using metal-organic frameworks for CO2 capture

    SciTech Connect (OSTI)

    Sathre, R; Masanet, E

    2013-01-01

    Metal-organic frameworks (MOFs) are promising new material media for carbon dioxide (CO2) capture. Their tunable adsorption patterns may allow relatively efficient separation of gases, e.g. from power plant exhaust. Here we conduct scenario-based prospective life-cycle system modeling to estimate the potentials and implications of large-scale MOF application for post-combustion carbon capture and storage (CCS), and estimate the source and magnitude of uncertainties. The methodological approach includes parametric system modeling to quantify relations between system components; scenario projections of plausible pathways for system scale-up; proxy data on analogous materials and processes; and uncertainty analysis of parameter significance. We estimate the system-wide material and energy flows and economic costs associated with projected large-scale CCS deployment. We compare the performance of a MOF-based system to currently more mature amine-based capture technology. We discuss balancing two critical factors that determine the success of CO2 capture media: thermodynamic efficiency of the capture/regeneration cycle, and life-cycle embodied energy and cost of the material and its ancillary systems.

  8. Incorporating Agricultural Management Practices into the Assessment of Soil Carbon Change and Life-Cycle Greenhouse Gas Emissions of Corn Stover Ethanol Production

    SciTech Connect (OSTI)

    Qin, Zhangcai; Canter, Christina E.; Dunn, Jennifer B.; Mueller, Steffen; Kwon, Ho-young; Han, Jeongwoo; Wander, Michelle M.; Wang, Michael

    2015-09-01

    Land management practices such as cover crop adoption or manure application that can increase soil organic carbon (SOC) may provide a way to counter SOC loss upon removal of stover from corn fields for use as a biofuel feedstock. This report documents the data, methodology, and assumptions behind the incorporation of land management practices into corn-soybean systems that dominate U.S. grain production using varying levels of stover removal in the GREETTM (Greenhouse gases, Regulated Emissions, and Energy use in Transportation) model and its CCLUB (Carbon Calculator for Land Use change from Biofuels production) module. Tillage (i.e., conventional, reduced and no tillage), corn stover removal (i.e., at 0, 30% and 60% removal rate), and organic matter input techniques (i.e., cover crop and manure application) are included in the analysis as major land management practices. Soil carbon changes associated with land management changes were modeled with a surrogate CENTURY model. The resulting SOC changes were incorporated into CCLUB while GREET was expanded to include energy and material consumption associated with cover crop adoption and manure application. Life-cycle greenhouse gas (GHG) emissions of stover ethanol were estimated using a marginal approach (all burdens and benefits assigned to corn stover ethanol) and an energy allocation approach (burdens and benefits divided between grain and stover ethanol). In the latter case, we considered corn grain and corn stover ethanol to be produced at an integrated facility. Life-cycle GHG emissions of corn stover ethanol are dependent upon the analysis approach selected (marginal versus allocation) and the land management techniques applied. The expansion of CCLUB and GREET to accommodate land management techniques can produce a wide range of results because users can select from multiple scenario options such as choosing tillage levels, stover removal rates, and whether crop yields increase annually or remain constant

  9. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  10. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  11. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  12. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30

    Provides detailed requirements to supplement DOE O 473.2, Protective Force Program, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Does not cancel other directives.

  13. Voluntary Protection Program Announcement

    Broader source: Energy.gov [DOE]

    Secretary O'Leary formally announced a new initiative, "The Department of Energy Voluntary Protection Program (DOEVPP)," which is designed to recognize contractor sites that are providing excellent safety and health protection to their employees.

  14. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-14

    This Order establishes requirements for the management and operation of the Department of Energy (DOE) Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE.

  15. Fire Protection Program Metrics

    Broader source: Energy.gov [DOE]

    Presenter: Perry E. D ’Antonio, P.E., Acting Sr. Manager, Fire Protection - Sandia National Laboratories

  16. Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

    SciTech Connect (OSTI)

    Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

    2008-03-28

    The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

  17. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    To facilitate conformance with its fire safety directives and the implementation of a comprehensive fire protection program, DOE has developed a number of "model" program documents. These include a comprehensive model fire protection program, model fire hazards analyses and assessments, fire protection system inspection and testing procedures, and related material.

  18. Corium protection assembly

    DOE Patents [OSTI]

    Gou, Perng-Fei; Townsend, Harold E.; Barbanti, Giancarlo

    1994-01-01

    A corium protection assembly includes a perforated base grid disposed below a pressure vessel containing a nuclear reactor core and spaced vertically above a containment vessel floor to define a sump therebetween. A plurality of layers of protective blocks are disposed on the grid for protecting the containment vessel floor from the corium.

  19. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  20. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  1. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  2. Chavez Position Paper for DHS Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chavez Position Paper for DHS Workshop on Future Directions in Cyber-physical Systems Security, July 22-24, 2009 Page 1 Position Paper: Protecting Process Control Systems against Lifecycle Attacks Using Trust Anchors Adrian R Chavez Sandia National Laboratories 1 adrchav@sandia.gov Abstract Critical infrastructure systems are vulnerable to physical and cyber attack. Securing these systems is a top priority for the U.S., but ongoing efforts ignore important aspects of the information technology

  3. METHOD OF FORMING A PROTECTIVE COATING ON FERROUS METAL SURFACES

    DOE Patents [OSTI]

    Schweitzer, D.G.; Weeks, J.R.; Kammerer, O.F.; Gurinsky, D.H.

    1960-02-23

    A method is described of protecting ferrous metal surfaces from corrosive attack by liquid metals, such as liquid bismuth or lead-bismuth alloys. The nitrogen content of the ferrous metal surface is first reduced by reacting the metal surface with a metal which forms a stable nitride. Thereafter, the surface is contacted with liquid metal containing at least 2 ppm zirconium at a temperature in the range of 550 to 1100 deg C to form an adherent zirconium carbide layer on the ferrous surface.

  4. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  5. Fire Protection Program Manual

    SciTech Connect (OSTI)

    Sharry, J A

    2012-05-18

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  6. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  7. Long- vs. short-term energy storage technologies analysis : a life-cycle cost study : a study for the DOE energy storage systems program.

    SciTech Connect (OSTI)

    Schoenung, Susan M.; Hassenzahl, William V.

    2003-08-01

    This report extends an earlier characterization of long-duration and short-duration energy storage technologies to include life-cycle cost analysis. Energy storage technologies were examined for three application categories--bulk energy storage, distributed generation, and power quality--with significant variations in discharge time and storage capacity. More than 20 different technologies were considered and figures of merit were investigated including capital cost, operation and maintenance, efficiency, parasitic losses, and replacement costs. Results are presented in terms of levelized annual cost, $/kW-yr. The cost of delivered energy, cents/kWh, is also presented for some cases. The major study variable was the duration of storage available for discharge.

  8. Assessment of potential life-cycle energy and greenhouse gas emission effects from using corn-based butanol as a transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2008-01-01

    Since advances in the ABE (acetone-butanol-ethanol) fermentation process in recent years have led to significant increases in its productivity and yields, the production of butanol and its use in motor vehicles have become an option worth evaluating. This study estimates the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. It employs a well-to-wheels (WTW) analysis tool: the Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model. The estimates of life-cycle energy use and greenhouse gas (GHG) emissions are based on an Aspen Plus(reg. sign) simulation for a corn-to-butanol production process, which describes grain processing, fermentation, and product separation. Bio-butanol-related WTW activities include corn farming, corn transportation, butanol production, butanol transportation, and vehicle operation. In this study, we also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. We then compared the results for bio-butanol with those of conventional gasoline. Our study shows that driving vehicles fueled with corn-based butanol produced by the current ABE fermentation process could result in substantial fossil energy savings (39%-56%) and avoid large percentage of the GHG emission burden, yielding a 32%-48% reduction relative to using conventional gasoline. On energy basis, a bushel of corn produces less liquid fuel from the ABE process than that from the corn ethanol dry mill process. The coproduction of a significant portion of acetone from the current ABE fermentation presents a challenge. A market analysis of acetone, as well as research and development on robust alternative technologies and processes that minimize acetone while increase the butanol yield, should be conducted.

  9. Risk analysis tools for force protection and infrastructure/asset protection

    SciTech Connect (OSTI)

    Jaeger, C.D.; Duggan, R.A.; Paulus, W.K.

    1998-09-01

    The Security Systems and Technology Center at Sandia National Laboratories has for many years been involved in the development and use of vulnerability assessment and risk analysis tools. In particular, two of these tools, ASSESS and JTS, have been used extensively for Department of Energy facilities. Increasingly, Sandia has been called upon to evaluate critical assets and infrastructures, support DoD force protection activities and assist in the protection of facilities from terrorist attacks using weapons of mass destruction. Sandia is involved in many different activities related to security and force protection and is expanding its capabilities by developing new risk analysis tools to support a variety of users. One tool, in the very early stages of development, is EnSURE, Engineered Surety Using the Risk Equation. EnSURE addresses all of the risk equation and integrates the many components into a single, tool-supported process to help determine the most cost-effective ways to reduce risk. This paper will briefly discuss some of these risk analysis tools within the EnSURE framework.

  10. Respiratory Protection Program

    Broader source: Energy.gov [DOE]

    This page is supported by the Respiratory Protection Program Administrators Group. The Respiratory Protection Program Administrators Group is a volunteer organization co-sponsored by the DOE Office of Worker Safety and Health Policy and the Energy Facility Contractors Group (EFCOG) to provide a forum for DOE and DOE contractor personnel to identify respiratory protection issues of concern to the DOE and pursue solutions to issues identified.

  11. ORISE: Human Subjects Protection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Protection The Oak Ridge Institute for Science and Education (ORISE) ... U.S. Department of Energy (DOE) laboratories involved in human subjects research projects. ...

  12. Physical Protection Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Supplements DOE O 473.1, by establishing requirements for the physical protection of safeguards and security interests. Cancels: DOE M 5632.1C-1

  13. Protective Actions and Reentry

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume defines appropriate protective actions and reentry of a site following an emergency. Canceled by DOE G 151.1-4.

  14. Asset Protection Analysis Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-21

    The Guide provides examples of the application of as set protection analysis to several common problems. Canceled by DOE N 251.80.

  15. Environmental Protection: Controlling the Present

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection community-environmentassetsimagesiconearthday.jpg Environmental Protection: Controlling the Present The Laboratory is committed to increasing sustainable practices...

  16. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  17. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  18. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  19. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    To establish DOE procedures and responsibilities for implementing the policy and requirements set forth in 10 CFR Part 745, Protection of Human Subjects, ad in DOE P 443.1, Policy on the Protection of Human Subjects. Cancels DOE O 1300.3. Canceled by DOE O 443.1A.

  20. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-12-20

    Provides detailed requirements to supplement DOE O 473.2, PROTECTIVE FORCE PROGRAM, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Change 1 revised pages in Chapters IV and VI on 12/20/2001.

  1. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Cancels DOE 5400.1 and DOE N 450.4.

  2. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-03-23

    The Order establishes requirements for the management and operation of the DOE Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE. Supersedes DOE O 473.3. NOTE: Safeguards and Security Alarm Management and Control Systems, of DOE O 473.3, is retained as Attachment 3, Annex 1.

  3. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The order establishes Department of Energy (DOE) procedures and responsibilities for implementing the policy and requirements set forth in 10 Code of Federal Regulations (CFR) Part 745, Protection of Human Subjects; and in DOE P 443.1A, Protection of Human Subjects, dated 12-20-07. Cancels DOE O 443.1. Canceled by DOE O 443.1B.

  4. Environmental protection Implementation Plan

    SciTech Connect (OSTI)

    R. C. Holland

    1999-12-01

    This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

  5. Fire protection design criteria

    SciTech Connect (OSTI)

    1997-03-01

    This Standard provides supplemental fire protection guidance applicable to the design and construction of DOE facilities and site features (such as water distribution systems) that are also provided for fire protection. It is intended to be used in conjunction with the applicable building code, national Fire Protection Association Codes and Standards, and any other applicable DOE construction criteria. This Standard, along with other delineated criteria, constitutes the basic criteria for satisfying DOE fire and life safety objectives for the design and construction or renovation of DOE facilities.

  6. Physical Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Establishes Department of Energy management objectives, requirements and responsibilities for the physical protection of safeguards and security interests. Cancels DOE 5632.1C. Canceled by DOE O 470.4.

  7. Protective Force Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-02-13

    To prescribe Department of Energy policy, responsibilities, and requirements for the management and operation of the Protective Force Program. Chg 1 dated 2-13-95. Cancels DOE O 5632.7 and DOE O 5632.8.

  8. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Policy is to establish DOE-specific principles for the protection of human subjects involved in DOE research. Cancels DOE P 443.1. Canceled by DOE O 443.1B

  9. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    The purpose of this Policy is to establish DOE-specific policy for the protection of human subjects involved in DOE research. Canceled by DOE P 443.1A.

  10. CALUTRON PROTECTIVE CIRCUIT

    DOE Patents [OSTI]

    Schmidt, F.H.

    1959-05-26

    A switch and relay circuit is described for protection of calutrons. By means of this arrangement no arc can be established in the arc chamber unless cooling water flow is established. (T.R.H.)

  11. Federal Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-15

    This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

  12. Environmental Protection, Safety, and Health Protection Program for DOE Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1980-05-05

    This order establishes the Environmental Protection, Safety, and Health Protection Program for Department of Energy (DOE) operations. Cancels Interim Management Directive No. 5001, Safety, Health And Environmental Protection dated 9-29-77.

  13. Protecting Against Nuclear Threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Against Nuclear Threats Protecting Against Nuclear Threats Los Alamos' mission is to solve national security challenges through scientific excellence. April 12, 2012 Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports: MagViz project leader Michelle Espy demonstrates the MagViz liquid detection and analysis system in the Albuquerque International Sunport.

  14. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-06-04

    The objective is to implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by DOE operations, and meet or exceed compliance with applicable environmental, public health, and resource protection requirements cost effectively. The revision provides specific expectations for implementation of Executive Order 13423, Strengthening Federal Environment, Energy, and Transportation Management. Cancels DOE O 450.1. Canceled by DOE O 436.1.

  15. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Chg 1, dated 1-24-05; Chg 2, dated 12-7-05; Admin Chg 1, dated 1-3-07. Cancels DOE 5400.1 and DOE N 450.4.

  16. Voluntary Protection Program- Basics

    Broader source: Energy.gov [DOE]

    The Department of Energy Voluntary Protection Program (DOE-VPP) promotes safety and health excellence through cooperative efforts among labor, management, and government at the Department of Energy (DOE) contractor sites. DOE has also formed partnerships with other Federal agencies and the private sector for both advancing and sharing its Voluntary Protection Program (VPP) experiences and preparing for program challenges in the next century. The safety and health of contractor and federal employees are a high priority for the Department.

  17. Protecting your personal information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting your personal information Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: September 1, 2016 all issues All Issues » submit Protecting your personal information Quantum cryptography keeps data secure from cyber thieves October 1, 2014 Mass-producible quantum smart card and fiber optics cable. Mass-producible quantum smart card and fiber optics cable. Contact Community Programs Director Kurt Steinhaus Email Editor Ute Haker

  18. General Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1990-06-29

    To establish environmental protection program requirements, authorities, and responsibilities for Department of Energy (DOE) Operations for assuring compliance with applicable Federal, State and local environmental protection laws and regulations, Executive Orders, and internal Department policies. Cancels DOE O 5480.1A. Para. 2b, 4b, and 4c of Chap. II and para. 2d and 3b of Chap. III canceled by DOE O 231.1.

  19. Advanced worker protection system

    SciTech Connect (OSTI)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-10-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment.

