Powered by Deep Web Technologies
Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

operation Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and...

2

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

3

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

4

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

5

Lifecycle Model  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This chapter describes the lifecycle model used for the Departmental software engineering methodology.

1997-05-21T23:59:59.000Z

6

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

7

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

Bencsáth, Boldizsár

8

Optimal power grid protection through a defenderattackerdefender model  

Science Journals Connector (OSTI)

Abstract Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defenderattackerdefender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attackerdefender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defenderattackerdefender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

Wei Yuan; Long Zhao; Bo Zeng

2014-01-01T23:59:59.000Z

9

HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134  

SciTech Connect (OSTI)

Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

PIERSON KL; MEINERT FL

2012-01-26T23:59:59.000Z

10

Protecting Buildings From a Biological or Chemical Attack: actions to take  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

11

Protecting grids from cross-domain attacks using security alert sharing mechanisms  

Science Journals Connector (OSTI)

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to as multi-administrative domain networks. Each domain might have its own security policy and may not want to share its security data with less-protected networks, making it more complex to ensure the security of such networks and protecting them from cross-domain attacks. We propose a Security Event Manager (SEM) called the Grid Security Operation Center (GSOC), which facilitates IT security managers in giving a view of the security of the whole grid network without compromising confidentiality of security data. To do so, GSOC provides a security evaluation of each administrative domain (AD) and a parametric security alert sharing scheme. Alert sharing can then be tuned in order to meet local security policy rules.

Raheel Hassan Syed; Maxime Syrame; Julien Bourgeois

2013-01-01T23:59:59.000Z

12

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect (OSTI)

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

13

Life-cycle Assessment of Semiconductors  

E-Print Network [OSTI]

life-cycle energy requirements (e total ) and global warmingtotal life-cycle global warming impacts. Chapter 3 Life-cycle Energy and Global

Boyd, Sarah B.

2009-01-01T23:59:59.000Z

14

Protecting Buildings from Chemical and Biological Warfare Agent Attacks a long journey  

E-Print Network [OSTI]

". On April 14, 2004, ASHRAE sponsored a satellite broadcast on building security to discuss risk management, the National Institute for Occupational Safety and Health released guidelines for protecting ventilation Publication No. 2002-139). The document offers recommendations on physical security, ventilation, filtration

Chen, Qingyan "Yan"

15

Convective Cloud Lifecycles Lunchtime seminar  

E-Print Network [OSTI]

Convective Cloud Lifecycles Lunchtime seminar 19th May 2009 Bob Plant Department of Meteorology, University of Reading, UK #12;Introduction Obtain life cycle statistics for clouds in CRM simulations Why Conclusions Convective Cloud Lifecycles ­ p.1/3 #12;Why bother? Convective Cloud Lifecycles ­ p.2/3 #12;Some

Plant, Robert

16

Amendment: Lifecycle Emissions Data Worksheet (December 30, 2008...  

Broader source: Energy.gov (indexed) [DOE]

Lifecycle Emissions Data Worksheet (December 30, 2008) Amendment: Lifecycle Emissions Data Worksheet (December 30, 2008) lew.xls Description Amendment: Lifecycle Emissions Data...

17

Alternative Fuels Data Center: Lifecycle Energy Balance  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

AFDC AFDC Printable Version Share this resource Send a link to Alternative Fuels Data Center: Lifecycle Energy Balance to someone by E-mail Share Alternative Fuels Data Center: Lifecycle Energy Balance on Facebook Tweet about Alternative Fuels Data Center: Lifecycle Energy Balance on Twitter Bookmark Alternative Fuels Data Center: Lifecycle Energy Balance on Google Bookmark Alternative Fuels Data Center: Lifecycle Energy Balance on Delicious Rank Alternative Fuels Data Center: Lifecycle Energy Balance on Digg Find More places to share Alternative Fuels Data Center: Lifecycle Energy Balance on AddThis.com... More in this section... Lifecycle Energy Balance The fossil "energy balance" of ethanol has been the subject of debate despite the fact that this metric is not as useful to policymakers as

18

Information Resources: Life-Cycle Assessment of Energy and Environmental  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL alternatives. The reports for Parts 1 and 2 were published in February 2012 and June 2012, respectively, providing a literature review and life-cycle assessment (LCA) for lamps utilizing these three light source technologies. Presenters Jason Tuenge of Pacific Northwest National Laboratory and Brad Hollomon of Compa Industries focused on findings from Part 3, which augments the LCA results with chemical analysis of a variety of lamps using standard testing procedures from the U.S. Environmental Protection Agency and the State of California. A total of 22 samples, representing 11 different lamps, were tested to ascertain whether potentially toxic elements are present in concentrations that exceed regulatory thresholds for hazardous waste.

19

Impermeable Thin Al2O3 Overlay for TBC Protection from Sulfate and Vanadate Attack in Gas Turbines  

SciTech Connect (OSTI)

Current advanced turbine system (ATS) requires thermal barrier coatings (TBCs) on turbine blades and vanes. The TBCs being specified, based on yttria stabilized zirconia (YSZ), have the limited durability for advanced industrial gas turbine applications that have longer durability requirements (30,000 hours versus <10,000 hours), particularly when dirty fuels are burned. Surface deposits (including molten sulfate and vanadate salts) can penetrate into porous TBCs and result in hot corrosion, leading to premature spalling. In the present project, it is planed to deposit a dense overlay Al2O3 on the surface of the YSZ coating to prevent YSZ coating from hot corrosion of deposits derived from combustion of low-grade fuel and air impurities. The dense overlay Al2O3 acts as a barrier to protect TBC and bond coat. The overlay Al2O3 will be deposited on the surface of the thermal barrier coating using physical vapor deposition (PVD) technique and solgel method, respectively. The hot corrosion resistance of the composite Al2O3/YSZ coating will be evaluated. The hot corrosion behavior of the Al2O3/YSZ/NiCrAlY/superalloy system will be compared with the YSZ/NiCrAlY/superalloy system. The corrosion behavior of the sol-gel-modified Al2O3/YSZ system will also be compared with that of the PVD-treated system. The mechanism of hot corrosion will be investigated. The processing-structure-properties relationship of the overlays will be determined. The implementation of the TBC technology is to improve the durability of turbine components and allow the service of turbines in fuels with impurity, which will contribute to the missions and goals of the DOE ''Vision 21'' R&D program in advanced materials, energy efficiency, environment stewardship and energy production.

Mao, Scott X.

2001-11-06T23:59:59.000Z

20

Lifecycle Assessments and Sustainability Analyses | Open Energy Information  

Open Energy Info (EERE)

Lifecycle Assessments and Sustainability Analyses Lifecycle Assessments and Sustainability Analyses Jump to: navigation, search The National Renewable Energy Laboratory performs lifecycle and technoeconomic analyses to promote sustainable energy development. Conducting full life-cycle assessments for biomass products, including electricity, biodiesel, and ethanol, is important for determining environmental benefits. NREL analysts use a life-cycle inventory modeling package and supporting databases to conduct life-cycle assessments. These tools can be applied on a global, regional, local, or project basis. Integrated system analyses, technoeconomic analyses, life-cycle assessments (LCAs), and other analysis tools are essential to our research and development efforts. They provide an understanding of the economic,

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Roles and Lifecycle | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Roles and Lifecycle Roles and Lifecycle Roles and Lifecycle Employee Property Responsibilities by Role Director, Office of Administration The Director, Office of Administration, has the following responsibilities: *Establish a personal property management program for DOE Headquarters, except for the Federal Energy Regulatory Commission (FERC); *Appoint an Organizational Property Management Officer (OPMO) who is responsible for the Headquarters personal property management program; and *Approve, conditionally approve, or disapprove contractor property management systems for all DOE direct operations at Headquarters except for the FERC. Organizational Property Management Officer (OPMO) The OPMO has the following primary responsibilities: *Manage the control, management, and disposal of personal property in the

22

Life-Cycle Analysis of Geothermal Technologies  

Broader source: Energy.gov [DOE]

The results and tools from this project will help GTP and stakeholders determine and communicate GT energy and GHG benefits and water impacts. The life-cycle analysis (LCA) approach is taken to address these effects.

23

Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...  

Broader source: Energy.gov (indexed) [DOE]

compared with three other storage technologies: batteries, pumped hydro, and compressed air energy storage (CAES). Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...

24

GREET Development and Applications for Life-Cycle Analysis of...  

Office of Environmental Management (EM)

Development and Applications for Life-Cycle Analysis of VehicleFuel Systems 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and...

25

Mobile Model-Based Bridge Lifecycle Management Systems  

E-Print Network [OSTI]

Mobile Model-Based Bridge Lifecycle Management Systems Amin Hammad* , Cheng Zhang, Yongxin Hu, Montreal, Quebec, Canada H3G 1T7, Canada Abstract: This paper discusses the requirements for developing Mobile Model-based Bridge Lifecycle Management Systems (MMBLMSs). These new systems should link all

Hammad, Amin

26

Mobile Model-Based Bridge Lifecycle Management Systems  

E-Print Network [OSTI]

Mobile Model-Based Bridge Lifecycle Management Systems Amin Hammad* Concordia Institute for Information Systems Engineering 1425 René Lévesque Boulevard, Montréal, Québec, H3G 1T7, Canada Cheng Zhang University Abstract: This paper discusses the requirements for developing Mobile Model-based Bridge Lifecycle

Hammad, Amin

27

New Tool Yields Custom Environmental Data for Lifecycle Analysis |  

Broader source: Energy.gov (indexed) [DOE]

Tool Yields Custom Environmental Data for Lifecycle Analysis Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's National Energy Technology Laboratory (NETL) - can be used with other data or models to build an emissions inventory of various feedstocks as part of a comprehensive lifecycle analysis of the fuels. Lifecycle analysis is a new and innovative way to analyze and compare different pathways for producing power and transportation fuels.

28

Building Life-Cycle Cost (BLCC) Program | Open Energy Information  

Open Energy Info (EERE)

Building Life-Cycle Cost (BLCC) Program Building Life-Cycle Cost (BLCC) Program Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Building Life-Cycle Cost (BLCC) Program Agency/Company /Organization: United States Department of Energy Partner: National Institute of Standards and Technology Sector: Energy Focus Area: Buildings, Energy Efficiency Phase: Create a Vision, Determine Baseline, Evaluate Options, Develop Goals, Prepare a Plan Topics: Finance, Pathways analysis Resource Type: Software/modeling tools User Interface: Desktop Application Website: www1.eere.energy.gov/femp/information/download_blcc.html Cost: Free OpenEI Keyword(s): EERE tool, Building Life-Cycle Cost, BLCC References: Building Life-Cycle Cost (BLCC) Programs[1] Building Energy Software Tools Directory: BLCC[2]

29

New Tool Yields Custom Environmental Data for Lifecycle Analysis |  

Broader source: Energy.gov (indexed) [DOE]

New Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's National Energy Technology Laboratory (NETL) - can be used with other data or models to build an emissions inventory of various feedstocks as part of a comprehensive lifecycle analysis of the fuels. Lifecycle analysis is a new and innovative way to analyze and compare different pathways for producing power and transportation fuels.

30

Life-Cycle Assessment of Electric Power Systems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life-Cycle Assessment of Electric Power Systems Life-Cycle Assessment of Electric Power Systems Title Life-Cycle Assessment of Electric Power Systems Publication Type Journal Article Year of Publication 2013 Authors Masanet, Eric R., Yuan Chang, Anand R. Gopal, Peter H. Larsen, William R. Morrow, Roger Sathre, Arman Shehabi, and Pei Zhai Journal Annual Review of Environment and Resources Volume 38 Date Published 2013 Keywords electricity, energy policy, environmental analysis, life-cycle impact, life-cycle inventory Abstract The application of life-cycle assessment (LCA) to electric power (EP) technologies is a vibrant research pursuit that is likely to continue as the world seeks ways to meet growing electricity demand with reduced environmental and human health impacts. While LCA is an evolving methodology with a number of barriers and challenges to its effective use, LCA studies to date have clearly improved our understanding of the life-cycle energy, GHG emissions, air pollutant emissions, and water use implications of EP technologies. With continued progress, LCA offers promise for assessing and comparing EP technologies in an analytically-thorough and environmentally-holistic manner for more robust deployment decisions. This article summarizes: (1) major challenges in applying LCA to EP technologies thus far, (2) LCA results to date on the various impacts of EP technologies, and (3) opportunities for improving LCAs as applied to EP technologies moving forward.

31

Research deciphers HIV attack plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights...

32

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials Prospective Life-Cycle Modeling of Novel Carbon Capture Materials Speaker(s): Roger Sathre Date: December 5, 2011 - 3:30pm Location: 90-4133 Seminar Host/Point of Contact: Anita Estner Barbara Adams In this presentation we describe the prospective life-cycle modeling of metal-organic frameworks (MOF), a novel type of material with the potential for efficiently capturing CO2. Life-cycle modeling of emerging technologies, conducted early in the innovation process, can generate knowledge that can feed back to inform scientific discovery and development. We discuss the challenges of credibly modeling a system that does not yet exist, and describe methodological approaches including parametric system modeling (quantifying relations between system elements), scenario projections (defining plausible pathways for system scale-up),

33

Paper Number Whole Lifecycle Electrical Design Analysis in Foresight  

E-Print Network [OSTI]

and Effects Analysis (FMEA) or Sneak Circuit Analysis (SCA) is typically carried out once in the lifecycle techniques have been developed. FMEA. Failure mode and effects analysis considers the effect on an overall

Snooke, Neal

34

Efficient template attacks  

E-Print Network [OSTI]

joint MD , d joint LINEAR. 6 Evaluation of Methods We evaluated the efficiency of many template-attack variants on a real hard- ware platform, comparing all the compression methods from Table 110 and all 9 MATLAB, single core CPU with 3794 MIPS. 10 We... implementing template attacks. Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts at: http://www.cl.cam.ac.uk/research/security/datasets/grizzly/ Acknowledgement: Omar Choudary is a...

Choudary, Omar; Kuhn, Markus G.

2014-01-01T23:59:59.000Z

35

Lifecycle-analysis for heavy vehicles.  

SciTech Connect (OSTI)

Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

Gaines, L.

1998-04-16T23:59:59.000Z

36

INCORPORATING THE EFFECT OF PRICE CHANGES ON CO2- EQUIVALENT EMSSIONS FROM ALTERNATIVE-FUEL LIFECYCLES: SCOPING THE ISSUES  

E-Print Network [OSTI]

Emissions from Alternative Fuel Lifecycles: Scoping theEMSSIONS FROM ALTERNATIVE-FUEL LIFECYCLES: SCOPING THEACRONYMS and TERMS AF = alternative fuel AFL = alternative-

Delucchi, Mark

2005-01-01T23:59:59.000Z

37

Incorporating the Effect of Price Changes on CO2-Equivalent Emissions From Alternative-Fuel Lifecycles: Scoping the Issues  

E-Print Network [OSTI]

Emissions from Alternative Fuel Lifecycles: Scoping theEMSSIONS FROM ALTERNATIVE-FUEL LIFECYCLES: SCOPING THEACRONYMS and TERMS AF = alternative fuel AFL = alternative-

Delucchi, Mark

2005-01-01T23:59:59.000Z

38

Seven Deadliest Wireless Technologies Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, ...

Brad Haines

2010-03-01T23:59:59.000Z

39

Seven Deadliest Unified Communications Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified ...

Dan York

2010-06-01T23:59:59.000Z

40

Guidance on Life-Cycle Cost Analysis Required by Executive Order...  

Energy Savers [EERE]

Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guide describes the clarification of...

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Environmental Management (EM)

2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

42

Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current,...

43

Life-Cycle Cost Analysis | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Life-Cycle Cost Analysis Life-Cycle Cost Analysis Life-Cycle Cost Analysis October 16, 2013 - 4:41pm Addthis Constructed Costs of a Net-Zero Office Building Facility: Research Support Facility at the National Renewable Energy Laboratory in Golden, Colorado Operational: August 2010 Constructed cost: $259/ft2 to achieve 50% less energy use than code Constructed cost of similar office buildings in area: $225 to $300/ft2 Reaching Net-Zero: A 1.27 MW photovoltaic system was added to the project in two phases to bring the system to net-zero. This system was financed through a power purchase agreement and did not add to the constructed cost of the building. If those costs were included in the capital costs, the total constructed cost would have been 291/ft2 to reach net-zero energy use. Learn more about the Research Support

44

Life-Cycle Water Impacts of U.S. Transportation Fuels  

E-Print Network [OSTI]

importation, or wastewater recycling. Identifying regionsWastewater Recycling Life-Cycle Inputs for Wastewater Recycling (Data Source: (

Scown, Corinne Donahue

2010-01-01T23:59:59.000Z

45

Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123  

Broader source: Energy.gov [DOE]

Guide describes the clarification of how agencies determine the life-cycle cost for investments required by Executive Order 13123.

46

Knowledge evaluation in product lifecycle design and support  

Science Journals Connector (OSTI)

Abstract Enterprises are focusing more and more on knowledge issues for global product development. This paper describes knowledge evolution processes in product development activities and proposes a knowledge evaluation method in product lifecycle design. The paper also theoretically analyzes the evaluation model and illustrates how knowledge values can be assessed by case study. The case study shows how knowledge values calculated by the model can provide suggestions about which knowledge to choose and what to do next. The knowledge evaluation model serves as a useful tool for managing knowledge in product lifecycle design and support.