  20. Collaborative Defense of Transmission and Distribution Protection...

    Office of Environmental Management (EM)

    ... (R&D) program, which aims to enhance the reliability and resilience of the nation's energy infrastructure by reducing the risk of energy disruptions due to cyber attacks. ...

  1. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  2. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  3. Comparative analysis of the production costs and life-cycle GHG emissions of FT liquid fuels from coal and natural gas

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews

    2008-10-15

    Liquid transportation fuels derived from coal and natural gas could help the United States reduce its dependence on petroleum. The fuels could be produced domestically or imported from fossil fuel-rich countries. The goal of this paper is to determine the life-cycle GHG emissions of coal- and natural gas-based Fischer-Tropsch (FT) liquids, as well as to compare production costs. The results show that the use of coal- or natural gas-based FT liquids will likely lead to significant increases in greenhouse gas (GHG) emissions compared to petroleum-based fuels. In a best-case scenario, coal- or natural gas-based FT-liquids have emissions only comparable to petroleum-based fuels. In addition, the economic advantages of gas-to-liquid (GTL) fuels are not obvious: there is a narrow range of petroleum and natural gas prices at which GTL fuels would be competitive with petroleum-based fuels. CTL fuels are generally cheaper than petroleum-based fuels. However, recent reports suggest there is uncertainty about the availability of economically viable coal resources in the United States. If the U.S. has a goal of increasing its energy security, and at the same time significantly reducing its GHG emissions, neither CTL nor GTL consumption seem a reasonable path to follow. 28 refs., 2 figs., 4 tabs.

  4. Comparisons of four categories of waste recycling in China's paper industry based on physical input-output life-cycle assessment model

    SciTech Connect (OSTI)

    Liang Sai; Zhang, Tianzhu; Xu Yijian

    2012-03-15

    Highlights: Black-Right-Pointing-Pointer Using crop straws and wood wastes for paper production should be promoted. Black-Right-Pointing-Pointer Bagasse and textile waste recycling should be properly limited. Black-Right-Pointing-Pointer Imports of scrap paper should be encouraged. Black-Right-Pointing-Pointer Sensitivity analysis, uncertainties and policy implications are discussed. - Abstract: Waste recycling for paper production is an important component of waste management. This study constructs a physical input-output life-cycle assessment (PIO-LCA) model. The PIO-LCA model is used to investigate environmental impacts of four categories of waste recycling in China's paper industry: crop straws, bagasse, textile wastes and scrap paper. Crop straw recycling and wood utilization for paper production have small total intensity of environmental impacts. Moreover, environmental impacts reduction of crop straw recycling and wood utilization benefits the most from technology development. Thus, using crop straws and wood (including wood wastes) for paper production should be promoted. Technology development has small effects on environmental impacts reduction of bagasse recycling, textile waste recycling and scrap paper recycling. In addition, bagasse recycling and textile waste recycling have big total intensity of environmental impacts. Thus, the development of bagasse recycling and textile waste recycling should be properly limited. Other pathways for reusing bagasse and textile wastes should be explored and evaluated. Moreover, imports of scrap paper should be encouraged to reduce large indirect impacts of scrap paper recycling on domestic environment.

  5. Optimization and life-cycle cost of health clinic PV system for a rural area in southern Iraq using HOMER software

    SciTech Connect (OSTI)

    Al-Karaghouli, Ali; Kazmerski, L.L.

    2010-04-15

    This paper addresses the need for electricity of rural areas in southern Iraq and proposes a photovoltaic (PV) solar system to power a health clinic in that region. The total daily health clinic load is 31.6 kW h and detailed loads are listed. The National Renewable Energy Laboratory (NREL) optimization computer model for distributed power, ''HOMER,'' is used to estimate the system size and its life-cycle cost. The analysis shows that the optimal system's initial cost, net present cost, and electricity cost is US$ 50,700, US$ 60,375, and US$ 0.238/kW h, respectively. These values for the PV system are compared with those of a generator alone used to supply the load. We found that the initial cost, net present cost of the generator system, and electricity cost are US$ 4500, US$ 352,303, and US$ 1.332/kW h, respectively. We conclude that using the PV system is justified on humanitarian, technical, and economic grounds. (author)

  6. Life-cycle cost comparisons of advanced storage batteries and fuel cells for utility, stand-alone, and electric vehicle applications

    SciTech Connect (OSTI)

    Humphreys, K.K.; Brown, D.R.

    1990-01-01

    This report presents a comparison of battery and fuel cell economics for ten different technologies. To develop an equitable economic comparison, the technologies were evaluated on a life-cycle cost (LCC) basis. The LCC comparison involved normalizing source estimates to a standard set of assumptions and preparing a lifetime cost scenario for each technology, including the initial capital cost, replacement costs, operating and maintenance (O M) costs, auxiliary energy costs, costs due to system inefficiencies, the cost of energy stored, and salvage costs or credits. By considering all the costs associated with each technology over its respective lifetime, the technology that is most economical to operate over any given period of time can be determined. An analysis of this type indicates whether paying a high initial capital cost for a technology with low O M costs is more or less economical on a lifetime basis than purchasing a technology with a low initial capital cost and high O M costs. It is important to realize that while minimizing cost is important, the customer will not always purchase the least expensive technology. The customer may identify benefits associated with a more expensive option that make it the more attractive over all (e.g., reduced construction lead times, modularity, environmental benefits, spinning reserve, etc.). The LCC estimates presented in this report represent three end-use applications: utility load-leveling, stand-alone power systems, and electric vehicles.

  7. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R. Michael

    1991-01-01

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device.

  8. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R.M.

    1991-12-03

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device. 4 figures.

  9. Protection of the Groundwater Resource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection of the Groundwater Resource Protection of the Groundwater Resource Monitoring wells act as sentinels between suspected LANL contamination and the water supply. August 1,...

  10. Protections: Sediment Control = Contaminant Retention

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sediment Control Protections: Sediment Control Contaminant Retention LANL maintains hundreds of wells, stream sampling stations and stormwater control structures to protect...

  11. Rack Protection Monitor

    SciTech Connect (OSTI)

    Orr, Stanley G.

    1998-10-21

    A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

  12. Rack protection monitor

    DOE Patents [OSTI]

    Orr, Stanley G.

    2000-01-01

    A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

  13. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  14. Microscope collision protection apparatus

    DOE Patents [OSTI]

    DeNure, Charles R.

    2001-10-23

    A microscope collision protection apparatus for a remote control microscope which protects the optical and associated components from damage in the event of an uncontrolled collision with a specimen, regardless of the specimen size or shape. In a preferred embodiment, the apparatus includes a counterbalanced slide for mounting the microscope's optical components. This slide replaces the rigid mounts on conventional upright microscopes with a precision ball bearing slide. As the specimen contacts an optical component, the contacting force will move the slide and the optical components mounted thereon. This movement will protect the optical and associated components from damage as the movement causes a limit switch to be actuated, thereby stopping all motors responsible for the collision.

  15. Material for radioactive protection

    DOE Patents [OSTI]

    Taylor, R.S.; Boyer, N.W.

    A boron containing burn resistant, low-level radiation protection material useful, for example, as a liner for radioactive waste disposal and storage, a component for neutron absorber, and a shield for a neutron source is described. The material is basically composed of borax in the range of 25 to 50%, coal tar in the range of 25 to 37.5%, with the remainder being an epoxy resin mix. A preferred composition is 50% borax, 25% coal tar and 25% epoxy resin. The material is not susceptible to burning and is about 1/5 the cost of existing radiation protection material utilized in similar applications.

  16. Environmental protection implementation plan

    SciTech Connect (OSTI)

    Holland, R.C.

    1998-03-01

    This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

  17. Office of River Protection - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of River Protection Office of River Protection Office of River Protection Office of River Protection Email Email Page | Print Print Page |Text Increase Font Size Decrease...

  18. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  19. Fire Protection Training

    Office of Energy Efficiency and Renewable Energy (EERE)

    Fire Protection Training courses developed that provide needed information and a method to train fire departments and other emergency responders who may be called upon to respond to accidents involving radioactive materials along DOE transportation corridors and routes and to assist emergency responders located at or near a Department of Energy (DOE) site radiological transportation route.

  20. Thermal protection apparatus

    DOE Patents [OSTI]

    Bennett, Gloria A.; Elder, Michael G.; Kemme, Joseph E.

    1985-01-01

    An apparatus which thermally protects sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components to a heat sink such as ice.

  1. Thermal protection apparatus

    DOE Patents [OSTI]

    Bennett, G.A.; Elder, M.G.; Kemme, J.E.

    1984-03-20

    The disclosure is directed to an apparatus for thermally protecting sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components such as electronics to a heat sink such as ice.

  2. Protective Force Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30

    Establishes policy, requirements, responsibilities, and authorities, for the management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE 5632.7A

  3. Contractor Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-05

    This Manual establishes requirements for the management and operation of the U.S. Department of Energy contractor protective forces. Cancels: DOE M 470.4-3 Chg 1, CRD (Attachment 2) only, except for Section C. Canceled by DOE O 473.3.

  4. Armored garment for protecting

    DOE Patents [OSTI]

    Purvis, James W.; Jones, II, Jack F.; Whinery, Larry D.; Brazfield, Richard; Lawrie, Catherine; Lawrie, David; Preece, Dale S.

    2009-08-11

    A lightweight, armored protective garment for protecting an arm or leg from blast superheated gases, blast overpressure shock, shrapnel, and spall from a explosive device, such as a Rocket Propelled Grenade (RPG) or a roadside Improvised Explosive Device (IED). The garment has a ballistic sleeve made of a ballistic fabric, such as an aramid fiber (e.g., KEVLAR.RTM.) cloth, that prevents thermal burns from the blast superheated gases, while providing some protection from fragments. Additionally, the garment has two or more rigid armor inserts that cover the upper and lower arm and protect against high-velocity projectiles, shrapnel and spall. The rigid inserts can be made of multiple plies of a carbon/epoxy composite laminate. The combination of 6 layers of KEVLAR.RTM. fabric and 28 plies of carbon/epoxy laminate inserts (with the inserts being sandwiched in-between the KEVLAR.RTM. layers), can meet the level IIIA fragmentation minimum V.sub.50 requirements for the US Interceptor Outer Tactical Vest.

  5. Life-Cycle Cost and Risk Analysis of Alternative Configurations for Shipping Low-Level Radioactive Waste to the Nevada Test Site

    SciTech Connect (OSTI)

    PM Daling; SB Ross; BM Biwer

    1999-12-17

    The Nevada Test Site (NTS) is a major receiver of low-level radioactive waste (LLW) for disposal. Currently, all LLW received at NTS is shipped by truck. The trucks use highway routes to NTS that pass through the Las Vegas Valley and over Hoover Dam, which is a concern of local stakeholder groups in the State of Nevada. Rail service offers the opportunity to reduce transportation risks and costs, according to the Waste Management Programmatic Environmental Impact Statement (WM-PEIS). However, NTS and some DOE LLW generator sites are not served with direct rail service so intermodal transport is under consideration. Intermodal transport involves transport via two modes, in this case truck and rail, from the generator sites to NTS. LLW shipping containers would be transferred between trucks and railcars at intermodal transfer points near the LLW generator sites, NTS, or both. An Environmental Assessment (EA)for Intermodal Transportation of Low-Level Radioactive Waste to the Nevada Test Site (referred to as the NTSIntermodal -M) has been prepared to determine whether there are environmental impacts to alterations to the current truck routing or use of intermodal facilities within the State of Nevada. However, an analysis of the potential impacts outside the State of Nevada are not addressed in the NTS Intermodal EA. This study examines the rest of the transportation network between LLW generator sites and the NTS and evaluates the costs, risks, and feasibility of integrating intermodal shipments into the LLW transportation system. This study evaluates alternative transportation system configurations for NTS approved and potential generators based on complex-wide LLW load information. Technical judgments relative to the availability of DOE LLW generators to ship from their sites by rail were developed. Public and worker risk and life-cycle cost components are quantified. The study identifies and evaluates alternative scenarios that increase the use of rail (intermodal

  6. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  7. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  8. Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.

    SciTech Connect (OSTI)

    Clem, John; Urias, Vincent; Atkins, William Dee; Symonds, Christopher J.

    2015-12-08

    Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. Environmental Protection, Safety, and Health Protection Program for DOE Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1981-08-13

    This Order establishes the Environmental Protection, Safety. and Health Protection Program for Department of Energy (DOE) operations. Cancels DOE 5480.1, dated 5-5-1980, its chapters are not canceled. Canceled by DOE O 5480.1B

  11. Protecting FWP Participant Personally Identifiable Information/Protected

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Health Information | Department of Energy Protecting FWP Participant Personally Identifiable Information/Protected Health Information Protecting FWP Participant Personally Identifiable Information/Protected Health Information The confidentiality and privacy rights of former workers are not only a legal requirement, they are crucial to establishing and maintaining credibility with the former worker community. All medical information that is collected as part of this program is treated as

  12. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  13. Fire Protection Account Request Form

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fire Protection System Account Request Form To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to...

  14. Protection of the Groundwater Resource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection of the Groundwater Resource Protection of the Groundwater Resource Monitoring wells act as sentinels between suspected LANL contamination and the water supply. August 1, 2013 Where to place a sentinel well Where

  15. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  16. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  17. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  18. Los Alamos Lab: Radiation Protection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CONTACTS Division Leader Shawna Eisele Office Administrator Shirley D. Martinez Senior Advisor Paul Hoover Special Assistant and Issues Management Coordinator Elinor Gwynn Radiation Protection Radiation Protection The Radiation Protection Division supports the Laboratory in accomplishing its mission by helping to ensure radiological work is conducted safely and within requirements established by Occupational Radiation Protection (10 CFR 835) and enforced under the Price Anderson Amendments Act.

  19. "Protecting Public Health through Biosecurity"

    SciTech Connect (OSTI)

    Seiders, Barbara AB; Campbell, James R.

    2006-03-04

    "Protecting Public Health through Biosecurity" is an article writen for the Tri-City Herald newspaper special Progress Edition.

  20. Notices ENVIRONMENTAL PROTECTION AGENCY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41 Federal Register / Vol. 80, No. 243 / Friday, December 18, 2015 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9024-5] Environmental Impact Statements; Notice of Availability Responsible Agency: Office of Federal Activities, General Information (202) 564-7146 or http://www2.epa.gov/nepa. Weekly receipt of Environmental Impact Statements Filed 12/07/2015 Through 12/11/2015 Pursuant to 40 CFR 1506.9. Notice Section 309(a) of the Clean Air Act requires that EPA make public its comments on

  1. Designing radiation protection signs

    SciTech Connect (OSTI)

    Rodriguez, M.A.; Richey, C.L.

    1995-03-01

    Entry into hazardous areas without the proper protective equipment is extremely dangerous and must be prevented whenever possible. Current postings of radiological hazards at the Rocky Flats Environmental Technology Site (RFETS) do not incorporate recent findings concerning effective warning presentation. Warning information should be highly visible, quickly, and easily understood. While continuing to comply with industry standards (e.g., Department of Energy (DOE) guidelines), these findings can be incorporated into existing radiological sign design, making them more effective in terms of usability and compliance. Suggestions are provided for designing more effective postings within stated guidelines.

  2. Hearing protection for miners

    SciTech Connect (OSTI)

    Schulz, T.

    2008-10-15

    A NIOSH analysis showed that at age 50 approximately 90% of coal miners have a hearing impairment, yet noise included hearing loss is 100% preventable. The article discusses requirements of the MSHA regulations, 30 CFR Part 62 - occupational noise exposure (2000) and a 2008-MSHA document describing technologically achievable and promising controls for several types of mining machinery. Hearing protection is still required for exposure to greater than 90 dBA. These are now commercially available ways to determine how much attenuation an individual gets from a given hearing protector, known as 'fit testing'. 3 refs., 1 fig., 1 tab., 1 photo.