Yang Xu; Alain Bernard; Nicolas Perry; Jing Xu; Shigeo Sugimoto

2014-01-01T23:59:59.000Z

47

A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural Health Monitoring  

E-Print Network [OSTI]

1 A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural of wind turbines and reducing the life-cycle costs significantly. This paper presents a life-cycle management (LCM) framework for online monitoring and performance assessment of wind turbines, enabling

Stanford University

48

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

49

Human integration in the lifecycle of aviation systems  

Science Journals Connector (OSTI)

While Human Factors is perhaps the most critical discipline to improving aviation safety, research and development is disproportionately small-scale, fragmented and unsustained. The key issue is the delivery of Human Factors knowledge throughout the ... Keywords: Human Factors, aviation, innovation, operational performance, research capability, safety, system improvement, system life-cycle, system models

Nick McDonald

2007-07-01T23:59:59.000Z

50

RESEARCH AND ANALYSIS Comparison of Life-Cycle  

E-Print Network [OSTI]

of agricultural oper- ations were used to generate air emissions data for soy- bean production: the greenhouse-output life-cycle assessment (EIO-LCA) model; and SimaPro software equipped with the Franklin database. EIO-LCA specifically to U.S. soybean agriculture and processing, which resulted in several major findings. The EIO

Illinois at Chicago, University of

51

2007 american chemical Society Life-cycle analyses are  

E-Print Network [OSTI]

thorough analysis and quantifica- tion of impacts resulting from agriculture. LCA studies have shown initiatives. A life-cycle analysis (LCA) of bioproduction sys- tems is needed to evaluate potential benefits (5, 6); however, modern agricultural systems are respon- sible for significant environmental impacts

Illinois at Chicago, University of

52

Safety Criteria and Safety Lifecycle for Artificial Neural Networks  

E-Print Network [OSTI]

Safety Criteria and Safety Lifecycle for Artificial Neural Networks Zeshan Kurd, Tim Kelly and Jim performance based techniques that aim to improve the safety of neural networks for safety critical applications. However, many of these techniques provide inadequate forms of safety arguments required

Kelly, Tim

53

Safety Lifecycle for Developing Safety Critical Artificial Neural Networks  

E-Print Network [OSTI]

Safety Lifecycle for Developing Safety Critical Artificial Neural Networks Zeshan Kurd, Tim Kelly. There are many techniques that aim to improve the performance of neural networks for safety-critical systems. Consequently, their role in safety-critical applications, if any, is typically restricted to advisory systems

Kelly, Tim

54

Life-Cycle Cost Analysis for Condensate Receiving System  

SciTech Connect (OSTI)

The purpose of this analysis is to determine the life-cycle costs of several options relevant to the Condensate Removal System serving the Compressed Air System (CAS) at the Yucca Mountain Site Characterization Project (YMP) Exploratory Studies Facility (ESF). The best option (least present value) will be selected as the preferred configuration to construct.

C Mellen

1995-01-18T23:59:59.000Z

55

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

56

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

57

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMUs are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

58

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

59

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H, the TCP poriion of the bandwidth can be protected. In simulation study, thefilter successfily blocked 99 SYN flooding may be blocked on the server side [1][2][6], the link bandwidth exhaustion attack must

Chao, Jonathan

60

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Life-Cycle Assessment of Electric Power Systems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life-Cycle Life-Cycle Assessment of Electric Power Systems Eric Masanet, 1 Yuan Chang, 1 Anand R. Gopal, 2 Peter Larsen, 2,3 William R. Morrow III, 2 Roger Sathre, 2 Arman Shehabi, 2 and Pei Zhai 2 1 McCormick School of Engineering and Applied Science, Northwestern University, Evanston, Illinois 60208; email: eric.masanet@northwestern.edu, yuan.chang@northwestern.edu 2 Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720; email: argopal@lbl.gov, wrmorrow@lbl.gov, rsathre@lbl.gov, ashehabi@lbl.gov, pzhai@lbl.gov 3 Management Science and Engineering Department, Stanford University, Stanford, California 94305; email: phlarsen@lbl.gov Annu. Rev. Environ. Resour. 2013. 38:107-36 First published online as a Review in Advance on August 7, 2013 The Annual Review of Environment and Resources is online at http://environ.annualreviews.org

62

Grand Challenges for Life-Cycle Assessment of Biofuels  

Science Journals Connector (OSTI)

Grand Challenges for Life-Cycle Assessment of Biofuels ... Both advocates and critics of biofuels often focus on a restricted set of scenarios that appear to reinforce their a priori beliefs about how biofuel production and use might function. ... Converting rain forest, peatland, savanna, or grassland to produce food crop-based biofuels in Brazil, southeast Asia, and the US creates a biofuel C debt by releasing 17-420 times more CO2 than the annual greenhouse gas (GHG) redns. ...

T. E. McKone; W. W. Nazaroff; P. Berck; M. Auffhammer; T. Lipman; M. S. Torn; E. Masanet; A. Lobscheid; N. Santero; U. Mishra; A. Barrett; M. Bomberg; K. Fingerman; C. Scown; B. Strogen; A. Horvath

2011-01-25T23:59:59.000Z

63

Climate Policy Decisions Require Policy-Based Lifecycle Analysis  

Science Journals Connector (OSTI)

Lifecycle analysis (LCA) metrics of greenhouse gas emissions are increasingly being used to select technologies supported by climate policy. ... For example, an economic framework used to evaluate biofuel policies in the US should at least incorporate fuel blenders, which is the sector regulated by biofuel policies, domestic and international agriculture and land markets, which are impacted by expansions in biofuels, and domestic and international fuel markets, which are affected by reduced demand for gasoline. ...

Antonio M. Bento; Richard Klotz

2014-04-18T23:59:59.000Z

64

Optimization Online - Optimal Power Grid Protection through A ...  

E-Print Network [OSTI]

Feb 22, 2013 ... Optimal Power Grid Protection through A Defender-Attacker-Defender Model. Wei Yuan (weiyuan ***at*** mail.usf.edu) Long Zhao (longzhao...

Wei Yuan

2013-02-22T23:59:59.000Z

65

Life-cycle analysis of shale gas and natural gas.  

SciTech Connect (OSTI)

The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M. (Energy Systems); ( EVS)

2012-01-27T23:59:59.000Z

66

Life-cycle cost analysis of floating offshore wind farms  

Science Journals Connector (OSTI)

Abstract The purpose of this article is to put forward a methodology in order to evaluate the Cost Breakdown Structure (CBS) of a Floating Offshore Wind Farm (FOWF). In this paper CBS is evaluated linked to Life-Cycle Cost System (LCS) and taking into account each of the phases of the FOWF life cycle. In this sense, six phases will be defined: definition, design, manufacturing, installation, exploitation and dismantling. Each and every one of these costs can be subdivided into different sub-costs in order to obtain the key variables that run the life-cycle cost. In addition, three different floating platforms will be considered: semisubmersible, Tensioned Leg Platform (TLP) and spar. Several types of results will be analysed according to each type of floating platform considered: the percentage of the costs, the value of the cost of each phase of the life-cycle and the value of the total cost in each point of the coast. The results obtained allow us to become conscious of what the most important costs are and minimize them, which is one of the most important contributions nowadays. It will be useful to improve the competitiveness of floating wind farms in the future.

Castro-Santos Laura; Diaz-Casas Vicente

2014-01-01T23:59:59.000Z

67

Modeling attacker-defender interactions in information networks.  

SciTech Connect (OSTI)

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

Collins, Michael Joseph

2010-09-01T23:59:59.000Z

68

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Environmental Management (EM)

0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

69

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Environmental Management (EM)

Analysis-2013 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2013 Handbook describes the annual supplements to the NIST Handbook 135 and NBS Special...

70

Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the "Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products" webcast, held March 28, 2013.

71

Lifecycle Analysis of Air Quality Impacts of Hydrogen and Gasoline Transportation Fuel Pathways  

E-Print Network [OSTI]

28 2.2.5.1. Hydrogen productionLifecycle Assessment of Hydrogen Production via Natural Gasconsidered: onsite hydrogen production via small-scale steam

Wang, Guihua

2008-01-01T23:59:59.000Z

72

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

73

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

74

TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.  

SciTech Connect (OSTI)

Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

Willenbring, James M.; Bartlett, Roscoe Ainsworth (Oak Ridge National Laboratory, Oak Ridge, TN); Heroux, Michael Allen

2012-01-01T23:59:59.000Z

75

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

76

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

77

Environmental life-cycle assessment of highway construction projects  

E-Print Network [OSTI]

Finland (Junnila et al 2003). The energy use and emissions from the life-cycle of the office building was assessed assuming fifty years as its service life. This study conducted an inventory as well as impact assessment on the office building as given... of office buildings in Finland. The practical aspects of this study are that more environmentally-conscious design can be made but further studies have to be conducted to standardize the results of this study in countries in a different geographic...

Rajagopalan, Neethi

2009-05-15T23:59:59.000Z

78

Societal lifecycle costs of cars with alternative fuels/engines  

Science Journals Connector (OSTI)

Effectively addressing concerns about air pollution (especially health impacts of small-particle air pollution), climate change, and oil supply insecurity will probably require radical changes in automotive engine/fuel technologies in directions that offer both the potential for achieving near-zero emissions of air pollutants and greenhouse gases and a diversification of the transport fuel system away from its present exclusive dependence on petroleum. The basis for comparing alternative automotive engine/fuel options in evolving toward these goals in the present analysis is the societal lifecycle cost of transportation, including the vehicle first cost (assuming large-scale mass production), fuel costs (assuming a fully developed fuel infrastructure), externality costs for oil supply security, and damage costs for emissions of air pollutants and greenhouse gases calculated over the full fuel cycle. Several engine/fuel options are consideredincluding current gasoline internal combustion engines and a variety of advanced lightweight vehicles: internal combustion engine vehicles fueled with gasoline or hydrogen; internal combustion engine/hybrid electric vehicles fueled with gasoline, compressed natural gas, Diesel, FischerTropsch liquids or hydrogen; and fuel cell vehicles fueled with gasoline, methanol or hydrogen (from natural gas, coal or wind power). To account for large uncertainties inherent in the analysis (for example in environmental damage costs, in oil supply security costs and in projected mass-produced costs of future vehicles), lifecycle costs are estimated for a range of possible future conditions. Under base-case conditions, several advanced options have roughly comparable lifecycle costs that are lower than for today's conventional gasoline internal combustion engine cars, when environmental and oil supply insecurity externalities are countedincluding advanced gasoline internal combustion engine cars, internal combustion engine/hybrid electric cars fueled with gasoline, Diesel, FischerTropsch liquids or compressed natural gas, and hydrogen fuel cell cars. The hydrogen fuel cell car stands out as having the lowest externality costs of any option and, when mass produced and with high valuations of externalities, the least projected lifecycle cost. Particular attention is given to strategies that would enhance the prospects that the hydrogen fuel cell car would eventually become the Car of the Future, while pursuing innovations relating to options based on internal combustion engines that would both assist a transition to hydrogen fuel cell cars and provide significant reductions of externality costs in the near term.

Joan M Ogden; Robert H Williams; Eric D Larson

2004-01-01T23:59:59.000Z

79

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

80

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Developing life-cycle phases for the DoDAF using ISO15704 Annex A (GERAM)  

Science Journals Connector (OSTI)

This paper presents a development of the US Department of Defense Architecture Framework (DoDAF) based on life-cycle concept of the Generalized Enterprise Reference Architecture and Methodology (GERAM) framework/ISO 15704:2000 requirements. Previous ... Keywords: DoDAF, Enterprise architecture, GERAM, ISO15704, Life-cycle

Kamal Chaharsooghi; Mohammad Ahmadi Achachlouei

2011-04-01T23:59:59.000Z

82

A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines  

E-Print Network [OSTI]

A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines Kay Abstract. Integrating structural health monitoring into life-cycle management strategies for wind turbines data) can effectively be used to capture the operational and structural behavior of wind turbines

Stanford University

83

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

84

Texas A&M NetID Lifecycle Management for Texas A&M University Students  

E-Print Network [OSTI]

Texas A&M NetID Lifecycle Management for Texas A&M University Students This document describes and Galveston, are admitted to both College Station and Galveston, and may even enroll for courses at both College Station and Galveston in the same semester. This section describes the student lifecycle states

85

Valuation of plug-in vehicle life-cycle air emissions and oil displacement benefits  

Science Journals Connector (OSTI)

...assumed. The life-cycle boundary includes emissions...the results of life-cycle assessment. Often...required. Gasoline, diesel, liquefied petroleum...prior work on the life cycle of petroleum products...and/or com-putable general equilibrium models with...

Jeremy J. Michalek; Mikhail Chester; Paulina Jaramillo; Constantine Samaras; Ching-Shin Norman Shiau; Lester B. Lave

2011-01-01T23:59:59.000Z

86

Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power  

Broader source: Energy.gov [DOE]

Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power

87

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

88

Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks Lan Wang, Qishi Wu, Yaoqing Liu  

E-Print Network [OSTI]

, yliu6}@memphis.edu Abstract--A recent trend in Internet denial-of-service attacks is to distribute of the Internet makes DoS defense a very challenging task. The goal of our work is to protect legitimate flows on hosts, as those hosts controlled by attackers are going to abuse the trust. In this paper, we flesh out

Wang, Lan

89

Life-cycle assessment of multi-crystalline photovoltaic (PV) systems in China  

Science Journals Connector (OSTI)

Abstract This study performs a life-cycle assessment for a photovoltaic (PV) system with multi-crystalline silicon (multi-Si) modules in China. It considers the primary energy demand, energy payback time (EPBT), and environmental impacts, such as global warming potential and eutrophication, over the entire life cycle of the PV system, including the upstream process, ranging from silica extraction to the multi-Si purification, the midstream process, involving crystalline silicon ingot growth and wafering; and the downstream process, consisting of cell and module fabrication. The data were collected with recommendations provided by the ISO norms and acquired from typical PV companies in China. The results show that the most critical phase of life cycle of Chinese PV system was the transformation of metallic silicon into solar silicon, which was characterized by high electricity consumption, representing most of the environmental impact. The other electricity generation systems were compared to PV. Considering that Chinese electricity is mainly produced by coal-fired power plants, the installation of multi-Si PV systems is recommended over exporting them from China. Furthermore, being higher solar radiation areas, areas in western China, such as the Tibet Autonomous Region, northeastern Qinghai, and the western borders of Gansu, are best suited for the installation of the PV systems even if the long distance of transportation. Finally, recommendations were provided with respect to the sustainable development of the Chinese PV industry and environmental protection.

Yinyin Fu; Xin Liu; Zengwei Yuan

2014-01-01T23:59:59.000Z

90

An Attack on Centrifugal Costs  

E-Print Network [OSTI]

AN ATTACK ON CENTRIFUGAL COSTS j P. ~,t~~c1ier Mwra~ I Mons'anto ' Alvin, 'ie~as I ABSTRACT Energy conservation in small and medium horse power industrial centrifugal power users has re ceived very little attention to date. Monsanto...

Murray, P. F.

91

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

92

11 - Environmental life-cycle assessment (LCA) of lubricants  

Science Journals Connector (OSTI)

Abstract: Lubricants impact on the environment from raw material extraction to manufacturing, usage and disposal or reuse. Life-cycle assessment (LCA) is utilised for evaluation of the environmental impacts of energy and material flows throughout the product life. Several comprehensive \\{LCAs\\} have compared mineral oil-based and bio-based lubricants, reporting varying conclusions. Environmental savings of biolubricants are more apparent at a local level than at a global scale. Negative impacts mainly stem from their agricultural production and performance in the use phase. \\{LCAs\\} should be used in industrial product design of biolubricants. Sustainable development indicators also consider the socio-economic impact of a product. Optimised lubricants determine significant energy savings.

Jan C.J. Bart; Emanuele Gucciardi; Stefano Cavallaro

2013-01-01T23:59:59.000Z

93

Life-cycle GHG emission Factors of Final Energy in China  

Science Journals Connector (OSTI)

Abstract In this manuscript, a model for the estimation of the life-cycle GHG emission factors of final energy and an empirical study of China is presented. A linear programming method is utilized to solve the problem that several forms of final energy are utilized in the life-cycle of one certain type of final energy. Nine types of final energy are considered, including raw coal, crude oil, raw natural gas, treated coal, diesel, gasoline, fuel oil, treated natural gas, and electricity. The results indicate that the life-cycle GHG emission factors of final energy in China slightly decreased in recent years.

Jiang Lixue; Ou Xunmin; Ma Linwei; Li Zheng; Ni Weidou

2013-01-01T23:59:59.000Z

94

Modeling attacks on physical unclonable functions  

E-Print Network [OSTI]

We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm ...

Ulrich, Ruhrmair

95

Life-Cycle Analysis and Energy Efficiency in State Buildings | Department  

Broader source: Energy.gov (indexed) [DOE]

Life-Cycle Analysis and Energy Efficiency in State Buildings Life-Cycle Analysis and Energy Efficiency in State Buildings Life-Cycle Analysis and Energy Efficiency in State Buildings < Back Eligibility State Government Savings Category Heating & Cooling Commercial Heating & Cooling Cooling Home Weatherization Construction Commercial Weatherization Design & Remodeling Heating Appliances & Electronics Water Heating Bioenergy Manufacturing Buying & Making Electricity Alternative Fuel Vehicles Hydrogen & Fuel Cells Energy Sources Solar Water Wind Program Info State Missouri Program Type Energy Standards for Public Buildings Provider Office of Administration Several provisions of Missouri law govern energy efficiency in state facilities. In 1993 Missouri enacted legislation requiring life-cycle cost analysis for all new construction of state buildings and substantial

96

Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products  

Broader source: Energy.gov [DOE]

This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL...

97

Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production  

E-Print Network [OSTI]

Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production Transportation Energy The Issue Algae biofuels directly address the Energy Commission's Public Interest Energy Research fuels more carbonintensive than conventional biofuels. Critics of this study argue that alternative

98

Life-cycle Environmental Inventory of Passenger Transportation in the United States  

E-Print Network [OSTI]

Component Sources Energy (Sources,Energy,&GHG)GHG(CO 2 e) GJ/veh. GJ/veh. GJ/veh. GJ/veh. MJ/an average trip. Life-cycle GHG emissions range from 480 g

Chester, Mikhail V

2008-01-01T23:59:59.000Z

99

Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems  

Broader source: Energy.gov [DOE]

A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

100

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2010  

Broader source: Energy.gov [DOE]

Report describes the 2010 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities.