  3. Environmental Protection Agency

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ulllicu 3idica Environmental Protection Agency riivirrjlriiiciliar rVruillivitlr~ Systems Laboratory P.O. Box 93478 Las Vegas NV 89193-3478 ctr\/ O",, +-05, " 63 -EOE/DP/00539-061 May 1989 Research and Development . GEPA Off-Site Environmental Monitoring Report Radiation Monitoring Around United. States Nuclear Test Areas, Calendar Year 1988 EPA-600/4-891019 DOE/DP/00539-061 May 1989 Off-Site Environmental Monitoring Report Radiation Monitoring Around United'States Nuclear Test Areas,

  4. RHIC prefire protection masks

    SciTech Connect (OSTI)

    Drees, A.; Biscardi, C.; Curcio, T.; Gassner, D.; DeSanto, L.; Fu, W.; Liaw, C. J.; Montag, C.; Thieberger, P.; Yip, K.

    2015-01-07

    The protection of the RHIC experimental detectors from damage due to beam hitting close upstream elements in cases of abort kicker prefires requires some dedicated precautionary measures with two general options: to bring the beam close to a limiting aperture (i.e. the beam pipe wall), as far upstream of the detector components as possible or, alternatively, to bring a limiting aperture close to the circulating beam. Spontaneous and random prefires of abort kicker modules (Pulse Forming Network, PFN) have a history as long as RHIC is being operated. The abort system consist of 5 kickers in per ring, each of them equipped with its own dedicated PFN.

  5. Environmental Protection Division (ENV)

    National Nuclear Security Administration (NNSA)

    e~Alamos NATIONAL LABORATORY - - l :il . l! IIJ - - Environmental Protection Division (ENV) Environmental Stewardship (ENV-ES) P.O. Box 1663, Mail Stop J978 Los Alamos, New Mexico 87545 (505) 665-8855/FAX: (505) 667-0731 Mr. George Rael Assistant Manager for Enviromnental Operations National Nuclear Security Administration Los Alamos Site Office, MS A316 Date : October 28, 2010 Refer To: ENV-ES: 10-211 SUBJECT: 2008 SITE-WIDE ENVIRONMENTAL IMP ACT STATEMENT MITIGATION ACTION PLAN ANNUAL REPORT

  6. Advanced protective coatings for gas turbine blading

    SciTech Connect (OSTI)

    Czech, N.; Stamm, W.

    1998-07-01

    The new gas turbines now being marketed are characterized by outputs and efficiencies which were unthinkable just a few years ago. A key factor for achieving efficiency is the highest possible turbine inlet temperature, currently approx. 1,400 C. In such a machine, it is the turbine blades which are subjected to the greatest thermal and mechanical stresses. They are also subjected to extreme chemical stress in the form of oxidation, which in the following is understood as the corrosive action due almost exclusively to the temperature of the turbine blade surface and (to a much lesser degree) the pressure and oxygen content of the hot gas. In many cases, this is compounded by hot corrosion, which results in accelerated oxidation due to impurities in the fuel and air. In terms of physics, this demanding challenge requires the use of cooling techniques which push the envelope of feasibility. In terms of materials engineering, an innovative multifaceted solution is called for. In more concrete terms, this means a combination of convection, impingement and film cooling of blades made of the strongest high-temperature alloy materials and coated with one or possibly multiple coatings. The base material ensures the blade's mechanical integrity while the coating(s) provide(s) protection against the oxidizing and corrosive attack, as well as the thermal stresses which cannot be sufficiently mitigated by cooling. The superiority of single crystal materials over polycrystalline or directionally solidified nickel-base superalloys is illustrated. The coating is a third-generation NiCoCrAIY VPS (vacuum plasma spray) coating. In the paper, the authors discuss the current status of coating developments for large, stationary gas turbines and present solutions for achieving important development objectives.

  7. Protection of Human Research Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-17

    The Order establishes DOE-specific policy and principles for the protection of human subjects involved in DOE research, and DOE procedures and responsibilities for implementing the policy and requirements set forth in Title 45 Code of Federal Regulations (CFR) Part 46, Protection of Human Subjects, and 10 CFR Part 745, Protection of Human Subjects. Supersedes DOE O 443.1B.

  8. Title: The Life-cycle

    Office of Scientific and Technical Information (OSTI)

    ... Eisenberg,D. (2003) Inference of protein function and protein linkages in mycobacterium tuberculosis based on prokaryotic genome orga- nization: a combined computational approach. ...

  9. IMPERMEABLE THIN Al{sub 2}O{sub 3} OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-06-30

    In order to further improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay of 58 {micro}m thick was deposited on the surface of YSZ by electron-beam physical vapor deposition. Hot corrosion tests were performed on the YSZ coatings with {gamma}-Al{sub 2}O{sub 3} overlay and {alpha}-Al{sub 2}O{sub 3} overlay in molten salt mixture (Na2SO4 + 5wt%V2O5) at 950 C. The {alpha}-Al{sub 2}O{sub 3} overlay was obtained by the post-annealing of g-Al{sub 2}O{sub 3} overlay at 1200 C for 1h. The results showed that compared with the hot corrosion resistance of YSZ coating with 25 {micro}m thick {gamma}-Al{sub 2}O{sub 3} overlay, either thickening {gamma}-Al{sub 2}O{sub 3} overlay or employing {alpha}-Al{sub 2}O{sub 3} overlay could impair the hot corrosion resistance of YSZ coating, because the tensile stresses developed in the alumina overlay in both cases due to the mismatch in thermal expansion coefficient (TEC) between alumina and zirconia resulted in cracking of Al{sub 2}O{sub 3} overlay. The formation of cracks increased contact area between molten salt and Al{sub 2}O{sub 3} overlay, and also the penetration rate of molten salt into Al{sub 2}O{sub 3} overlay and YSZ coating, leading a faster and greater degradation of YSZ coating upon exposure. In the next reporting period, we will study the effect of Al{sub 2}O{sub 3} overlay thickness on hot corrosion and spalling of YSZ coatings.

  10. IMPERMEABLE THIN Al{sub 2}O{sub 3} OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-03-31

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray, respectively, onto to the surface of YSZ coating. In the next reporting period, we will measure or calculate the residue stress within Al{sub 2}O{sub 3} overlay and YSZ coating to study the mechanism of effect of Al{sub 2}O{sub 3} overlay on spalling of YSZ coating. However, due to the thermal expansion mismatch between YSZ coating and Al{sub 2}O{sub 3} overlay, such surface modification using Al{sub 2}O{sub 3} overlay might deteriorate strain tolerance of the TBC. In the present work, in order to investigate the effect of Al{sub 2}O{sub 3} overlay on residual stress developed in the samples during cooling after hot corrosion at high temperature, Finite Element method (FEM) was employed to determine the detailed stress states in the test specimens after cooling. The results showed that there is no high stress concentration at the interface between the YSZ and the bond coat for TBCs system without Al{sub 2}O{sub 3} overlay. On the other hand, the maximum compressive stress with a value of approximately, -330 MPa occurred within the Al{sub 2}O{sub 3} overlay. The maximum tensile stress in YSZ coat near the Al{sub 2}O{sub 3} overlay is in the range of 10-133 MPa. The maximum compressive stress of approximately -160 MPa occurred near the YSZ-bond coat interface. X axis stress play a dominant role in influencing the coating failure and spalling. In the next reporting period, we will study the thickness of Al{sub 2}O{sub 3} overlay on hot corrosion resistance and spalling of YSZ coating.

  11. Regioselectivity of radical attacks on substituted olefins. Application of the SCD model

    SciTech Connect (OSTI)

    Shaik, S.S. ); Canadell, E. )

    1990-02-14

    The SCD model is used to derive regiochemical trends in radical addition to olefins. Regiochemistry is discussed by appeal to two fundamental properties of the radical and the olefin. The first factor is the relative spin density in the {sup 3}{pi}{pi}* state of the olefin. Thus, radical attack is directed toward the olefinic carbon which possesses the highest spin density. The second factor is the relative bond strengths of the radical to the olefinic carbons. This factor directs the regiochemistry toward the olefinic terminus which forms the strongest bond with the radical. When the two effects join up, regioselectivity will be large, e.g., for CH{sub 2}=CHX (X = NR{sub 2}, CR, Cl, CN, Ph). When the two effects oppose one another, regioselectivity will be smaller, and regioselectivity crossovers are expected, e.g., for CF{sub 2}=CHF. The normal regiochemistry is shown to coincide with the spin density rule which makes identical predictions to the HOMO rule.

  12. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other

  13. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  14. Economical wind protection - underground

    SciTech Connect (OSTI)

    Kiesling, E.W.

    1980-01-01

    Earth-sheltered buildings inherently posess near-absolute occupant protection from severe winds. They should sustain no structural damage and only minimal facial damage. Assuming that the lower-hazard risk attendant to this type of construction results in reduced insurance-premium rates, the owner accrues economic benefits from the time of construction. Improvements to aboveground buildings, in contrast, may not yield early economic benefits in spite of a favorable benefit-to-cost ratio. This, in addition to sensitivity to initial costs, traditionalism in residential construction, and lack of professional input to design, impede the widespread use of underground improvements and the subsequent economic losses from severe winds. Going underground could reverse the trend. 7 references.

  15. Thermal protection apparatus

    DOE Patents [OSTI]

    Bennett, Gloria A.; Moore, Troy K.

    1988-01-01

    An apparatus for thermally protecting heat sensitive components of tools. The apparatus comprises a Dewar for holding the heat sensitive components. The Dewar has spaced-apart inside and outside walls, an open top end and a bottom end. An insulating plug is located in the top end. The inside wall has portions defining an inside wall aperture located at the bottom of the Dewar and the outside wall has portions defining an outside wall aperture located at the bottom of the Dewar. A bottom connector has inside and outside components. The inside component sealably engages the inside wall aperture and the outside component sealably engages the outside wall aperture. The inside component is operatively connected to the heat sensitive components and to the outside component. The connections can be made with optical fibers or with electrically conducting wires.

  16. ELECTRICAL PROTECTIVE DEVICE

    DOE Patents [OSTI]

    Baker, W.R.

    1958-05-01

    A protective system for high-energy resonant cavities is described. It is particularly directed to the discharging of resonant cavities for preventing energy back flow through associated equipment as a result of faults. The invention in general provides means defining a spark gap communicating with the interior of a cavity or waveguide adapted for high-power energization or an evacuated chamber containing an electrode having a large power differential from the wall or other electrode. A control or trigger circuit is connected between a power supply energizing the cavity and the spark gap whereby reverse current flow in the power supply circuit instantaneously triggers the spark gap to initiate discharge within the cavity, whereupon cavity energy discharges across the gap, or with an electrode present the electrode discharges to one of the spark gap elements.

  17. Office of River Protection - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of River Protection Office of River Protection About ORP ORP Projects & Facilities Newsroom Contracts & Procurements Contact ORP Office of River Protection Email Email Page...

  18. Voluntary Protection Program Onsite Review, Washington River...

    Energy Savers [EERE]

    Washington River Protection Solutions, LLC, Hanford - Feb 2014 Voluntary Protection Program Onsite Review, Washington River Protection Solutions, LLC, Hanford - Feb 2014 February...

  19. Protection Program Operations - DOE Directives, Delegations,...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3.3, Protection Program Operations by jcronin Functional areas: Physical Protection, Protective Force, Safeguards, Security, and Emergency Management The Order establishes...

  20. Protections: Sediment Control = Contaminant Retention

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sediment Control Protections: Sediment Control = Contaminant Retention LANL maintains hundreds of wells, stream sampling stations and stormwater control structures to protect waters. August 1, 2013 Los Alamos Canyon weir Los Alamos Canyon weir thumbnail of Protection #2: Trap and Remove Sediment Sediment behind LA Canyon weir is sampled and excavated regularly. As of 2012, no sediment required disposal as hazardous or radioactive waste. RELATED IMAGES

  1. Environmental Protection: Controlling the Present

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection Environmental Protection: Controlling the Present The Laboratory is committed to increasing sustainable practices and complying with environmental regulations. What We Monitor & Why» Cultural Preservation» Taking Care of our Trails» Obeying Environmental Laws» Protecting Wildlife» Feature Stories» TOP STORIES - highlights of our science, people, technologies close Los Alamos National Laboratory begins pumping tests on chromium plume The chromium originated from cooling

  2. Protective link for superconducting coil

    DOE Patents [OSTI]

    Umans, Stephen D.

    2009-12-08

    A superconducting coil system includes a superconducting coil and a protective link of superconducting material coupled to the superconducting coil. A rotating machine includes first and second coils and a protective link of superconducting material. The second coil is operable to rotate with respect to the first coil. One of the first and second coils is a superconducting coil. The protective link is coupled to the superconducting coil.

  3. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Environmental Management (EM)

    A local user can conduct password guessing attacks. IMPACT: A remote user can access the ... A local user can can conduct brute force password guessing attacks without limits. ...

  4. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  5. Intergranular attack of alloy 600: Simulation and remedial action tests: Final report

    SciTech Connect (OSTI)

    Daret, J.; Feron, D.

    1989-02-01

    The intergranular attack (IGA) that affects alloy 600 tubes in the tube sheet crevices of PWR steam generators is hard to simulate in laboratory studies. For this study, a special apparatus was designed with a range of representative materials, mechanical conditions and geometry. The design also took account of sludge piles, thermal fluxes and water chemistry. During a first series of seven model boiler tests, chemical parameters and test procedures were adjusted to finally obtain a field prototypical degradation of tubing over a significant length within the tube sheet crevice for the case of caustic pollution. IGA was not produced for the river water in-leakage case. A second series of model boiler tests also showed the possibility of producing a representative IGA by initially filling the tube sheet crevices with concentrated caustic solutions. A third series of five model boiler tests aimed at studying in the effectiveness of remedial actions on either virgin of IGA affected tubing. Tube sheet crevice flushing operations using the natural circulation procedure showed a poor efficiency for moving concentrated contaminants, but they succeeded in forcing chemicals additives (acetic acid or boric acid) within the non-occluded portions of crevices. This off-line treatment resulted in a reduction in the progression rate of the pre-existing IGA by a factor of 2 to 3. Simulation of this treatment on virgin material showed that this result was obtained because acetate or borate shifted the cation-to-anion equivalent ratio to well under one. However this off-line treatment could not prevent the occurrence of intergranular stress corrosion cracking (IGSCC) near the top of crevices, since caustic continued to hideout under full power operation. The best remedial action consisted of a combination of off-line and on-line boric acid treatment. IGSCC was prevented both on virgin and IGA affected tubes. 3 figs., 3 tabs.

  6. What waters does LANL protect?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    does LANL protect? Google Earth Tour: Waters around LANL Jemez Mountains Headwaters Watersheds The Rio Grande Buckman Direct Diversion Project Groundwater in the Regional Aquifer...

  7. EO 13158: Marine Protected Areas

    Broader source: Energy.gov [DOE]

    This Executive Order will help protect the significant natural and cultural resources within the marine environment for the benefit of present and future generations by strengthening and expanding...

  8. Protections: Sediment Control = Contaminant Retention

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANL maintains hundreds of wells, stream sampling stations and stormwater control ... Protection 2: Trap and Remove Sediment Stormwater Controls The Individual Permit for ...

  9. Classified Matter Protection and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-26

    Provides detailed requirements to supplement DOE O 471.2, which establishes policy for the protection and control of classified and unclassified information. Does not cancel other directives.

  10. CEBAF - environmental protection program plan

    SciTech Connect (OSTI)

    1995-10-01

    An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan.