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

Not Available

2010-11-01T23:59:59.000Z

102

Life-Cycle Water Impacts of U.S. Transportation Fuels  

E-Print Network [OSTI]

144 Figure 63: Impact of Hydroelectricity on the Life-Cycle157 Figure 64: Impact of Hydroelectricity on the Water68 Table 14: Hydroelectricity-Related FWSE (Data Source: (

Scown, Corinne Donahue

2010-01-01T23:59:59.000Z

103

Fuel Life-Cycle Analysis of Hydrogen vs. Conventional Transportation Fuels.  

E-Print Network [OSTI]

??Fuel life-cycle analyses were performed to compare the affects of hydrogen on annual U.S. light-duty transportation emissions in future year 2030. Five scenarios were developed (more)

DeGolyer, Jessica Suzanne

2008-01-01T23:59:59.000Z

104

Water Loss Control Using Pressure Management: Life-cycle Energy and Air Emission Effects  

Science Journals Connector (OSTI)

Pressure management is one cost-effective and efficient strategy for controlling water distribution losses. This paper evaluates the life-cycle energy use and emissions for pressure management zones in Philadelphia, Pennsylvania, and Halifax, Nova Scotia. ...

Jennifer R. Stokes; Arpad Horvath; Reinhard Sturm

2013-07-19T23:59:59.000Z

105

Alternative water sources: Desalination model provides life-cycle costs of facility  

E-Print Network [OSTI]

Story by Danielle Supercinski tx H2O | pg. 8 Alternative water sourcees Desalination model provides life-cycle costs of facility platform and design standards as DESAL ECONOMICS?, but created to analyze con- ventional surface water treatment... to determine the economic and financial life-cycle costs of building and operating four water treatment facilities in South Texas. One facility was the Southmost Regional Water Authority Regional Desalination Plant near Brownsville. Sturdi- vant said...

Supercinski, Danielle

2009-01-01T23:59:59.000Z

106

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

107

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

108

National Infrastructure Protection Plan | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Protection Plan Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation's CI/KR as weapons of mass destruction could have even more

109

Life-cycle analysis of alternative aviation fuels in GREET  

SciTech Connect (OSTI)

The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet fuel production unless carbon management practices, such as carbon capture and storage, are used.

Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S. (Energy Systems)

2012-07-23T23:59:59.000Z

110

Protection 1 Protection 1  

E-Print Network [OSTI]

Protection 1 Protection 1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system--- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

Lampson, Butler W.

111

Protection 1 Protection1  

E-Print Network [OSTI]

Protection 1 Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system-- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

Lampson, Butler W.

112

Design and Evaluation of an FPGA Architecture for Software Protection  

E-Print Network [OSTI]

attacks on software systems have become a rapidly growing burden. The growing area of software protection protection using hardware/software codesign techniques. In Proc. of Design, Automation, and Test in EuropeDesign and Evaluation of an FPGA Architecture for Software Protection Joseph Zambreno Department

Zambreno, Joseph A.

113

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve  

E-Print Network [OSTI]

Engineering, University College Cork Email: {andrewb,liam,francisc}@rennes.ucc.ie LIRMM, CNRS - Univ, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy. The protected double and add algorithm provides a simple solution to this problem but is costly in terms

Paris-Sud XI, Université de

114

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Ning, Peng

115

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power transmis the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Reiter, Michael

116

Life-Cycle Energy Demand of Computational Logic:From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU  

E-Print Network [OSTI]

Boyd et al. : Life-cycle energy demand and global warmingLife-Cycle Energy Demand of Computational Logic: From High-to assess the life-cycle energy demand of its products for

Bol, David; Boyd, Sarah; Dornfeld, David

2011-01-01T23:59:59.000Z

117

Life-Cycle Energy Demand of Computational Logic: From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU  

E-Print Network [OSTI]

Boyd et al. : Life-cycle energy demand and global warmingLife-Cycle Energy Demand of Computational Logic: From High-to assess the life-cycle energy demand of its products for

Bol, David; Boyd, Sarah; Dornfeld, David

2011-01-01T23:59:59.000Z

118

Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality  

E-Print Network [OSTI]

Quantum cryptographic protocols based on complementarity are nonsecure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks, and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

Adan Cabello; Vincenzo D'Ambrosio; Eleonora Nagali; Fabio Sciarrino

2011-09-12T23:59:59.000Z

119

Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel Production Speaker(s): Corinne Scown Date: January 31, 2012 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Michael Sohn If the goal of science is to understand the structure and behavior of the physical and natural world, and the goal of engineering is to design, build, and manage systems that serve society's needs, then the study of civil infrastructure systems acts as a link between the two. Understanding the reliance of engineered systems on constrained natural resources, as well as their impact on human well-being and the environment, is key to building and maintaining infrastructure that is sustainable in the broader sense. This talk will explore the important role of life-cycle assessment and optimization in assessing such questions as: a.)

120

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010  

Broader source: Energy.gov (indexed) [DOE]

5 5 (Rev. 5/10) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 May 2010 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2010 to March 31, 2011 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

April 2005 April 2005 NISTIR 85-3273-26 (Rev. 9/11) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program September 2011 NISTIR 85-3273-26 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2011 to March 31, 2012 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

122

Dataset Lifecycle Policy Development & Implementation at the PO.DAAC AGU Paper Number: IN53C-1579  

E-Print Network [OSTI]

Dataset Lifecycle Policy Development & Implementation at the PO.DAAC AGU Paper Number: IN53C-1579 Dataset Lifecycle Policy Development & Implementation at the PO.DAAC National Aeronautics and Space Aeronautics and Space Administration Jet Propulsion Laboratory/California Institute of Technology II. Dataset

Wright, Dawn Jeannine

123

Practical Attacks on Proximity Identification Systems  

E-Print Network [OSTI]

DEFCON ­ eavesdropped RFID at 20 m Confusion ?? RFID type Definition of distances Experimental setup skimming) Relay Attacks Practical Attacks on Proximity Identification Systems ­ p. #12;"Proximity from distance dE Further considerations dRT , Reader Token communication dTR, Token Reader

Hancke, Gerhard

124

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats  

Science Journals Connector (OSTI)

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats ... Emerging environmental threats such as novel chemical compounds, biological agents, and nanomaterials present serious challenges to traditional models of risk analysis and regulatory risk management processes. ... The recent emergence of new materials, technologies, and other environmental stressors in both the marketplace and the public consciousness coincides with increased recognition of the importance of an integrated systems approach to environmental health and safety that includes life-cycle thinking, public participation, and adaptive management of risks associated with emerging threats. ...

Igor Linkov; Thomas P. Seager

2011-04-27T23:59:59.000Z

125

Rogatus a planned open source toolset to cover the whole lifecycle  

E-Print Network [OSTI]

- Questionnaire Builder (DIPF/GESIS/TBA21/OPIT) Metadata Tools by Metadata Technologies USA DesignQuest (GESIS) And a lot more (sorry if I forgot your particular tool) * Rogatus QMMS a planned Open Source solution for the whole lifecycle Lawrence, 01... No Nesstar-like dissemination tool for analysis Currently much more DDI-C users than DDI-L users due to existing tooling Question for DDI-L -> which tools does the user really need? Answer might be derived from well-known models regarding DDI-L DDI Lifecycle...

Barkow, Ingo; Schiller, David

2013-04-02T23:59:59.000Z

126

Comment on Life-Cycle Analysis of Alternative Automobile Fule/Propulsion Technologies  

Science Journals Connector (OSTI)

Comment on Life-Cycle Analysis of Alternative Automobile Fule/Propulsion Technologies ... It should also be noted that the GHG emissions attributable to electric vehicles are not reported at all, except in Table 1 where they are listed as comparable to the 1998 Ford Taurus, which serves as the baseline vehicle. ... A life-cycle perspective analyzed fossil fuels (conventional unleaded and reformulated gasolines, low S reformulated diesel, compressed natural gas [CNG]), biomass ethanol, and electricity together with current and advanced internal combustion engines (ICE, indirect [port] and direct injection, spark, and compression ignited) and elec. ...

Thomas P. Seager; Randy L. Brown

2001-03-17T23:59:59.000Z

127

Trust Anchor Fact Sheet.cdr  

Broader source: Energy.gov (indexed) [DOE]

Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Sandia National Laboratories The Concept The Approach Commercial-off-the-shelf energy control systems and components are primarily designed, produced, and maintained by foreign companies. With control of commercial hardware and software supply chains and routine access through configuration and updates, foreign developers have an unprecedented

128

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

129

Life-cycle analysis and the ecology of Sarah C. Davis1,2  

E-Print Network [OSTI]

far been used for bioenergy LCA [5,9]. We conducted a literature search of published studies, however, consider- able uncertainty in the scientific literature about their ecological benefit. Here, we review studies that apply life-cycle analysis (LCA), a computational tool for asses- sing the efficiency

DeLucia, Evan H.

130

Valuation of plug-in vehicle life-cycle air emissions and oil displacement benefits  

Science Journals Connector (OSTI)

...of life-cycle air emissions and oil consumption from conventional vehicles, hybrid-electric...efficient approach to emissions and oil consumption reduction, lifetime cost of plug-in...average car vs. $0.004mi for an electric car on an average driving time and location...

Jeremy J. Michalek; Mikhail Chester; Paulina Jaramillo; Constantine Samaras; Ching-Shin Norman Shiau; Lester B. Lave

2011-01-01T23:59:59.000Z

131

TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING  

E-Print Network [OSTI]

TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING K. Smarsly1) strategies can enable wind turbine manufacturers, owners, and operators to precisely schedule maintenance behavior of wind turbines and to reduce (epistemic) uncertainty. Both the resistance parameters

Stanford University

132

Suryn-Abran Consolidated Quality Lifecycle (CQL) Model -the Applicative Evolution  

E-Print Network [OSTI]

defined and later published the consolidated model for integrating quality engineering into software to speak � engineer) the quality of the software product throughout its entire lifecycle. The model software engineering and software quality engineering and on the results obtained during several workshop

Suryn, Witold

133

Stochastic Life-cycle Analysis of Deteriorating Infrastructure Systems and an Application to Reinforced Concrete Bridges  

E-Print Network [OSTI]

proposes RTLCA, a renewal theory based LCA model, to predict the life-cycle performance of deteriorating systems taking into account not only the life-time reliability but also the costs associated with operating a system. In addition, this research...

Ramesh Kumar, 1982-

2012-11-30T23:59:59.000Z

134

Economic Input?Output Life-Cycle Assessment of Trade Between Canada and the United States  

Science Journals Connector (OSTI)

We use an economic input?output life-cycle assessment (EIO-LCA) technique to estimate the economy-wide energy intensity and greenhouse gas (GHG) emissions intensity for 45 manufacturing and resource sectors in Canada and the United States. ... Support?Activities?for?Agriculture ...

Jonathan Norman; Alex D. Charpentier; Heather L. MacLean

2007-01-23T23:59:59.000Z

135

Transportation Center Seminar... Life-Cycle Analysis of Transportation Fuels and Vehicle  

E-Print Network [OSTI]

with life-cycle analysis (LCA). In fact, LCA of transportation fuels and vehicle systems has a history of more than 30 years. Over this period, LCA methodologies have evolved and critical data have become readily available. This is especially true in the past ten years when LCA has been applied extensively

Bustamante, Fabián E.

136

Supporting the Full BPM Life-Cycle Using Process Mining and Intelligent Redesign  

E-Print Network [OSTI]

Supporting the Full BPM Life-Cycle Using Process Mining and Intelligent Redesign Wil M.P. van der.aalst,m.netjes,h.a.reijers@tm.tue.nl Abstract. Business Process Management (BPM) systems provide a broad range of facilities to enact and manage operational business processes. Ideally, these systems should provide support for the complete BPM life

van der Aalst, Wil

137

CURATION AND PRESERVATION OF CAD ENGINEERING MODELS IN PRODUCT LIFECYCLE MANAGEMENT  

E-Print Network [OSTI]

purchased as services rather than artefacts. For engineering companies, this shift entails a commitment practices. This business model is applicable in the engineering, manufacturing, contracting and serviceCURATION AND PRESERVATION OF CAD ENGINEERING MODELS IN PRODUCT LIFECYCLE MANAGEMENT M. Patel a , A

Rzepa, Henry S.

138

Valuation of plug-in vehicle life-cycle air emissions and oil displacement benefits  

E-Print Network [OSTI]

potential of plug-in vehicles remains small compared to ownership cost. As such, to offer a socially efficient approach to emissions and oil consumption reduction, lifetime cost of plug-in vehicles mustValuation of plug-in vehicle life-cycle air emissions and oil displacement benefits Jeremy J

Michalek, Jeremy J.

139

Life-Cycle Cost Study for a Low-Level Radioactive Waste Disposal Facility in Texas  

SciTech Connect (OSTI)

This report documents the life-cycle cost estimates for a proposed low-level radioactive waste disposal facility near Sierra Blanca, Texas. The work was requested by the Texas Low-Level Radioactive Waste Disposal Authority and performed by the National Low-Level Waste Management Program with the assistance of Rogers and Associates Engineering Corporation.

B. C. Rogers; P. L. Walter (Rogers and Associates Engineering Corporation); R. D. Baird

1999-08-01T23:59:59.000Z

140

Project Information Form Project Title Reduction of Lifecycle Green House Gas Emissions From Road  

E-Print Network [OSTI]

Project Information Form Project Title Reduction of Lifecycle Green House Gas Emissions From Road@ucdavis.edu Funding Source(s) and Amounts Provided (by each agency or organization) US DOT $30,000 Total Project Cost Brief Description of Research Project This white paper will summarize the state of knowledge and state

California at Davis, University of

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

MANAGING SHORT-LIFECYCLE TECHNOLOGY PRODUCTS FOR AGERE S. David Wu  

E-Print Network [OSTI]

characterization tools for capacity planning and capacity negotiation with their global supply partners with correlation values ranging from 0.51 to 0.95. These findings have significant implications to capacity classification: 1. An Overview of Short-Lifecycle Technology Markets In the mid to late 1990's, high- tech

Wu, David

142

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2012  

Broader source: Energy.gov [DOE]

Report provides tables of present-value factors for use in the life-cycle cost analysis of capital investment projects for federal facilities. It also provides energy price indices based on the U.S. Department of Energy (DOE) forecasts from 2012 to 2042.

143

Project Information Form Project Title The Development of Lifecycle Data for Hydrogen Fuel Production and  

E-Print Network [OSTI]

Project Information Form Project Title The Development of Lifecycle Data for Hydrogen Fuel will be technologies and fuels related to renewable hydrogen. The literature review will produce a set of hydrogen hydrogen or hydrogen produced with technologies or fuels not currently in the LCFS. The study will assess

California at Davis, University of

144

The Role of Institutions in Transatlantic Employment Differences: A Life-Cycle  

E-Print Network [OSTI]

The Role of Institutions in Transatlantic Employment Differences: A Life-Cycle View Arnaud Chéron [2008] have acknowledged that any quantitative anal- ysis of transatlantic differences in the labor more particularly on a transatlantic comparison between France and the US: · Fact 1: The age

Paris-Sud XI, Université de

145

Development of the Household Sample for Furnace and Boiler Life-Cycle Cost  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Analysis Title Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Analysis Publication Type Report LBNL Report Number LBNL-55088 Year of Publication 2005 Authors Whitehead, Camilla Dunham, Victor H. Franco, Alexander B. Lekov, and James D. Lutz Document Number LBNL-55088 Pagination 22 Date Published May 31 Publisher Lawrence Berkeley National Laboratory City Berkeley Abstract Residential household space heating energy use comprises close to half of all residential energy consumption. Currently, average space heating use by household is 43.9 Mbtu for a year. An average, however, does not reflect regional variation in heating practices, energy costs, or fuel type. Indeed, a national average does not capture regional or consumer group cost impacts from changing efficiency levels of heating equipment. The US Department of Energy sets energy standards for residential appliances in, what is called, a rulemaking process. The residential furnace and boiler efficiency rulemaking process investigates the costs and benefits of possible updates to the current minimum efficiency regulations. Lawrence Berkeley National Laboratory (LBNL) selected the sample used in the residential furnace and boiler efficiency rulemaking from publically available data representing United States residences. The sample represents 107 million households in the country. The data sample provides the household energy consumption and energy price inputs to the life-cycle cost analysis segment of the furnace and boiler rulemaking. This paper describes the choice of criteria to select the sample of houses used in the rulemaking process. The process of data extraction is detailed in the appendices and is easily duplicated.The life-cycle cost is calculated in two ways with a household marginal energy price and a national average energy price. The LCC results show that using an national average energy price produces higher LCC savings but does not reflect regional differences in energy price.

146

Life-cycle costs for the Department of Energy Waste Management Programmatic Environmental Impact Statement  

SciTech Connect (OSTI)

The US Department of Energy (DOE) Office of Environmental Management has produced a Programmatic Environmental Impact Statement (PEIS) in order to assess the potential consequences resulting from a cross section of possible waste management strategies for the DOE complex. The PEIS has been prepared in compliance with the NEPA and includes evaluations of a variety of alternatives. The analysis performed for the PEIS included the development of life-cycle cost estimates for the different waste management alternatives being considered. These cost estimates were used in the PEIS to support the identification and evaluation of economic impacts. Information developed during the preparation of the life-cycle cost estimates was also used to support risk and socioeconomic analyses performed for each of the alternatives. This technical report provides an overview of the methodology used to develop the life-cycle cost estimates for the PEIS alternatives. The methodology that was applied made use of the Waste Management Facility Cost Information Reports, which provided a consistent approach and estimating basis for the PEIS cost evaluations. By maintaining consistency throughout the cost analyses, life-cycle costs of the various alternatives can be compared and evaluated on a relative basis. This technical report also includes the life-cycle cost estimate results for each of the PEIS alternatives evaluated. Summary graphs showing the results for each waste type are provided and tables showing different breakdowns of the cost estimates are provided. Appendix E contains PEIS cost information that was developed using an approach different than the standard methodology described in this report. Specifically, costs for high-level waste are found in this section, as well as supplemental costs for additional low-level waste and hazardous waste alternatives.