  11. What waters does LANL protect?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    What waters does LANL protect? What waters does LANL protect? Rainfall in the Jemez Mountains flows to the Valles Caldera and eastward onto Laboratory lands. August 1, 2013 Reflection in the Valles Caldera RELATED IMAGES http://farm8.staticflickr.com/7252/7599998130_b7aef738b9_t.jpg Enlarge http://farm9.staticflickr.com/8421/7600000986_ebf8889fc7_t.jpg Enlarge Clean the Past: Water Protection What waters does LANL protect? Google Earth Tour: Waters around LANL Jemez Mountains Headwaters

  12. ORISE: Protecting Human Subjects Website

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Human Subjects Website Institutions that engage in human subjects research are required by federal policy to establish an institutional review board (IRB) to ensure that ...

  13. Audit of the management and cost of the Department of Energy`s protective forces

    SciTech Connect (OSTI)

    Not Available

    1994-07-01

    The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in full production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.

  14. EPA's groundwater protection strategy

    SciTech Connect (OSTI)

    Smith, J. )

    1992-06-01

    What the EPA, working jointly with the states, hopes to accomplish over the next ten years in order to integrate and coordinate all the groundwater programs within the agency is discussed. Although many other EPA programs such as Superfund, Clean Air Act, and Wetlands Management are often highlighted in the media, EPA does not down rate the importance of groundwater protection. Indeed as a resource, it is one of the most important commodities. Groundwater is the basis for life in this country. Recharge rates are no where near what the withdrawal rates are in many areas of the country. Twenty-five percent of all the potable water comes from groundwater. Groundwater supplies 50 percent of the needs for all the US population. If you include strictly rural areas, it supplies 95 percent of all the use. Something that most people who are not groundwater hydrologists would not think about is the fact that groundwater is a recharge mechanism that provides over 30 percent of the flow in streams and major rivers.

  15. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  16. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  17. Beijing Hualianda Environmental Protection Energy Technology...

    Open Energy Info (EERE)

    Hualianda Environmental Protection Energy Technology Development Co Ltd Jump to: navigation, search Name: Beijing Hualianda Environmental Protection Energy Technology Development...

  18. Shanxi Taiyuan Zihuan Environmental Protection Technology | Open...

    Open Energy Info (EERE)

    Taiyuan Zihuan Environmental Protection Technology Jump to: navigation, search Name: Shanxi Taiyuan Zihuan Environmental Protection Technology Place: Taiyuan City, Shaanxi...

  19. Material Protection, Control, & Accounting | National Nuclear...

    National Nuclear Security Administration (NNSA)

    Nonproliferation Nuclear and Radiological Material Security Material Protection, Control, & Accounting Material Protection, Control, & Accounting NNSA implements material...

  20. Voluntary Protection programs Participants' Association - Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protection Programs Participants' Association (VPPPA) Presentations: Star Track Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Wellness Programs

  1. Combined group ECC protection and subgroup parity protection

    DOE Patents [OSTI]

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  2. Combined group ECC protection and subgroup parity protection

    DOE Patents [OSTI]

    Gara, Alan; Cheng, Dong; Heidelberger, Philip; Ohmacht, Martin

    2016-02-02

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  3. Adaptive protection algorithm and system

    DOE Patents [OSTI]

    Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  4. Corrosion protection for silver reflectors

    DOE Patents [OSTI]

    Arendt, Paul N.; Scott, Marion L.

    1991-12-31

    A method of protecting silver reflectors from damage caused by contact with gaseous substances which are often present in the atmosphere and a silver reflector which is so protected. The inventive method comprises at least partially coating a reflector with a metal oxide such as aluminum oxide to a thickness of 15 .ANG. or less.

  5. Fire protection for relocatable structures

    SciTech Connect (OSTI)

    1995-06-01

    This standard supersedes DOE/EV-0043, ``Standard on Fire Protection for Portable Structures.`` It was revised to address the numerous types of relocatable structures, such as trailers, tension-supported structures, and tents being used by DOE and contractors.

  6. Model Fire Protection Assessment Guide

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Assessment guide covers the implementation of the DOE's responsibility of assuring that DOE and the DOE Contractors have established Fire Protection Programs that are at the level required for the area being assessed.

  7. Physical Protection of Classified Matter

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    The order establishes policy and objectives for physical protection of classified matter. This directive does not cancel another directive. Chg 1, 7-30-93. Canceled by 5632.1C.

  8. CRAD, NNSA- Fire Protection (FP)

    Office of Energy Efficiency and Renewable Energy (EERE)

    CRAD for Fire Protection (FR). Criteria Review and Approach Documents (CRADs) that can be used to conduct a well-organized and thorough assessment of elements of safety and health programs.

  9. ORISE: Protecting Human Subjects Website

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Human Subjects Website Institutions that engage in human subjects research are required by federal policy to establish an institutional review board (IRB) to ensure that risks to human subjects in research are minimal and to provide protection with respect to the rights and welfare of research subjects. The Oak Ridge Institute for Science and Education (ORISE) administers the Oak Ridge Sitewide Institutional Review Board (ORSIRB) and manages the ORISE Human Subjects website. The

  10. Radiological Protection for DOE Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-29

    Establishes radiological protection program requirements that, combined with 10 CFR 835 and its associated implementation guidance, form the basis for a comprehensive program for protection of individuals from the hazards of ionizing radiation in controlled areas. Extended by DOE N 441.3. Cancels DOE 5480.11, DOE 5480.15, DOE N 5400.13, DOE N 5480.11; please note: the DOE radiological control manual (DOE/EH-0256T)

  11. LANL installs additional protective measures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab completes additional protections LANL installs additional protective measures Work crews completed additional flood and erosion-control measures this week to reduce the environmental effects of any flash floods following the Las Conchas Fire. July 20, 2011 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma

  12. Radiation Protection | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Radiation Protection of the Public and the Environment Radiation Protection of the Public and the Environment Water sampling and analysis at Idaho National Lab Water sampling and analysis at Idaho National Lab Idaho National Lab(INL) in partnership with the US Geological Service(USGS) sample, collect and analyze data in order to ensure that exposure to the public and the environment within and around the INL Complex are below the required authorized limits set by DOE. Read more

  13. Protection Program Operations (11-18-10)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-11-18

    This new Order will combine the current requirements of DOE Manuals 470.4-2A, Physical Protection; M 470.4-3A, Protective Force; and 470.4-8, Federal Protective Force, into a single consolidated, streamlined Order.

  14. PROTECT: Enhanced Technology to Protect Against Chemical and Biological

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terrorism - Energy Innovation Portal Energy Analysis Energy Analysis Find More Like This Return to Search PROTECT: Enhanced Technology to Protect Against Chemical and Biological Terrorism Argonne National Laboratory Contact ANL About This Technology <p class="Default" style="margin: 4pt 0in 2pt; line-height: 8.05pt;"> <i><span style="color: windowtext; font-family: &quot;Franklin Gothic Medium&quot;,&quot;sans-serif&quot;; font-size:

  15. Washington River Protection Solutions - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection Solutions, LLC logo The operation of maintaining the underground waste storage tanks at Hanford falls under the jurisdiction of Washington River Protection...

  16. Radiation Protection and Safety Training | Environmental Radiation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation Protection and Safety Training (3 hrs) Instructors: John Seaman and Neil Miller ... with an introduction to the fundamentals of ionizing radiation protection and safety. ...

  17. Degradation Mechanisms and Development of Protective Coatings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mechanisms and Development of Protective Coatings for TES and HTF Containment Materials Degradation Mechanisms and Development of Protective Coatings for TES and HTF Containment ...

  18. Archaeological Resources Protection Act | Open Energy Information

    Open Energy Info (EERE)

    Resources Protection Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Archaeological Resources Protection ActLegal...

  19. Archaeological Resources Protection Act | Open Energy Information

    Open Energy Info (EERE)

    Resource Protection Act) Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Archaeological Resources Protection ActLegal...

  20. 10 CFR 835- Occupational Radiation Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    The rules in this part establish radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of DOE activities.

  1. Protection #2: Trap and Remove Sediment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Trap and Remove Sediment Protection 2: Trap and Remove Sediment The 3 Protections Defense in Depth August 1, 2013 Sediment behind LA Canyon weir is sampled and excavated...

  2. Hitec Power Protection | Open Energy Information

    Open Energy Info (EERE)

    search Name: Hitec Power Protection Place: Almelo, Netherlands Zip: 7602 Product: UPS flywheel systems. References: Hitec Power Protection1 This article is a stub. You can help...

  3. Environmental Protection Agency: Handbook for Developing Watershed...

    Open Energy Info (EERE)

    Environmental Protection Agency: Handbook for Developing Watershed Plans to Restore and Protect Our Waters Jump to: navigation, search OpenEI Reference LibraryAdd to library...

  4. California Environmental Protection Agency | Open Energy Information

    Open Energy Info (EERE)

    Agency Jump to: navigation, search Logo: California Environmental Protection Agency Name: California Environmental Protection Agency Address: 1001 I Street, PO Box 2815 Place:...

  5. Nationwide: National Fire Protection Association Provides Training...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Fire Protection Association Provides Training to First Responders on EVsPEVs Nationwide: National Fire Protection Association Provides Training to First Responders on...

  6. Nationwide: National Fire Protection Association Provides Training...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nationwide: National Fire Protection Association Provides Training to First Responders on EVsPEVs Nationwide: National Fire Protection Association Provides Training to First...

  7. Voluntary Protection Program Onsite Review, Bechtel National...

    Office of Environmental Management (EM)

    Review, Waste Treatment Project - May 2006 Voluntary Protection Program Onsite Review, Waste Treatment Plant Construction Project - June 2010 Voluntary Protection Program Onsite...

  8. Shanghai Green Environmental Protection Energy Company Ltd |...

    Open Energy Info (EERE)

    Green Environmental Protection Energy Company Ltd Jump to: navigation, search Name: Shanghai Green Environmental Protection Energy Company Ltd Place: Shanghai, Shanghai...

  9. Nanocomposite protective coatings for battery anodes (Patent...

    Office of Scientific and Technical Information (OSTI)

    Nanocomposite protective coatings for battery anodes Title: Nanocomposite protective ... USDOE Country of Publication: United States Language: English Subject: 25 ENERGY STORAGE

  10. Sinosteel Tiancheng Environmental Protection Science and Technology...

    Open Energy Info (EERE)

    Environmental Protection Science and Technology Co Ltd Jump to: navigation, search Name: Sinosteel Tiancheng Environmental Protection Science and Technology Co Ltd Place: Wuhan,...

  11. Fire Protection Engineering Functional Area Qualification Standard...

    Broader source: Energy.gov (indexed) [DOE]

    ... Fire Safety Program" + + + + DOE-STD-1066-99, "Fire Protection Design Criteria" + + + + ... Identify the applicable National Fire Protection Association (NFPA) Code or Standard. c. ...

  12. Voluntary Protection Program - Related Links | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - Related Links Voluntary Protection Program - Related Links VPPPA - The Voluntary Protection Programs Participants' Association, a non- profit organization is leading the way in ...

  13. Physical Protection - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2A, Physical Protection by jcronin Functional areas: Security, This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys...

  14. Voluntary Protection Program Manuals | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manuals Voluntary Protection Program Manuals Voluntary Protection Program Manual U.S. Department Of Energy Approval Memo Issuing Revised VPP Program Documents (May 2012) Part I: ...

  15. 1993 Radiation Protection Workshop: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-12-31

    The 1993 DOE Radiation Protection Workshop was conducted from April 13 through 15, 1993 in Las Vegas, Nevada. Over 400 Department of Energy Headquarters and Field personnel and contractors from the DOE radiological protection community attended the Workshop. Forty-nine papers were presented in eleven separate sessions: Radiological Control Manual Implementation, New Approaches to Instrumentation and Calibration, Radiological Training Programs and Initiatives, External Dosimetry, Internal Dosimetry, Radiation Exposure Reporting and Recordkeeping, Air Sampling and Monitoring Issues, Decontamination and Decommissioning of Sites, Contamination Monitoring and Control, ALARA/Radiological Engineering, and Current and Future Health Physics Research. Individual papers are indexed separately on the database.

  16. Protection #1: Remove the Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remove the Source Protection #1: Remove the Source The 3 Protections = Defense in Depth August 1, 2013 Waste being removed from MDA-B inside a metal building Excavation of waste from MDA-B thumbnail of Removing the source means excavating contaminants, sorting these by waste type, and transporting to a disposal area in which contaminants are contained. RELATED IMAGES http://farm8.staticflickr.com/7388/9571274521_679fe1e34a_t.jpg Enlarge http://farm4.staticflickr.com/3726/9571272211_6873a5717f

  17. PERFLUOROCARBON GAS TRACER STUDIES TO SUPPORT RISK ASSESSMENT MODELING OF CRITICAL INFRASTRUCTURE SUBJECTED TO TERRORIST ATTACKS.

    SciTech Connect (OSTI)

    SULLIVAN, T.M.; HEISER, J.; WATSON, T.; ALLWINE, K.J.; FLAHERTY, J.E.

    2006-05-06

    Development of real-time predictive modeling to identify the dispersion and/or source(s) of airborne weapons of mass destruction including chemical, biological, radiological, and nuclear material in urban environments is needed to improve response to potential releases of these materials via either terrorist or accidental means. These models will also prove useful in defining airborne pollution dispersion in urban environments for pollution management/abatement programs. Predicting gas flow in an urban setting on a scale of less than a few kilometers is a complicated and challenging task due to the irregular flow paths that occur along streets and alleys and around buildings of different sizes and shapes, i.e., ''urban canyons''. In addition, air exchange between the outside and buildings and subway areas further complicate the situation. Transport models that are used to predict dispersion of WMD/CBRN materials or to back track the source of the release require high-density data and need defensible parameterizations of urban processes. Errors in the data or any of the parameter inputs or assumptions will lead to misidentification of the airborne spread or source release location(s). The need for these models to provide output in a real-time fashion if they are to be useful for emergency response provides another challenge. To improve the ability of New York City's (NYC's) emergency management teams and first response personnel to protect the public during releases of hazardous materials, the New York City Urban Dispersion Program (UDP) has been initiated. This is a four year research program being conducted from 2004 through 2007. This paper will discuss ground level and subway Perfluorocarbon tracer (PFT) release studies conducted in New York City. The studies released multiple tracers to study ground level and vertical transport of contaminants. This paper will discuss the results from these tests and how these results can be used for improving transport models

  18. Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

    SciTech Connect (OSTI)

    Ramsey, Benjamin W.; Stubbs, Tyler D.; Mullins, Barry E.; Temple, Michael A.; Buckner, Mark A.

    2015-12-11

    We report that low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against replay and spoofing attacks. However, radio frequency (RF) fingerprinting typically uses expensive signal collection systems; this is because fingerprinting wireless devices with low-cost receivers has been reported to have inconsistent accuracy. In conclusion, this paper demonstrates a robust radio frequency fingerprinting process that is consistently accurate with both high-end and low-cost receivers. Indeed, the results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.154-based infrastructure networks such as ZigBee.

  19. Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ramsey, Benjamin W.; Stubbs, Tyler D.; Mullins, Barry E.; Temple, Michael A.; Buckner, Mark A.

    2015-12-11

    We report that low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against replay and spoofing attacks. However, radio frequency (RF) fingerprinting typically uses expensive signal collection systems; this is because fingerprinting wireless devices with low-cost receivers has been reported to have inconsistent accuracy. In conclusion, this paper demonstrates a robust radio frequencymore » fingerprinting process that is consistently accurate with both high-end and low-cost receivers. Indeed, the results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.154-based infrastructure networks such as ZigBee.« less

  20. Facility Targeting, Protection and Mission Decision Making Using the VISAC Code

    SciTech Connect (OSTI)

    Morris, Robert Howard; Sulfredge, Charles David

    2011-01-01

    The Visual Interactive Site Analysis Code (VISAC) is a Java-based graphical expert system developed by ORNL for the Defense Threat Reduction Agency, Nuclear Regulatory Commission (NRC) and other sponsors to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terroist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. used in conunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.