Sherick, M.J.; Shropshire, D.E.; Hsu, K.M.

1996-09-01T23:59:59.000Z

147

Injection Technologies for Fault Attacks on Microprocessors  

Science Journals Connector (OSTI)

The fault injection technique we will analyze in detail in Sect.16.3, is the constant under-powering of a computing device. By running the chip with a depleted power supply, the attacker is able to insert transi...

Alessandro Barenghi; Guido M. Bertoni; Luca Breveglieri

2012-01-01T23:59:59.000Z

148

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

149

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

150

Predicting the effect of climate change on wildfire behavior and initial attack success  

SciTech Connect (OSTI)

This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

2007-12-01T23:59:59.000Z

151

Survey on Security Threats and Protection Mechanisms  

E-Print Network [OSTI]

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

152

Trojan-horse attacks threaten the security of practical quantum cryptography  

E-Print Network [OSTI]

A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

Nitin Jain; Elena Anisimova; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-06-23T23:59:59.000Z

153

Optimizing protections against cascades in network systems: a modified binary  

E-Print Network [OSTI]

to the topology of an electricity infrastructure, i.e. the 380 kV Italian power transmission network. We only protection; line switching; cascading failure; differential evolution algorithm; multi-objective optimization protection (NP) by line switching, done automatically or by a system operator, following an attack

Paris-Sud XI, Université de

154

LBNL-54244 Life-cycle Cost and Payback Period Analysis for Commercial Unitary Air Conditioners  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

44 44 Life-cycle Cost and Payback Period Analysis for Commercial Unitary Air Conditioners Greg Rosenquist, Katie Coughlin, Larry Dale, James McMahon, Steve Meyers Energy Analysis Department Environmental Energy Technologies Division Ernest Orlando Lawrence Berkeley National Laboratory University of California Berkeley, CA 94720 March 2004 This work was supported by the Office of Building Technologies of the U.S. Department of Energy, under Contract No. DE-AC03-76SF00098. ii iii ABSTRACT This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results

155

Step 6: Complete the ENERGY STAR lifecycle | ENERGY STAR Buildings & Plants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6: Complete the ENERGY STAR lifecycle 6: Complete the ENERGY STAR lifecycle Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Why design to earn ENERGY STAR Design to earn ENERGY STAR Step 1: Include efficiency in your project specs Step 2: Meet with your team and set a goal Step 3: Apply for Designed to Earn the ENERGY STAR recognition Step 4: Market your project as Designed to Earn the ENERGY STAR

156

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2013  

Broader source: Energy.gov (indexed) [DOE]

8 8 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-28 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-28 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-28

157

A Review of Battery Life-Cycle Analysis: State of Knowledge and Critical Needs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Battery Life-Cycle Analysis: Battery Life-Cycle Analysis: State of Knowledge and Critical Needs ANL/ESD/10-7 Energy Systems Division Availability of This Report This report is available, at no cost, at http://www.osti.gov/bridge. It is also available on paper to the U.S. Department of Energy and its contractors, for a processing fee, from: U.S. Department of Energy Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831-0062 phone (865) 576-8401 fax (865) 576-5728 reports@adonis.osti.gov Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor UChicago Argonne, LLC, nor any of their employees or officers, makes any warranty, express

158

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012  

Broader source: Energy.gov (indexed) [DOE]

7 7 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-27 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-27 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-27

159

Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6719 6719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report NREL/TP-560-46719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden Prepared under Task No. H278.3400 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government.

160

Improving building life-cycle information management through documentation and communication of project objectives  

SciTech Connect (OSTI)

Most currently available computer tools for the building industry proffer little more than productivity improvement in the transmission of graphical drawings and textual specifications, without addressing more fundamental changes in building life-cycle information management. This paper describes preliminary research into the development of a framework for the documentation and communication of the project objectives of a building project. When implemented in an interactive networked environment, this framework is intended to promote multiple participant involvement in the establishment and use of a common set of explicit goals, from the earliest phase of a project throughout its life cycle. A number of potential applications for this framework are identified. The requirements for integrating this life-cycle information with a product model of the physical design of a building, in an attempt to document and communicate design intent, are also discussed.

Hitchcock, R.J.

1995-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Life-cycle energy analyses of electric vehicle storage batteries. Final report  

SciTech Connect (OSTI)

The results of several life-cycle energy analyses of prospective electric vehicle batteries are presented. The batteries analyzed were: Nickel-zinc; Lead-acid; Nickel-iron; Zinc-chlorine; Sodium-sulfur (glass electrolyte); Sodium-sulfur (ceramic electrolyte); Lithium-metal sulfide; and Aluminum-air. A life-cycle energy analysis consists of evaluating the energy use of all phases of the battery's life, including the energy to build it, operate it, and any credits that may result from recycling of the materials in it. The analysis is based on the determination of three major energy components in the battery life cycle: Investment energy, i.e., The energy used to produce raw materials and to manufacture the battery; operational energy i.e., The energy consumed by the battery during its operational life. In the case of an electric vehicle battery, this energy is the energy required (as delivered to the vehicle's charging circuit) to power the vehicle for 100,000 miles; and recycling credit, i.e., The energy that could be saved from the recycling of battery materials into new raw materials. The value of the life-cycle analysis approach is that it includes the various penalties and credits associated with battery production and recycling, which enables a more accurate determination of the system's ability to reduce the consumption of scarce fuels. The analysis of the life-cycle energy requirements consists of identifying the materials from which each battery is made, evaluating the energy needed to produce these materials, evaluating the operational energy requirements, and evaluating the amount of materials that could be recycled and the energy that would be saved through recycling. Detailed descriptions of battery component materials, the energy requirements for battery production, and credits for recycling, and the operational energy for an electric vehicle, and the procedures used to determine it are discussed.

Sullivan, D; Morse, T; Patel, P; Patel, S; Bondar, J; Taylor, L

1980-12-01T23:59:59.000Z

162

Long-Term Shifts in Life-Cycle Energy Efficiency and Carbon Intensity  

Science Journals Connector (OSTI)

System-level life-cycle efficiency may decrease as mitigation efforts intensify, since low-efficiency renewable systems with high output have much lower GHG emissions than some high-efficiency fossil fuel systems. ... Climate policies accelerate both improvements in EF and the adoption of renewable technologies, resulting in considerably lower primary energy demand and GHG emissions. ... Schipper, L.; Saenger, C.; Sudardshan, A.Transport and carbon emissions in the United States: The Long View Energies 2011, 4, 563 581 ...

Sonia Yeh; Gouri Shankar Mishra; Geoff Morrison; Jacob Teter; Raul Quiceno; Kenneth Gillingham; Xavier Riera-Palou

2013-02-14T23:59:59.000Z

163

When Utility Bills Attack! | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

164

Zero-knowledge against quantum attacks  

E-Print Network [OSTI]

This paper proves that several interactive proof systems are zero-knowledge against quantum attacks. This includes a few well-known classical zero-knowledge proof systems as well as quantum interactive proof systems for the complexity class HVQSZK, which comprises all problems having "honest verifier" quantum statistical zero-knowledge proofs. It is also proved that zero-knowledge proofs for every language in NP exist that are secure against quantum attacks, assuming the existence of quantum computationally concealing commitment schemes. Previously no non-trivial proof systems were known to be zero-knowledge against quantum attacks, except in restricted settings such as the honest-verifier and common reference string models. This paper therefore establishes for the first time that true zero-knowledge is indeed possible in the presence of quantum information and computation.

John Watrous

2005-11-03T23:59:59.000Z

165

Responding to chemical attack. Final report  

SciTech Connect (OSTI)

In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

Bagley, R.W.

1991-02-11T23:59:59.000Z

166

warhead protection  

National Nuclear Security Administration (NNSA)

1%2A en Office of Nuclear Warhead Protection http:nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-0

167

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

168

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

169

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

170

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

171

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

172

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer ...

Ruhrmair, Ulrich

173

Fatal Chimpanzee Attack in Loango National Park, Gabon  

E-Print Network [OSTI]

Fatal Chimpanzee Attack in Loango National Park, Gabon Christophe Boesch & Josephine Head & Nikki a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found or habituation. Keywords chimpanzees . fatal attack . gabon . intergroup conflict Introduction Chimpanzee social

174

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

175

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

176

Variability Assessment of Groundwater Exposure to Pesticides and Its Consideration in Life-Cycle Assessment  

Science Journals Connector (OSTI)

In the present paper, leaching scenarios typical in European agriculture are defined. ... Due to the inherent toxicity of many pesticides, the application of pesticides in agriculture has been extensively assessed with tools such as risk assessment and, less frequently, with life-cycle assessment (LCA). ... The goal of this paper is (a) to assess the variability of pesticide leaching to groundwater in EU agriculture, (b) to quantify the contribution of substance-property, site, and farming-practice parameters to variability, thus identifying the most important parameters for consideration in the assessment of pesticide leaching, and (c) to suggest pos sibilities for incorporating such variability assessment in LCA. ...