  1. Hanford Site Voluntary Protection Program - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hanford Site Voluntary Protection Program Hanford Site Voluntary Protection Program Hanford Site Voluntary Protection Program VPP Home VPP Hanford Site Champions Committee Getting Started Maintaining STAR VPP Communications VPP Conferences Hanford Site Voluntary Protection Program Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size 2013 VPPPA Outreach Award Winners VPP Committee Business Case (PDF)

  2. Whistleblower Protection and Nondisclosure Agreements | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Whistleblower Protection and Nondisclosure Agreements Whistleblower Protection and Nondisclosure Agreements Important Notice Concerning Nondisclosure Acknowledgments or Agreements (NDAs) with the Department of Energy: Whistleblower Protection Enhancement Act of 2012 Required Statement Regarding Nondisclosure Agreements: Pursuant to the Whistleblower Protection Enhancement Act of 2012, the following statement applies to every nondisclosure policy, form, or agreement of the Government

  3. 2009 Voluntary Protection Programs Participants' Association (VPPPA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation: How to communicate | Department of Energy Presentation: How to communicate 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: How to communicate 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: How to communicate 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: How to communicate (7.97 MB) More Documents & Publications 2009 Voluntary Protection Programs Participants'

  4. 2009 Voluntary Protection Programs Participants' Association (VPPPA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentations: Star Track | Department of Energy Presentations: Star Track 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentations: Star Track 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentations: Star Track 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentations: Star Track (5.63 MB) More Documents & Publications 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: How to

  5. Voluntary Protection Programs Participants' Association (VPPPA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation: KCSO VPP Process | Department of Energy Programs Participants' Association (VPPPA) Presentation: KCSO VPP Process Voluntary Protection Programs Participants' Association (VPPPA) Presentation: KCSO VPP Process Voluntary Protection Programs Participants' Association (VPPPA) Presentation: KCSO VPP Process Voluntary Protection Programs Participants' Association (VPPPA) Presentation: KCSO VPP Process (981.65 KB) More Documents & Publications 2009 Voluntary Protection Programs

  6. Protection #2: Trap and Remove Sediment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Trap and Remove Sediment Protection #2: Trap and Remove Sediment The 3 Protections = Defense in Depth August 1, 2013 Sediment behind LA Canyon weir is sampled and excavated regularly. As of 2012, no sediment required disposal as hazardous or radioactive waste. Sediment behind LA Canyon weir is sampled and excavated regularly. As of 2012, no sediment required disposal as hazardous or radioactive waste. The 3 Protections Protection #1: Remove the source of contamination Protection #2: Stabilize,

  7. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  8. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  9. Composite coatings for elevated temperature erosion-corrosion protection in fossil-fueled boilers

    SciTech Connect (OSTI)

    Verstak, A.; Wang, B.; Baranovski, V.; Beliaev, A.

    1998-12-31

    Fluidized bed combustors components suffer severe erosion, frequently accomplished by corrosive gases attack at elevated temperatures. The tubes damage rate depends on the boiler design bed constituents and combustion parameters, however an accelerated metal wastage is usually found in the same specific areas of different boilers. New HVOF sprayed coatings are developed for the tube erosion-corrosion protection, based on Cr{sub 2}C{sub 2}/Ni-Cr, Cr-Ti-C/Ni-Cr-Mo, and Al{sub 2}O{sub 3}/NiAl composite materials. The combustion arc Fe-Cr-C coatings were found as an economical solution for relatively low erosion rate zones. The coatings properties and behavior under simulated elevated temperature erosion conditions and in the operating boilers are discussed.

  10. Structurally efficient inflatable protective device

    DOE Patents [OSTI]

    Nelsen, J.M.; Whinery, L.D.; Gwinn, K.W.; McBride, D.D.; Luna, D.A.; Holder, J.P.; Bliton, R.J.

    1996-01-09

    An apparatus and method are disclosed for making a low cost, self-venting, inflatable protective cushion of simple and structurally efficient design with a shape and construction that optimizes the cushion`s ability to withstand inflation pressures and impact when deployed which includes a sheet defined by at least one fold line and a plurality of flap portions, each flap portion having a base edge corresponding to a fold line and at least two side edges each extending outwardly from a base edge and ultimately converging to meet each other, the flap portions being folded at the fold line(s) and being joined at corresponding side edges to define an inflatable chamber. The inflatable protective cushion and method for making same may further include a lightweight, low permeability, fabric that optimizes the cushion`s ability to withstand inflation pressures and impact when deployed and minimizes the packed volume of the cushion when stored. 22 figs.

  11. Structurally efficient inflatable protective device

    DOE Patents [OSTI]

    Nelsen, James M.; Whinery, Larry D.; Gwinn, Kenneth W.; McBride, Donald D.; Luna, Daniel A.; Holder, Joseph P.; Bliton, Richard J.

    1996-01-01

    An apparatus and method for making a low cost, self-venting, inflatable protective cushion of simple and structurally efficient design with a shape and construction that optimizes the cushion's ability to withstand inflation pressures and impact when deployed which includes a sheet defined by at least one fold line and a plurality of flap portions, each flap portion having a base edge corresponding to a fold line and at least two side edges each extending outwardly from a base edge and ultimately converging to meet each other, the flap portions being folded at the fold line(s) and being joined at corresponding side edges to define an inflatable chamber. The inflatable protective cushion and method for making same may further include a lightweight, low permeability, fabric that optimizes the cushion's ability to withstand inflation pressures and impact when deployed and minimizes the packed volume of the cushion when stored.

  12. Structurally efficient inflatable protective device

    DOE Patents [OSTI]

    Nelsen, J.M.; Whinery, L.D.; Gwinn, K.W.; McBride, D.D.; Luna, D.A.; Holder, J.P.; Bliton, R.J.

    1997-03-04

    An apparatus and method are disclosed for making a low cost, self-venting, inflatable protective cushion of simple and structurally efficient design with a shape and construction that optimizes the cushion`s ability to withstand inflation pressures and impact when deployed which includes a sheet defined by at least one fold line and a plurality of flap portions, each flap portion having a base edge corresponding to a fold line and at least two side edges each extending outwardly from a base edge and ultimately converging to meet each other, the flap portions being folded at the fold line(s) and being joined at corresponding side edges to define an inflatable chamber. The inflatable protective cushion and method for making same may further include a lightweight, low permeability, fabric that optimizes the cushion`s ability to withstand inflation pressures and impact when deployed and minimizes the packed volume of the cushion when stored. 22 figs.

  13. Structurally efficient inflatable protective device

    DOE Patents [OSTI]

    Nelsen, James M.; Whinery, Larry D.; Gwinn, Kenneth W.; McBride, Donald D.; Luna, Daniel A.; Holder, Joseph P.; Bliton, Richard J.

    1997-01-01

    An apparatus and method for making a low cost, self-venting, inflatable protective cushion of simple and structurally efficient design with a shape and construction that optimizes the cushion's ability to withstand inflation pressures and impact when deployed which includes a sheet defined by at least one fold line and a plurality of flap portions, each flap portion having a base edge corresponding to a fold line and at least two side edges each extending outwardly from a base edge and ultimately converging to meet each other, the flap portions being folded at the fold line(s) and being joined at corresponding side edges to define an inflatable chamber. The inflatable protective cushion and method for making same may further include a lightweight, low permeability, fabric that optimizes the cushion's ability to withstand inflation pressures and impact when deployed and minimizes the packed volume of the cushion when stored.

  14. Structurally efficient inflatable protective device

    DOE Patents [OSTI]

    Nelsen, James M.; Whinery, Larry D.; Gwinn, Kenneth W.; McBride, Donald D.; Luna, Daniel A.; Holder, Joseph P.; Bliton, Richard J.

    1996-01-01

    An apparatus and method for making a low cost, self-venting, inflatable protective cushion of simple and structurally efficient design with a shape and construction that optimizes the cushion's ability to withstand inflation pressures and impact when deployed which includes a sheet defined by at least one fold line and a plurality of flap portions, each flap portion having a base edge corresponding to a fold line and at least two side edges each extending outwardly from a base edge and ultimately converging to meet each other, the flap portions being folded at the fold line(s) and being Joined at corresponding side edges to define an inflatable chamber. The inflatable protective cushion and method for making same may further include a lightweight, low permeability, fabric that optimizes the cushion's ability to withstand inflation pressures and impact when deployed and minimizes the packed volume of the cushion when stored.

  15. Protective coatings for sensitive materials

    SciTech Connect (OSTI)

    Egert, C.M.

    1997-08-05

    An enhanced protective coating is disclosed to prevent interaction between constituents of the environment and devices that can be damaged by those constituents. This coating is provided by applying a synergistic combination of diffusion barrier and physical barrier materials. These materials can be, for example, in the form of a plurality of layers of a diffusion barrier and a physical barrier, with these barrier layers being alternated. Further protection in certain instances is provided by including at least one layer of a getter material to actually react with one or more of the deleterious constituents. The coating is illustrated by using alternating layers of an organic coating (such as Parylene-C{trademark}) as the diffusion barrier, and a metal coating (such as aluminum) as the physical barrier. For best results there needs to be more than one of at least one of the constituent layers. 4 figs.

  16. Protective coatings for sensitive materials

    SciTech Connect (OSTI)

    Egert, Charles M.

    1997-01-01

    An enhanced protective coating to prevent interaction between constituents of the environment and devices that can be damaged by those constituents. This coating is provided by applying a synergistic combination of diffusion barrier and physical barrier materials. These materials can be, for example, in the form of a plurality of layers of a diffusion barrier and a physical barrier, with these barrier layers being alternated. Further protection in certain instances is provided by including at least one layer of a getter material to actually react with one or more of the deleterious constituents. The coating is illustrated by using alternating layers of an organic coating (such as Parylene-C.TM.) as the diffusion barrier, and a metal coating (such as aluminum) as the physical barrier. For best results there needs to be more than one of at least one of the constituent layers.

  17. Fast breeder reactor protection system

    DOE Patents [OSTI]

    van Erp, J.B.

    1973-10-01

    Reactor protection is provided for a liquid-metal-fast breeder reactor core by measuring the coolant outflow temperature from each of the subassemblies of the core. The outputs of the temperature sensors from a subassembly region of the core containing a plurality of subassemblies are combined in a logic circuit which develops a scram alarm if a predetermined number of the sensors indicate an over temperature condition. The coolant outflow from a single subassembly can be mixed with the coolant outflow from adjacent subassemblies prior to the temperature sensing to increase the sensitivity of the protection system to a single subassembly failure. Coherence between the sensors can be required to discriminate against noise signals. (Official Gazette)

  18. Material Protection, Accounting and Control

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Material Protection, Accounting and Control Technologies (MPACT) Campaign Overview and Advanced Instrumentation Development Michael Miller, Ph.D. National Technical Director Los Alamos National Laboratory Instrumentation and Control Review Meeting September 17, 2014 LA-UR-14-27347 2 Introduction September 17, 2014 n Preventing, deterring, and detecting misuse of nuclear materials and associated fuel cycle technologies is of paramount concern to both national and global security. Success in

  19. Patents protect deepwater platform concepts

    SciTech Connect (OSTI)

    Khurana, S.

    1998-06-22

    Numerous deepwater platform concepts have patents that provide an inventor protection for his new ideas. But an inventor should not be discouraged by the fact that many patents exist. In fact, it may be advantageous to build on existing patents and prior art, and patent new ideas and concepts for reducing costs. Challenges still remain such as for optimizing drilling and production operations simultaneously on deepwater platforms for accessing and producing oil and gas reserves.

  20. Password Generation, Protection, and Use

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-23

    To establish minimum requirements for the generation, protection, and use of passwords to support authentication when accessing classified and unclassified Department of Energy (DOE) information systems. DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. Cancels DOE M 471.2-2, Chapter VI, paragraphs 4j(2), and 4j(6) and Chapter VII, paragraph 12a(2)(a).

  1. Environmental Protection | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Protection Argonne's environmental stewardship leverages our R&D programs to help reduce our own electricity use, water consumption and environmental emissions. Environment Argonne National Laboratory is helping our nation build an economy based on renewable energy, a reduced carbon footprint and freedom from foreign oil. We continually monitor our energy use and emissions to minimize our environmental impact and improve our day-to-day operations. Our environmental stewardship

  2. Protection of Human Research Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-12-09

    The order establishes Department of Energy (DOE) procedures and responsibilities for implementing the policy and requirements set forth in Title 10 Code of Federal Regulations (CFR) Part 745, Protection of Human Subjects, 45 CFR Part 46, and the Secretarial Policy Memorandum on Military or Intelligence-Related Human Subject Research, December 9, 2009. Supersedes DOE O 443.1A and DOE P 443.1A.

  3. Nuclear Criticality Safety Guide for Fire Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    This guide is intended to provide information for use by fire protection professionals in the application of reasonable methods of fire protection in those facilities where there is a potential for nuclear criticality.

  4. Google Earth Tour: Waters LANL Protects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home > Clean the Past > What waters does LANL protect? PreviousNext Google Earth Tour: Waters LANL Protects Click here to load the tour...then click the play button below...

  5. Help:Protected pages | Open Energy Information

    Open Energy Info (EERE)

    only sysop users can protect a page in the first place, or unprotect the page to lift the restriction. There are several reasons why a particular page might be protected: On...

  6. Protection of UCNI | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    UCNI Protection of UCNI What are the rules for protecting an UCNI document or material when a person is using it? Any person with routine access to a document or material ...

  7. Farmland Protection Policy Act | Open Energy Information

    Open Energy Info (EERE)

    Farmland Protection Policy Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Farmland Protection Policy ActLegal Abstract...

  8. Marine Mammal Protection Act | Open Energy Information

    Open Energy Info (EERE)

    Marine Mammal Protection Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Marine Mammal Protection ActLegal Abstract The...

  9. Voluntary Protection Programs Participants' Association (VPPPA...

    Office of Environmental Management (EM)

    Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA)...

  10. 2009 Voluntary Protection Programs Participants' Association...

    Office of Environmental Management (EM)

    Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA)...

  11. CRAD, Environmental Radiation Protection- December 7, 2009

    Office of Energy Efficiency and Renewable Energy (EERE)

    Environmental Radiation Protection, Inspection Criteria, Approach, and Lines of Inquiry (HSS CRAD 64-36, Rev. 0)

  12. Voluntary Protection Program Onsite Review, Parsons Corporation...

    Office of Environmental Management (EM)

    Corporation Salt Waste Processing Facility Construction Project - October 2015 Voluntary Protection Program Onsite Review, Parsons Corporation Salt Waste Processing Facility...

  13. 2009 Voluntary Protection Programs Participants' Association...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self ...

  14. Alkali metal protective garment and composite material

    DOE Patents [OSTI]

    Ballif, III, John L.; Yuan, Wei W.

    1980-01-01

    A protective garment and composite material providing satisfactory heat resistance and physical protection for articles and personnel exposed to hot molten alkali metals, such as sodium. Physical protection is provided by a continuous layer of nickel foil. Heat resistance is provided by an underlying backing layer of thermal insulation. Overlying outer layers of fireproof woven ceramic fibers are used to protect the foil during storage and handling.

  15. Public Safety and Resource Protection - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Resource Protection Home Cultural Resource Program and Curation Services Ecological Monitoring Environmental Surveillance Meteorology and Climatology Services Seismic...

  16. Fire Protection Engineering Functional Area Qualification Standard

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FIRE PROTECTION ENGINEERING FUNCTIONAL AREA QUALIFICATION STANDARD DOE Defense Nuclear Facilities Technical ... by applied engineering fundamentals, research, fire hazard ...

  17. Fire Protection for Underground Research Facilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presenter: James Priest, Ph.D., Senior Fire Protection Engineer ES&H, Universities Research Associates ‐ FNAL

  18. Optimization of radiation protection: a bibliography

    SciTech Connect (OSTI)

    Tang, G.R.; Khan, T.A.; Sullivan, S.G.

    1996-10-01

    This document provides a bibliography of radiation protection optimization documents. Abstracts, an author index, and a subject index are provided.

  19. Protection of Human Research Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-07-20

    Changes are made to harmonize the definitions in this Order with those in the Federal regulations for the protection of human subjects (10 CFR Part 745), specifically, splitting the definition "human subject research" into "research" and "human subject," and adopting, verbatim, the definitions of "research" and "human subject" from 10 CFR Part 745 and adding the definition of "generalizable," since the determination of whether a project is "research" in 10 CFR Part 745 hinges on whether the work being conducted is generalizable. Small corrections and updates have been made to the references, links, and organization titles.

  20. High energy overcurrent protective device

    DOE Patents [OSTI]

    Praeg, Walter F. (Palos Park, IL)

    1982-01-01

    Electrical loads connected to capacitance elements in high voltage direct current systems are protected from damage by capacitance discharge overcurrents by connecting between the capacitance element and the load, a longitudinal inductor comprising a bifilar winding wound about a magnetic core, which forms an incomplete magnetic circuit. A diode is connected across a portion of the bifilar winding which conducts a unidirectional current only. Energy discharged from the capacitance element is stored in the inductor and then dissipated in an L-R circuit including the diode and the coil winding. Multiple high voltage circuits having capacitance elements may be connected to loads through bifilar windings all wound about the aforementioned magnetic core.

  1. Protective laser beam viewing device

    DOE Patents [OSTI]

    Neil, George R.; Jordan, Kevin Carl

    2012-12-18

    A protective laser beam viewing system or device including a camera selectively sensitive to laser light wavelengths and a viewing screen receiving images from the laser sensitive camera. According to a preferred embodiment of the invention, the camera is worn on the head of the user or incorporated into a goggle-type viewing display so that it is always aimed at the area of viewing interest to the user and the viewing screen is incorporated into a video display worn as goggles over the eyes of the user.

  2. METHOD OF PROTECTIVELY COATING URANIUM

    DOE Patents [OSTI]

    Eubank, L.D.; Boller, E.R.

    1959-02-01

    A method is described for protectively coating uranium with zine comprising cleaning the U for coating by pickling in concentrated HNO/sub 3/, dipping the cleaned U into a bath of molten zinc between 430 to 600 C and containing less than 0 01% each of Fe and Pb, and withdrawing and cooling to solidify the coating. The zinccoated uranium may be given a; econd coating with another metal niore resistant to the corrosive influences particularly concerned. A coating of Pb containing small proportions of Ag or Sn, or Al containing small proportions of Si may be applied over the zinc coatings by dipping in molten baths of these metals.

  3. 2009 Voluntary Protection Programs Participants' Association (VPPPA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation: Conducting your Annual VPP Self Assessment | Department of Energy Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual

  4. 2009 Voluntary Protection Programs Participants' Association (VPPPA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentaton: Employee Led Safety Committees | Department of Energy Presentaton: Employee Led Safety Committees 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentaton: Employee Led Safety Committees 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentaton: Employee Led Safety Committees Employee Led Safety Committees (302.7 KB) More Documents & Publications VPPPA Presentation: TEAM 2009 Voluntary Protection Programs Participants'

  5. Hanford Site Respiratory Protection Program (HSRPP)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE-0352 Revision 0 Hanford Site Respiratory Protection Program (HSRPP) Prepared for the U.S. Department of Energy Assistant Secretary for Environmental Management DOE-0352, Hanford Site Respiratory Protection Program (HSRPP) HSRPP Page 2 of 44 DOE-0352, Hanford Site Respiratory Protection Program (HSRPP) HSRPP Page 3 of 44 Contents 1.0 Purpose ............................................................................................................................. 6 2.0 Scope

  6. warhead protection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    warhead protection Office of Nuclear Warhead Protection The Office of Nuclear Warhead Protection (ONWP) is tasked with improving the security of 73 Russian Ministry of Defense (MOD) nuclear warhead sites, including 39 Russian Navy sites, 25 Strategic Rocket Forces sites, and 9 sites of the 12th Main Directorate. In accordance with the Bush-Putin

  7. Air protection strategy in Poland

    SciTech Connect (OSTI)

    Blaszczyk, B.

    1995-12-31

    Air quality is one of the basic factors determining the environmental quality and influencing the life conditions of people. There is a shortage of proper quality air in many regions of Poland. In consequence, and due to unhindered transport, air pollution is the direct cause of losses in the national economy (reduction of crops, losses in forestry, corrosion of buildings and constructions, worsening of people`s health). Poland is believed to be one of the most contaminated European countries. The reason for this, primarily, is the pollution concomitant with energy-generating fuel combustion; in our case it means the use of solid fuels: hard coal and lignite. This monocultural economy of energy generation is accompanied by low efficiency of energy use (high rates of energy loss from buildings, heat transmission pipelines, energy-consuming industrial processes). This inefficiency results in the unnecessary production of energy and pollution. Among other reasons, this results from the fact that in the past Poland did not sign any international agreements concerning the reduction of the emission of pollution. The activities aimes at air protection in Poland are conducted based on the Environmental Formation and Protection Act in effect since 1980 (with many further amendments) and the The Ecological Policy of the state (1991). The goals of the Polish air pollution reduction program for the period 1994-2000 are presented.

  8. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  9. COATINGS FOR PROTECTION OF EQUIPMENT FOR BIOCHEMICAL PROCESSING OF GEOTHERMAL RESIDUES: PROGRESS REPORT FY 97

    SciTech Connect (OSTI)

    ALLAN,M.L.

    1997-11-01

    Thermal sprayed ethylene methacrylic acid (EMAA) and ethylene tetrafluoroethylene (ETFE), spray-and-bake ETFE and polyvinylidene fluoride (PVDF) and brushable ceramic-epoxy coatings were evaluated for corrosion protection in a biochemical process to treat geothermal residues. The findings are also relevant to other moderate temperature brine environments where corrosion is a problem. Coupon, Atlas cell, peel strength, cathodic disbondment and abrasion tests were performed in aggressive environments including geothermal sludge, hypersaline brine and sulfur-oxidizing bacteria (Thiobadus ferrooxidans) to determine suitability for protecting storage tanks and reaction vessels. It was found that all of the coatings were resistant to chemical attack and biodegradation at the test temperature of 55 C. The EMAA coatings protected 316L stainless steel from corrosion in coupon tests. However, corrosion of mild steel substrates thermal sprayed with EMAA and ETFE occurred in Atlas cell tests that simulated a lined reactor operating environment and this resulted in decreased adhesive strength. Peel tests to measure residual adhesion revealed that failure mode was dependent on exposure conditions. Long-term tests on the durability of ceramic-epoxy coatings in brine and bacteria are ongoing. Initial indications are that this coating has suitable characteristics. Abrasion tests showed that the ceramic-epoxy had good resistance to the abrasive effects of sludge. Thermal sprayed EMAA coatings also displayed abrasion resistance. Cathodic disbondment tests in brine at room temperature indicated that EMAA coatings are resistant to disbondment at applied potentials of {minus}780 to {minus}1,070 mV SCE for the test conditions and duration. Slight disbondment of one specimen occurred at a potential of {minus}1,500 mV SCE. The EMAA may be suited to use in conjunction with cathodic protection although further long-term, higher temperature testing would be needed.

  10. Coatings for protection of equipment for biochemical processing of geothermal residues: Progress report FY`97

    SciTech Connect (OSTI)

    Allan, M.L.

    1997-11-01

    Thermal sprayed ethylene methacrylic acid (EMAA) and ethylene tetrafluoroethylene (ETFE), spray-and-bake ETFE and polyvinylidene fluoride (PVDF) and brushable ceramic-epoxy coatings were evaluated for corrosion protection in a biochemical process to treat geothermal residues. Coupon, Atlas cell, peel strength, cathodic disbondment and abrasion tests were performed in aggressive environments including geothermal sludge, hypersaline brine and sulfur-oxidizing bacteria (Thiobacillus ferrooxidans) to determine suitability for protecting storage tanks and reaction vessels. It was found that all of the coatings were resistant to chemical attack and biodegradation at the test temperature of 55 C. The EMAA coatings protected 316L stainless steel from corrosion in coupon tests. However, corrosion of mild steel substrates thermal sprayed with EMAA and ETFE occurred in Atlas cell tests that simulated a lined reactor operating environment and this resulted in decreased adhesive strength. Peel tests to measure residual adhesion revealed that failure mode was dependent on exposure conditions. Abrasion tests showed that the ceramic-epoxy had good resistance to the abrasive effects of sludge. Thermal sprayed EMAA coatings also displayed abrasion resistance. Cathodic disbondment tests in brine at room temperature indicated that EMAA coatings are resistant to disbondment at applied potentials of {minus}780 to {minus}1,070 mV SCE for the test conditions and duration. Slight disbondment of one specimen occurred at a potential of {minus}1,500 mV SCE. The EMAA may be suited to use in conjunction with cathodic protection although further long-term, higher temperature testing would be needed.

  11. Metallothionein protection of cadmium toxicity

    SciTech Connect (OSTI)

    Klaassen, Curtis D. Liu, Jie; Diwan, Bhalchandra A.

    2009-08-01

    The discovery of the cadmium (Cd)-binding protein from horse kidney in 1957 marked the birth of research on this low-molecular weight, cysteine-rich protein called metallothionein (MT) in Cd toxicology. MT plays minimal roles in the gastrointestinal absorption of Cd, but MT plays important roles in Cd retention in tissues and dramatically decreases biliary excretion of Cd. Cd-bound to MT is responsible for Cd accumulation in tissues and the long biological half-life of Cd in the body. Induction of MT protects against acute Cd-induced lethality, as well as acute toxicity to the liver and lung. Intracellular MT also plays important roles in ameliorating Cd toxicity following prolonged exposures, particularly chronic Cd-induced nephrotoxicity, osteotoxicity, and toxicity to the lung, liver, and immune system. There is an association between human and rodent Cd exposure and prostate cancers, especially in the portions where MT is poorly expressed. MT expression in Cd-induced tumors varies depending on the type and the stage of tumor development. For instance, high levels of MT are detected in Cd-induced sarcomas at the injection site, whereas the sarcoma metastases are devoid of MT. The use of MT-transgenic and MT-null mice has greatly helped define the role of MT in Cd toxicology, with the MT-null mice being hypersensitive and MT-transgenic mice resistant to Cd toxicity. Thus, MT is critical for protecting human health from Cd toxicity. There are large individual variations in MT expression, which might in turn predispose some people to Cd toxicity.

  12. CRAD, Fire Protection - October 12, 2012 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fire Protection - October 12, 2012 CRAD, Fire Protection - October 12, 2012 October 12, 2012 Fire Protection Inspection Criteria, Approach, and Lines of Inquiry (HSS CRAD 45-34,...

  13. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  14. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  15. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  16. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  17. Voluntary Protection Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voluntary Protection Program Voluntary Protection Program VPP logo Map Mapping VPP Steering Committee - The Department of Energy Voluntary Protection Program (DOE-VPP) Federal Field Steering Committee is a group of Federal field office staff members from offices where at least one contractor organization is participating in the DOE-VPP. This Committee provides input and support to the Office of Worker Safety and Health Assistance. General Information - A broad statement defining major aspects of

  18. protective forces | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    protective forces Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

  19. Optical probe with light fluctuation protection

    DOE Patents [OSTI]

    Da Silva, Luiz B.; Chase, Charles L.

    2003-11-11

    An optical probe for tissue identification includes an elongated body. Optical fibers are located within the elongated body for transmitting light to and from the tissue. Light fluctuation protection is associated with the optical fibers. In one embodiment the light fluctuation protection includes a reflective coating on the optical fibers to reduce stray light. In another embodiment the light fluctuation protection includes a filler with very high absorption located within the elongated body between the optical fibers.

  20. Fire Protection Database | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fire Protection Database Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires the submission of an Annual Fire Protection Summary. The previous process used to collect the required data utilizes a Microsoft Access database that was downloaded, completed by the field and then sent to Headquarters for summation and analysis by engineers in Office of Sustainability Support. Data collection for the CY2013 Summary will begin Jan. 1, 2014, and a commitment has been

  1. Appendix IGP: Individual and Groundwater Protection Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IGP-2014 Individual and Groundwater Protection Requirements United States Department of Energy Waste Isolation Pilot Plant Carlsbad Field Office Carlsbad, New Mexico Compliance Recertification Application 2014 Appendix IGP-2014 Individual and Groundwater Protection Requirements Table of Contents IGP-1.0 Introduction IGP-2.0 Individual Protection Requirements IGP-2.1 Compliance Assessment of Undisturbed Performance IGP-2.2 Dose Calculation IGP-2.2.1 Transport Pathway IGP-2.2.2 Bounding Analysis

  2. Cathodic protection of storage field well casings

    SciTech Connect (OSTI)

    Dabkowski, J.

    1986-01-01

    Downhole logging of gas storage field wells to determine cathodic protection (CP) levels is expensive and requires removing the well from service. A technique allowing the prediction of downhole CP levels by modeling combined with limiting field measurements would provide the industry with a cost-effective means of implementing and monitoring casing protection. A computer model has been developed for a cathodically protected well casing.

  3. Office of Environmental Protection, Sustainability Support, and Corporate Safety Analysis

    Broader source: Energy.gov [DOE]

    The Office of Environmental Protection, Sustainability Support and Analysis establishes environmental protection requirements and expectations for the Department to ensure protection of workers and the public and protection of the environment from the hazards associated with all Department operations.

  4. Fire Protection - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are not comprehensively or adequately addressed in national consensus standards or other design criteria. DOE-STD-1062-2012: Fire Protection Type: Invoked Technical Standards OPI:...

  5. Voluntary Protection Program Onsite Review, Bechtel National...

    Office of Environmental Management (EM)

    Bechtel National Inc., Waste Treatment Plant Construction Site - November 2013 Voluntary Protection Program Onsite Review, Bechtel National Inc., Waste Treatment Plant Construction...

  6. Therapeutic Hypothermia: Protective Cooling Using Medical Ice...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Therapeutic Hypothermia: Protective Cooling Using Medical Ice Slurry Technology available for licensing: Proprietary method and equipment for making an ice slurry coolant to induce...

  7. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but ...

  8. Fire Protection Program Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires ... data utilizes a Microsoft Access database that was downloaded, completed by the ...

  9. Future Perfect Partnering with Portuguese Environmental Protection...

    Open Energy Info (EERE)

    Portuguese Environmental Protection Agency (EPA). Aviation Sector EU Emissions Trading Scheme Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Future Perfect Partnering...

  10. "Conflict Between Economic Growth and Environmental Protection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    9, 2012, 4:15pm Colloquia MBG Auditorium "Conflict Between Economic Growth and Environmental Protection", Dr. Bryan Czech, resident, Center for the Advancement of the Steady State...

  11. Environmentally Protective Power Generation EPPG | Open Energy...

    Open Energy Info (EERE)

    Environmentally Protective Power Generation (EPPG) Place: Tucson, Arizona Sector: Wind energy Product: Seeking financing for a Tower system, about which little has been disclosed,...

  12. EO 13158: Marine Protected Areas (2000)

    Broader source: Energy.gov [DOE]

    This Executive Order will help protect the significant natural and cultural resources within the marine environment for the benefit of present and future generations by strengthening and expanding...

  13. Voluntary Protection Program Onsite Review, Washington Closure...

    Office of Environmental Management (EM)

    Washington Closure Hanford VPP Report - March 2009 Voluntary Protection Program Onsite Review, Washington Closure Hanford VPP Report - March 2009 March 2009 Evaluation to determine...

  14. Voluntary Protection Program Onsite Review, Wackenhut Services...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Review, Wackenhut Services, Incorporated - Nevada - May 2008 Voluntary Protection Program Onsite Review, Wackenhut Services, Incorporated - Nevada - May 2008 May 2008 Evaluation to ...

  15. California Environmental Protection Agency Department of Toxic...

    Open Energy Info (EERE)

    Department of Toxic Substances Control Jump to: navigation, search Name: California Environmental Protection Agency Department of Toxic Substances Control Place: Sacramento,...

  16. California Environmental Protection Agency Water Resources Control...

    Open Energy Info (EERE)

    Water Resources Control Board Jump to: navigation, search Name: California Environmental Protection Agency Water Resources Control Board Place: Sacramento, California Coordinates:...

  17. DOE Standard: Fire protection design criteria

    SciTech Connect (OSTI)

    Not Available

    1999-07-01

    The development of this Standard reflects the fact that national consensus standards and other design criteria do not comprehensively or, in some cases, adequately address fire protection issues at DOE facilities. This Standard provides supplemental fire protection guidance applicable to the design and construction of DOE facilities and site features (such as water distribution systems) that are also provided for fire protection. It is intended to be used in conjunction with the applicable building code, National Fire Protection Association (NFPA) Codes and Standards, and any other applicable DOE construction criteria. This Standard replaces certain mandatory fire protection requirements that were formerly in DOE 5480.7A, ``Fire Protection``, and DOE 6430.1A, ``General Design Criteria``. It also contains the fire protection guidelines from two (now canceled) draft standards: ``Glove Box Fire Protection`` and ``Filter Plenum Fire Protection``. (Note: This Standard does not supersede the requirements of DOE 5480.7A and DOE 6430.1A where these DOE Orders are currently applicable under existing contracts.) This Standard, along with the criteria delineated in Section 3, constitutes the basic criteria for satisfying DOE fire and life safety objectives for the design and construction or renovation of DOE facilities.

  18. FAQS Reference Guide – Fire Protection Engineering

    Office of Energy Efficiency and Renewable Energy (EERE)

    This reference guide addresses the competency statements in the December 2007 edition of DOE-STD-1137-2007, Fire Protection Engineering Functional Area Qualification Standard.

  19. Voluntary Protection Program Onsite Review, Volpentest HAMMER...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Volpentest HAMMER Training Center January 2011 Voluntary Protection Program Onsite Review, Volpentest HAMMER Training Center January 2011 January 2011 Evaluation to determine ...

  20. Nevada Test Site Radiation Protection Program

    SciTech Connect (OSTI)

    Radiological Control Managers' Council, Nevada Test Site

    2007-08-09

    Title 10 Code of Federal Regulations (CFR) 835, 'Occupational Radiation Protection', establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada Test Site (NTS), related (onsite or offsite) DOE National Nuclear Security Administration Nevada Site Office (NNSA/NSO) operations, and environmental restoration offsite projects.

  1. Voluntary Protection Program Onsite Review, Portsmouth Facility...

    Office of Environmental Management (EM)

    Portsmouth Facility Support Services - March 2013 Voluntary Protection Program Onsite Review, Portsmouth Facility Support Services - March 2013 March 2013 Evaluation to determine...

  2. Voluntary Protection Program Onsite Review, Advanced Technologies...

    Office of Environmental Management (EM)

    Advanced Technologies and Laboratories, Inc., Hanford - Feb 2014 Voluntary Protection Program Onsite Review, Advanced Technologies and Laboratories, Inc., Hanford - Feb 2014...

  3. Water Efficiency Improvements At Various Environmental Protection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Protection Agency (EPA) built a successful water conservation program and reduced potable water use through a series of initiatives at EPA laboratories. EPA completed ...

  4. Nevada Department of Environmental Protection Public Notices...

    Open Energy Info (EERE)

    Not Provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Nevada Department of Environmental Protection Public Notices Citation State...

  5. 2009 Voluntary Protection Programs Participants' Association...

    Broader source: Energy.gov (indexed) [DOE]

    Presentaton: Employee Led Safety Committees Employee Led Safety Committees (302.7 KB) More Documents & Publications VPPPA Presentation: TEAM 2009 Voluntary Protection Programs ...

  6. Decommissioning abandoned roads to protect fish

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Decommissioning-abandoned-roads-to-protect-fish Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects...

  7. Montana Watershed Protection Section Contacts Webpage | Open...

    Open Energy Info (EERE)

    contact information for the Watershed Protection Section of the Water Quality Planning Bureau. Author Montana Water Quality Planning Bureau Published State of Montana, Date Not...

  8. Fall Protection Can Prevent Serious Injuries

    Broader source: Energy.gov (indexed) [DOE]

    protection requirements were not followed. According to the Occupational Safety and Health Administration (OSHA), falls from elevations, including into holes in floors, are the...

  9. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June ...

  10. Climate Protection Action Fund | Open Energy Information

    Open Energy Info (EERE)

    Repower America Retrieved from "http:en.openei.orgwindex.php?titleClimateProtectionActionFund&oldid767417" Categories: Organizations Political Action Committees Policy...

  11. Voluntary Protection Program Onsite Review, Facility Engineering...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Facility Engineering Services KCP, LLC - September 2012 Voluntary Protection Program Onsite Review, Facility Engineering Services KCP, LLC - September 2012 September 2012 ...

  12. Voluntary Protection Program Onsite Review, Transuranic Waste...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transuranic Waste Processing Center - September 2012 Voluntary Protection Program Onsite Review, Transuranic Waste Processing Center - September 2012 September 2012 Evaluation to...

  13. Fire Protection Related Sites | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Web Sites EFCOG - Fire Protection Working Group Headquarter's Office of Science Brookhaven National Laboratory Hanford Fire Department Non-DOE Government-Related Web Sites Consumer ...

  14. Protective supplied breathing air garment

    DOE Patents [OSTI]

    Childers, Edward L.; von Hortenau, Erik F.

    1984-07-10

    A breathing air garment for isolating a wearer from hostile environments containing toxins or irritants includes a suit and a separate head protective enclosure or hood engaging a suit collar in sealing attachment. The hood and suit collar are cylindrically shaped and dimensioned to enable the wearer to withdraw his hands from the suit sleeves to perform manual tasks within the hood interior. Breathing air is supplied from an external air line with an air delivery hose attached to the hood interior. The hose feeds air into an annular halo-like fiber-filled plenum having spaced discharge orifices attached to the hood top wall. A plurality of air exhaust/check valves located at the suit extremities cooperate with the hood air delivery system to provide a cooling flow of circulating air from the hood throughout the suit interior. A suit entry seal provided on the suit rear torso panel permits access into the suit and is sealed with an adhesive sealing flap.

  15. Protective supplied breathing air garment

    DOE Patents [OSTI]

    Childers, E.L.; Hortenau, E.F. von.

    1984-07-10

    A breathing air garment is disclosed for isolating a wearer from hostile environments containing toxins or irritants includes a suit and a separate head protective enclosure or hood engaging a suit collar in sealing attachment. The hood and suit collar are cylindrically shaped and dimensioned to enable the wearer to withdraw his hands from the suit sleeves to perform manual tasks within the hood interior. Breathing air is supplied from an external air line with an air delivery hose attached to the hood interior. The hose feeds air into an annular halo-like fiber-filled plenum having spaced discharge orifices attached to the hood top wall. A plurality of air exhaust/check valves located at the suit extremities cooperate with the hood air delivery system to provide a cooling flow of circulating air from the hood throughout the suit interior. A suit entry seal provided on the suit rear torso panel permits access into the suit and is sealed with an adhesive sealing flap. 17 figs.

  16. GREET Life-Cycle Analysis of Biofuels

    Broader source: Energy.gov (indexed) [DOE]

    ... NG-based fuels, hydrogen, electricity, and many biofuel types End use transportation applications * ... petroleum energy Water consumption Biofuels have been an ...

  17. Alternative Fuels Data Center: Lifecycle Energy Balance

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    ... This is because so much energy is used to extract, transport, and refine oil and gasoline. When these two factors are taken into account, corn-based ethanol shows a clear benefit ...

  18. Lifecycle Verification of Tank Liner Polymers

    SciTech Connect (OSTI)

    Anovitz, Lawrence {Larry} M; Smith, Barton

    2014-03-01

    This report describes a method that was developed for the purpose of assessing the durability of thermoplastic liners used in a Type IV hydrogen storage tank during the tank s expected service life. In the method, a thermoplastic liner specimen is cycled between the maximum and minimum expected working temperatures while it is differentially pressurized with high-pressure hydrogen gas. The number of thermal cycling intervals corresponds to those expected within the tank s design lifetime. At prescribed intervals, hydrogen permeation measurements are done in situ to assess the ability of the liner specimen to maintain its hydrogen barrier properties and to model its permeability over the tank lifetime. Finally, the model is used to assess whether the steady-state leakage rate in the tank could potentially exceed the leakage specification for hydrogen fuel cell passenger vehicles. A durability assessment was performed on a specimen of high-density polyethylene (HDPE) that is in current use as a tank liner. Hydrogen permeation measurements were performed on several additional tank liner polymers as well as novel polymers proposed for use as storage tank liners and hydrogen barrier materials. The following technical barriers from the Fuel Cell Technologies Program MYRDD were addressed by the project: D. Durability of on-board storage systems lifetime of at least 1500 cycles G. Materials of construction vessel containment that is resistant to hydrogen permeation M. Lack of Tank Performance Data and Understanding of Failure Mechanisms And the following technical targets1 for on-board hydrogen storage systems R&D were likewise addressed: Operational cycle life (1/4 tank to full) FY 2017: 1500 cycles; Ultimate: 1500 cycles Environmental health & safety Permeation and leakage: Meets or exceeds applicable standards Loss of useable H2: FY 2017: 0.05 g/h/kg H2; Ultimate: 0.05 g/h/kg H2

  19. Background Information for Independent Review Team. Lifecycle...

    Office of Scientific and Technical Information (OSTI)

    Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States) Publication Date: 2014-10-24 OSTI Identifier: 1178415 Report Number(s): LLNL-TR--663374 DOE Contract Number: ...

  20. Characterization of EGS Fracture Network Lifecycles

    SciTech Connect (OSTI)

    Gillian R. Foulger

    2008-03-31

    Geothermal energy is relatively clean, and is an important non-hydrocarbon source of energy. It can potentially reduce our dependence on fossil fuels and contribute to reduction in carbon emissions. High-temperature geothermal areas can be used for electricity generation if they contain permeable reservoirs of hot water or steam that can be extracted. The biggest challenge to achieving the full potential of the nations resources of this kind is maintaining and creating the fracture networks required for the circulation, heating, and extraction of hot fluids. The fundamental objective of the present research was to understand how fracture networks are created in hydraulic borehole injection experiments, and how they subsequently evolve. When high-pressure fluids are injected into boreholes in geothermal areas, they flow into hot rock at depth inducing thermal cracking and activating critically stressed pre-existing faults. This causes earthquake activity which, if monitored, can provide information on the locations of the cracks formed, their time-development and the type of cracking underway, e.g., whether shear movement on faults occurred or whether cracks opened up. Ultimately it may be possible to monitor the critical earthquake parameters in near-real-time so the information can be used to guide the hydraulic injection while it is in progress, e.g., how to adjust factors such as injectate pressure, volume and temperature. In order to achieve this, it is necessary to mature analysis techniques and software that were, at the start of this project, in an embryonic developmental state. Task 1 of the present project was to develop state-of-the-art techniques and software for calculating highly accurate earthquake locations, earthquake source mechanisms (moment tensors) and temporal changes in reservoir structure. Task 2 was to apply the new techniques to hydrofracturing (Enhanced Geothermal Systems, or EGS) experiments performed at the Coso geothermal field, in order to enhance productivity there. Task 3 was to interpret the results jointly with other geological information in order to provide a consistent physical model. All of the original goals of the project have been achieved. An existing program for calculating accurate relative earthquake locations has been enhanced by a technique to improve the accuracy of earthquake arrival-time measurements using waveform cross-correlation. Error analysis has been added to pre-existing moment tensor software. New seismic tomography software has been written to calculate changes in structure that could be due, for example, to reservoir depletion. Data processing procedures have been streamlined and web tools developed for rapid dissemination of the results, e.g., to on-site operations staff. Application of the new analysis tools to the Coso geothermal field has demonstrated the effective use of the techniques and provided important case histories to guide the style of future applications. Changes in reservoir structure with time are imaged throughout the upper 3 km, identifying the areas where large volumes of fluid are being extracted. EGS hydrofracturing experiments in two wells stimulated a nearby fault to the south that ruptured from south to north. The position of this fault could be precisely mapped and its existence was confirmed by surface mapping and data from a borehole televiewer log. No earthquakes occurred far north of the injection wells, suggesting that the wells lie near the northern boundary of the region of critically stressed faults. Minor en-echelon faults were also activated. Significant across-strike fluid flow occurred. The faults activated had significant crack-opening components, indicating that the hydraulic fracturing created open cavities at depth. The fluid injection changed the local stress field orientation and thus the mode of failure was different from the normal background. Initial indications are that the injections modulated stress release, seismicity and natural fracture system evolution for periods of up to months. The research demon

  1. Lifecycle Assessments and Sustainability Analyses | Open Energy...

    Open Energy Info (EERE)

    to our research and development efforts. They provide an understanding of the economic, technical, and even global impacts of renewable technologies. These analyses also...

  2. Roles and Lifecycle | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Employee Property Responsibilities by Role Director, Office of Administration The ... upon the transfer or separation of the employee; *Ensure property accounts for their ...

  3. Voluntary Protection Program Onsite Review, Waste Treatment Plant...

    Office of Environmental Management (EM)

    More Documents & Publications Voluntary Protection Program Onsite Review, Intermech Inc., Waste Treatment Plant Construction Site - November 2013 Voluntary Protection Program...

  4. RIVER PROTECTION PROJECT SYSTEM PLAN

    SciTech Connect (OSTI)

    CERTA PJ

    2008-07-10

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, the ORP is responsible for the retrieval, treatment, and disposal of the approximately 57 million gallons of radioactive waste contained in the Hanford Site waste tanks and closure of all the tanks and associated facilities. The previous revision of the System Plan was issued in September 2003. ORP has approved a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. The ORP has established contracts to implement this strategy to establish a basic capability to complete the overall mission. The current strategy for completion of the mission uses a number of interrelated activities. The ORP will reduce risk to the environment posed by tank wastes by: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) for treatment and disposal; (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) and about half of the low-activity waste (LAW) contained in the tank farms, and maximizing its capability and capacity; (3) Developing and deploying supplemental treatment capability or a second WTP LAW Facility that can safely treat about half of the LAW contained in the tank farms; (4) Developing and deploying treatment and packaging capability for transuranic (TRU) tank waste for shipment to and disposal at the Waste Isolation Pilot Plant (WIPP); (5) Deploying interim storage capacity for the immobilized HLW and shipping that waste to Yucca Mountain for disposal; (6) Operating the Integrated Disposal Facility for the disposal of immobilized LAW, along with the associated secondary waste, (7) Closing the SST and DST tank farms, ancillary facilities, and al1 waste

  5. RIVER PROTECTION PROJECT SYSTEM PLAN

    SciTech Connect (OSTI)

    CERTA PJ; KIRKBRIDE RA; HOHL TM; EMPEY PA; WELLS MN

    2009-09-15

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, ORP is responsible for the retrieval, treatment, and disposal of approximately 57 million gallons 1 of radioactive waste contained in the Hanford Site waste tanks and closure2 of all the tanks and associated facilities. The previous revision of the System Plan was issued in May 2008. ORP has made a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. ORP has contracts in place to implement the strategy for completion of the mission and establish the capability to complete the overall mission. The current strategl involves a number of interrelated activities. ORP will reduce risk to the environment posed by tank wastes by the following: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) and delivering the waste to the Waste Treatment and Immobilization Plant (WTP). (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) fraction contained in the tank farms. About one-third of the low-activity waste (LAW) fraction separated from the HLW fraction in the WTP will be immobilized in the WTP LAW Vitrification Facility. (3) Developing and deploying supplemental treatment capability assumed to be a second LAW vitrification facility that can safely treat about two-thirds of the LAW contained in the tank farms. (4) Developing and deploying supplemental pretreatment capability currently assumed to be an Aluminum Removal Facility (ARF) using a lithium hydrotalcite process to mitigate sodium management issues. (5) Developing and deploying treatment and packaging capability for contact-handled transuranic (CH-TRU) tank waste for possible shipment to and disposal

  6. Environmental Protection Agency | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Environmental Protection Agency Third interagency WINGS exercise The third Interagency Aerial Response WINGS exercise, sponsored by the Federal Emergency Management Agency (FEMA), and hosted by the Department of Energy (DOE) and the Environmental Protection Agency (EPA), will be held June 20 - 24, 2016 in Ocean County, New Jersey. On June 21, 2016 through

  7. Optoelectronic devices incorporating fluoropolymer compositions for protection

    DOE Patents [OSTI]

    Chen, Xuming; Chum, Pak-Wing S.; Howard, Kevin E.; Lopez, Leonardo C.; Sumner, William C.; Wu, Shaofu

    2015-12-22

    The fluoropolymer compositions of the present invention generally incorporate ingredients comprising one or more fluoropolymers, an ultraviolet light protection component (hereinafter UV protection component), and optionally one or more additional ingredients if desired. The UV protection component includes a combination of at least one hindered tertiary amine (HTA) compound having a certain structure and a weight average molecular weight of at least 1000. This tertiary amine is used in combination with at least one organic, UV light absorbing compound (UVLA compound) having a weight average molecular weight greater than 500. When the HTA compound and the UVLA compound are selected according to principles of the present invention, the UV protection component provides fluoropolymer compositions with significantly improved weatherability characteristics for protecting underlying materials, features, structures, components, and/or the like. In particular, fluoropolymer compositions incorporating the UV protection component of the present invention have unexpectedly improved ability to resist blackening, coloration, or other de gradation that may be caused by UV exposure. As a consequence, devices protected by these compositions would be expected to have dramatically improved service life. The compositions have a wide range of uses but are particularly useful for forming protective layers in optoelectronic devices.

  8. Cathodic protection of wastewater treatment equipment

    SciTech Connect (OSTI)

    Kaiser, P.

    1984-05-01

    The galvanic couple between the rebar and the structure is the major factor influencing corrosion in a concrete reinforced basin. Cathodic protection anodes coupled closely to the protected structure will provide the most uniform current distribution without stressing the coating. IR drop-free potential measurements should not be used to monitor potentials.

  9. Protective tubes for sodium heated water tubes

    DOE Patents [OSTI]

    Essebaggers, Jan

    1979-01-01

    A heat exchanger in which water tubes are heated by liquid sodium which minimizes the results of accidental contact between the water and the sodium caused by failure of one or more of the water tubes. A cylindrical protective tube envelopes each water tube and the sodium flows axially in the annular spaces between the protective tubes and the water tubes.

  10. Method for protection against genotoxic mutagenesis

    DOE Patents [OSTI]

    Grdina, D.J.

    1996-01-30

    A method and pharmaceutical for protecting against genotoxic damage in irradiated cells are disclosed. Reduction of mutations at the hypoxanthine-guanine phosphoribosyl transferase locus is accomplished by administering an effective dose of a compound having protected sulfhydryl groups which metabolize in vivo to produce both free sulfhydryl groups and disulfides. 10 figs.

  11. Voluntary Protection programs Participants' Association - Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Memorandum of Understanding | Department of Energy programs Participants' Association - Department of Energy Memorandum of Understanding Voluntary Protection programs Participants' Association - Department of Energy Memorandum of Understanding This Memorandum of Understanding (MOU) states the understandings between the Voluntary Protection programs Participants' Association (VPPPA) and U.S. Department of Energy (DOE) under which the parties agree to work cooperatively to address

  12. Method for protection against genotoxic mutagenesis

    DOE Patents [OSTI]

    Grdina, David J.

    1996-01-01

    A method and pharmaceutical for protecting against genotoxic damage in irradiated cells. Reduction of mutations at the hypoxanthine-guanine phosphoribosyl transferase locus is accomplished by administering an effective dose of a compound having protected sulfhydryl groups which metabolize in vivo to produce both free sulfhydryl groups and disulfides.

  13. Neutron effects in humans: protection considerations

    SciTech Connect (OSTI)

    Fry, R.J.M.

    1985-01-01

    Committee I of the International Commission on Radiological Protection has recommended that the Quality Factor for neutrons should be changed from 10 to 20. This article is an interesting recount of the tale of Q from the viewpoint of an observer which illustrates many of the problems that the selection of protection standards pose. 32 refs., 5 tabs.

  14. Overload protection circuit for output driver

    DOE Patents [OSTI]

    Stewart, Roger G.

    1982-05-11

    A protection circuit for preventing excessive power dissipation in an output transistor whose conduction path is connected between a power terminal and an output terminal. The protection circuit includes means for sensing the application of a turn on signal to the output transistor and the voltage at the output terminal. When the turn on signal is maintained for a period of time greater than a given period without the voltage at the output terminal reaching a predetermined value, the protection circuit decreases the turn on signal to, and the current conduction through, the output transistor.

  15. MOV surge arresters: improved substation equipment protection

    SciTech Connect (OSTI)

    Niebuhr, W.D.

    1985-07-01

    The introduction of metal-oxide-varistor (MOV) surge arresters has added a new dimension to substation equipment protection. Through the optimal use of these arresters, it is possible to lower surge arrester ratings and thereby improve protective margins, resulting in a possible reduction of the insulation levels (BIL) of substation equipment. This reduction in BIL can lead to a significant reduction in the cost of substation equipment. General methods are delineated for selecting MOV surge arresters for substation protection and the resulting effect on substation equipment insulation levels.

  16. Office of River Protection (DOE-ORP) Hanford Tank Waste Treatment Alternatives March 2000

    SciTech Connect (OSTI)

    WODRICH, D.D.

    2000-03-24

    The U.S. Department of Energy (DOE) is currently planning to retrieve, pretreat, immobilize and safely dispose of 53 million gallons of highly radioactive waste currently stored in underground tanks at Hanford Site. The DOE plan is a two-phased approach to privatizing the processing of hazardous and radioactive waste. Phase 1 is a proof-of-concept/commercial demonstration-scale effort whose objectives are to: demonstrate, the technical and business viability of using privatized facilities to treat Hanford tank waste; define and maintain required levels of radiological, nuclear, process and occupational safety; maintain environmental protection and compliance; and substantially reduce life-cycle costs and time required to treat Hanford tank waste. The Phase 1 effort consists of Part A and Part B. On September 25, 1996 (Reference 1), DOE signed a contract with BNFL, Inc. (BNFL) to commence with Phase 1, Part A. In August 1998, BNFL was authorized to proceed with Phase I, Part 6-1, a 24-month design phase that will-provide sufficient engineering and financial maturity to establish fixed-unit prices and financing terms for tank waste processing services in privately-owned and -operated facilities. By August 2000, DOE will decide whether to authorize BNFL to proceed with construction and operation of the proposed processing facilities, or pursue a different path. To support of the decision, DOE is evaluating alternatives to potentially enhance the BNFL tank waste processing contract, as well as, developing an alternate path forward should DOE decide to not continue the BNFL contract. The decision on whether to continue with the current privatization strategy (BNFL contract) or to pursue an alternate can not be made until the evaluation process leading up to the decision on whether to authorize BNFL to proceed with construction and operation (known as the Part 8-2 decision) is completed. The evaluation process includes reviewing and evaluating the information BNFL is

  17. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  18. United States Environmental Protection Agency Radiation Office...

    Office of Legacy Management (LM)

    Environmental Protection Agency Radiation Office of Radiation Programs Technical Note Las Vegas Facility ORPLV-78-3 P.O. Box 15027 October 1978 Las Vegas NV 89114 &EPA Levels and ...

  19. Identifying and Protecting Official Use Only Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-04-09

    To establish a program within the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA), to identify certain unclassified controlled information as Official Use Only (OUO) and to identify, mark, and protect documents containing such information.

  20. Protection and Communication Craftsman-Foreman I

    Broader source: Energy.gov [DOE]

    Where would I be working? Western Area Power Administration Sierra Nevada Region Protection and Communication Maintenance N5200 114 Parkshore Drive Folsom, CA 95630 Find out more about living...

  1. Manual for Classified Matter Protection and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-01-09

    Provides detailed requirements for the protection and control of classified matter which supplement DOE O 471.2A. Cancels DOE M 471.2-1 dated 09/26/1995.

  2. Protect Your Climate Curriculum and Training

    K-12 Energy Lesson Plans and Activities Web site (EERE)

    Request projects here. Upon request you will be sent a 16-unit series of project-based learning activities about climate protection and reducing energy use for 4th and 5th grade elementary school teachers.

  3. Important Idaho habitat now protected through purchase

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4.2 million purchase of Hammer Flat. The City of Boise, Idaho Department of Fish and Game, and the Bonneville Power Administration worked together to protect the nearly 705 acre...

  4. Content Analysis for Proactive Protective Intelligence

    SciTech Connect (OSTI)

    Sanfilippo, Antonio P.

    2010-12-15

    The aim of this paper is to outline a plan for developing and validating a Proactive Protective Intelligence approach that prevents targeted violence through the analysis and assessment of threats overtly or covertly expressed in abnormal communications to USSS protectees.

  5. Pennsylvania Department of Environmental Protection DEP | Open...

    Open Energy Info (EERE)

    Zip: PA 17120 Product: The Department's mission is to protect Pennsylvania(tm)s air, land and water from pollution and to provide for the health and safety of its...

  6. State protection under collective damping and diffusion

    SciTech Connect (OSTI)

    Ponte, M. A. de [Instituto de Fisica de Sao Carlos, Universidade de Sao Paulo, Caixa Postal 369, 13560-590 Sao Carlos, SP (Brazil); Departamento de Fisica, Universidade Regional do Cariri, 63010-970 Juazeiro do Norte, CE (Brazil); Mizrahi, S. S. [Departamento de Fisica, Universidade Federal de Sao Carlos, 13565-905 Sao Carlos, SP (Brazil); Moussa, M. H. Y. [Instituto de Fisica de Sao Carlos, Universidade de Sao Paulo, Caixa Postal 369, 13560-590 Sao Carlos, SP (Brazil)

    2011-07-15

    In this paper we provide a recipe for state protection in a network of oscillators under collective damping and diffusion. Our strategy is to manipulate the network topology, i.e., the way the oscillators are coupled together, the strength of their couplings, and their natural frequencies, in order to create a relaxation-diffusion-free channel. This protected channel defines a decoherence-free subspace (DFS) for nonzero-temperature reservoirs. Our development also furnishes an alternative approach to build up DFSs that offers two advantages over the conventional method: it enables the derivation of all the network-protected states at once, and also reveals, through the network normal modes, the mechanism behind the emergence of these protected domains.

  7. Protection and Communication Craftsman-Foreman II

    Broader source: Energy.gov [DOE]

    Where would I be working? Western Area Power Administration Desert Southwest Region Protection and Communication Maintenance (G5300) 615 S. 43rd Avenue Phoenix, AZ 85009 Duty Location is: Phoenix,...

  8. Protection of Unclassified Controlled Nuclear Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-24

    To establish Department of Energy (DOE) policy and procedures for the protection of Unclassified Controlled Nuclear Information (UNCI). Canceled by DOE O 471.1 of 9-25-1995.

  9. Protection of Unclassified Controlled Nuclear Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    To establish Department of Energy (DOE) policy and procedures for the protection of Unclassified Controlled Nuclear Information (UCNI). This directive does not cancel another directive. Chg 1 dated 4-24-92.

  10. Fire Protection Program Guidelines | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    ... "Fire Protection for Relocatable Structures" Oct 17,2002 NFPA 1710 Technical Position Sept 30, 1995 Implementation Guide for use with DOE Orders 420.1 and 440.1, Fire ...

  11. Fire Protection Engineering Functional Area Qualification Standard...

    Office of Environmental Management (EM)

    ... O 420.1B, Facility Safety * DOE-STD-1066-99, Fire Protection Design Criteria * ... Identify the applicable NFPA code or standard. c. Identify some of the fundamental design ...

  12. Health Safety and Environmental Protection Page 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Page 1 Final Meeting Summary March 10, 2011 FINAL MEETING SUMMARY HANFORD ADVISORY BOARD HEALTH, SAFETY AND ENVIRONMENTAL PROTECTION COMMITTEE March 10, 2011 Richland, WA Topics in this Meeting Summary Welcome and Introductions ............................................................................................................ 1 Beryllium ........................................................................................................................................ 1 Chemical

  13. Vermont Shoreland Protection Act | Open Energy Information

    Open Energy Info (EERE)

    Protection ActLegal Published NA Year Signed or Took Effect 2013 Legal Citation 10 V.S.A. 1441 et seq DOI Not Provided Check for DOI availability: http:crossref.org Online...

  14. Contractor Fee Payments- Office of River Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    See the amount of fees earned on EM's major contracts for each evaluated fee period and the total contract to date at the Office of River Protection on these charts.

  15. Method for protection against genotoxic mutagenesis

    DOE Patents [OSTI]

    Grdina, David J.

    1996-01-01

    A method and pharmaceutical for protecting against mutational damage in mammalian cells, irrespective of the nature of the mutagenic event or source of radiational or chemical insult or the like.

  16. Method for protection against genotoxic mutagenesis

    DOE Patents [OSTI]

    Grdina, D.J.

    1999-02-09

    This research discloses a method and pharmaceutical for protecting against mutational damage in mammalian cells, irrespective of the nature of the mutagenic event or source of radiational or chemical insult or the like. 54 figs.

  17. Method for protection against genotoxic mutagenesis

    DOE Patents [OSTI]

    Grdina, David J.

    1999-02-09

    A method and pharmaceutical for protecting against mutational damage in mammalian cells, irrespective of the nature of the mutagenic event or source of radiational or chemical insult or the like.

  18. Energy Department and Environmental Protection Agency Release...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Department and the Environmental Protection Agency (EPA) today released a new label that features EPA fuel economy estimates and CO2 estimates for used vehicles sold...

  19. Alliance for Climate Protection | Open Energy Information

    Open Energy Info (EERE)

    The Alliance for Climate Protection is a non-profit organization founded in 2006 by Al Gore. The goal of the organization is education "about the urgency of implementing...

  20. Evapotranspiration studies for protective barriers: Experimental plans

    SciTech Connect (OSTI)

    Link, S.O.; Waugh, W.J.

    1989-11-01

    This document describes a general theory and experimental plans for predicting evapotranspiration in support of the Protective Barrier Program. Evapotranspiration is the combined loss of water from plants and soil surfaces to the atmosphere. 45 refs., 1 fig., 4 tabs.