Georg Geisler; Stefanie Hellweg; Simon Liechti; Konrad Hungerbhler

2004-07-17T23:59:59.000Z

177

The process of life-cycle cost analysis on the Fernald Environmental Management Project  

SciTech Connect (OSTI)

The Estimating Services Department of the Fernald Environmental Restoration Management Corporation (FERMCO) is formalizing the process of life-cycle cost analysis (LCCA) for the Fernald Environmental Management Project (FEMP). The LCCA process is based on the concepts, principles, and guidelines described by applicable Department of Energy`s (DOE) orders, pertinent published literature, and the National Bureau of Standards handbook 135. LCC analyses will be performed following a ten-step process on the FEMP at the earliest possible decision point to support the selection of the least-cost alternatives for achieving the FERMCO mission.

Chang, D.Y.; Jacoboski, J.A.; Fisher, L.A.; Beirne, P.J.

1993-10-07T23:59:59.000Z

178

Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst  

E-Print Network [OSTI]

Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst, The Netherlands m.netjes@tm.tue.nl Abstract. Business Process Management (BPM) systems provide a broad range for the complete BPM life-cycle: (re)design, configuration, execution, control, and diagnosis of processes

van der Aalst, Wil

179

Semantic Awareness in Product Lifecycle Management Systems Casey James Baker, Douglas Eddy, Dr. Sundar Krishnamurty, Dr. Ian Grosse, Dr. Jack Wileden  

E-Print Network [OSTI]

Semantic Awareness in Product Lifecycle Management Systems Casey James Baker, Douglas Eddy, Dr enterprises turn to Product Lifecycle Management (PLM) systems to organize product development and to reduce), in which the PLM system was used to help with the design and fabrication of a product. Windchill

Mountziaris, T. J.

180

Fire Protection  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Standard was developed to provide acceptable methods and approaches for meeting DOE fire protection program and design requirements and to address special or unique fire protection issues at DOE facilities that are not comprehensively or adequately addressed in national consensus standards or other design criteria.

2012-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

182

Comparative life-cycle cost analysis for low-level mixed waste remediation alternatives  

SciTech Connect (OSTI)

The purpose of this study is two-fold: (1) to develop a generic, life-cycle cost model for evaluating low-level, mixed waste remediation alternatives, and (2) to apply the model specifically, to estimate remediation costs for a site similar to the Fernald Environmental Management Project near Cincinnati, OH. Life-cycle costs for vitrification, cementation, and dry removal process technologies are estimated. Since vitrification is in a conceptual phase, computer simulation is used to help characterize the support infrastructure of a large scale vitrification plant. Cost estimating relationships obtained from the simulation data, previous cost estimates, available process data, engineering judgment, and expert opinion all provide input to an Excel based spreadsheet for generating cash flow streams. Crystal Ball, an Excel add-on, was used for discounting cash flows for net present value analysis. The resulting LCC data was then analyzed using multi-attribute decision analysis techniques with cost and remediation time as criteria. The analytical framework presented allows alternatives to be evaluated in the context of budgetary, social, and political considerations. In general, the longer the remediation takes, the lower the net present value of the process. This is true because of the time value of money and large percentage of the costs attributed to storage or disposal.

Jackson, J.A.; White, T.P.; Kloeber, J.M.; Toland, R.J.; Cain, J.P.; Buitrago, D.Y.

1995-03-01T23:59:59.000Z

183

The Chicago Center for Green Technology: life-cycle assessment of a brownfield redevelopment project  

Science Journals Connector (OSTI)

The sustainable development of brownfields reflects a fundamental, yet logical, shift in thinking and policymaking regarding pollution prevention. Life-cycle assessment (LCA) is a tool that can be used to assist in determining the conformity of brownfield development projects to the sustainability paradigm. LCA was applied to the process of a real brownfield redevelopment project, now known as the Chicago Center for Green Technology, to determine the cumulative energy required to complete the following redevelopment stages: (1)brownfield assessment and remediation, (2)building rehabilitation and site development and (3)ten years of operation. The results of the LCA have shown that operational energy is the dominant life-cycle stage after ten years of operation. The preservation and rehabilitation of the existing building, the installation of renewable energy systems (geothermal and photovoltaic) on-site and the use of more sustainable building products resulted in 72 terajoules (TJ) of avoided energy impacts, which would provide 14 years of operational energy for the site.

Thomas Brecheisen; Thomas Theis

2013-01-01T23:59:59.000Z

184

Cattail Protection  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cattail Protection Cattail Protection Name: Julie Location: N/A Country: N/A Date: N/A Question: Is a piece of land protected by cattails protected? (Meaning you can not touch, cover up or build on.) Replies: Hi Julie, It's quite possible that a piece of land with cattails is protected as a wetland. There are some federal (and probably state) statutes on wetland protection, in general you have to file environmental impact statements and such. I've heard of cases where some large projects were allowed to encroach on wetlands when the builders signed contracts requiring they construct a wetland of equivalent size on another parcel of land. Donald Yee Ph.D. I assume you are referring to wetlands protections. Cattails are wetland plants, and there are regulations governing - but not necessarily preventing - the development of wetlands, but cattails are also aggressive and somewhat weedy, so I doubt the presence of cattails alone would be sufficient to call an area a wetland. This is a technical question which all too often lands in legal dispute. Check with the Corps of Engineers, the EPA, and other experts in wetlands delineation and regulation.

185

Protective Force  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for management and operation of the DOE Protective Force (PF), establishes requirements for firearms operations and defines the firearms courses of fire. Cancels: DOE M 473.2-1A DOE M 473.2-2

2005-08-26T23:59:59.000Z

186

Physical Protection  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Cancels: DOE M 473.1-1 and DOE M 471.2-1B.

2005-08-26T23:59:59.000Z

187

Physical Protection  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Chg 1, dated 3/7/06. Cancels: DOE M 473.1-1 and DOE M 471.2-1B

2005-08-26T23:59:59.000Z

188

Protective Force  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes requirements for management and operation of the DOE Protective Force, establishes requirements for firearms operations and defines the firearms courses of fire. Chg 1 dated 3/7/06. DOE M 470.4-3A cancels DOE M 470.4-3, Chg 1, Protective Force, dated 3-7-06, Attachment 2, Contractor Requirement Document (CRD) only (except for Section C). Chg 1, dated 3-7-06, cancels DOE M 470.4-3

2006-03-07T23:59:59.000Z

189

Comment on Effects of Ethanol on Vehicle Energy Efficiency and Implications on Ethanol Life-Cycle Greenhouse Gas Analysis  

Science Journals Connector (OSTI)

Mechanical Engineering School, University of Campinas, Brazilian Bioethanol Science and Technology Laboratory (CTBE), CNPEM/ABTLuS, Campinas, Brazil ... Without belaboring their use of efficiency, this argument is not a novel conclusion from their work, as the functional unit used in many biofuel life-cycle studies and renewable fuel policies is fuel energy content and/or vehicle efficiency-adjusted travel distance. ...

Bret Strogen; Simone Pereira Souza; Jeffrey R. Lidicker

2014-08-04T23:59:59.000Z

190

Molasses for ethanol: The economic and environmental impacts of a new pathway for the lifecycle greenhouse gas  

E-Print Network [OSTI]

Molasses for ethanol: The economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol Anand R Gopal1,4,6 and Daniel M Kammen1,2,3,5 1 Energy supplying country for the production of sugarcane ethanol; fresh mill-pressed cane juice from a Brazilian

Kammen, Daniel M.

191

Service Engineering Life-cycles Jean-Luc Garnier Jean-Philippe Auzelle Claude Pourcel Marc Peyrichon  

E-Print Network [OSTI]

1/15 Service Engineering Life-cycles Jean-Luc Garnier Jean-Philippe Auzelle Claude Pourcel Marc, this paper provides foundation principles of service engineering with description of terms and concepts; life this period, as no real engineering process and business logic were foreseen, "SOA (service-oriented approach

Boyer, Edmond

192

Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (United States). Civil and Environmental Engineering Department

2007-09-15T23:59:59.000Z

193

A Life-Cycle Approach To Technology, Infrastructure, And Climate Policy Decision Making: Transitioning To Plug-In  

E-Print Network [OSTI]

A Life-Cycle Approach To Technology, Infrastructure, And Climate Policy Decision Making: Transitioning To Plug-In Hybrid Electric Vehicles And Low-Carbon Electricity A Dissertation Submitted in partial) and energy security (petroleum displacement) benefits. Plug-in hybrid electric vehicles (PHEVs), which use

194

Life-Cycle Assessment of Energy Use and Greenhouse Gas Emissions of Soybean-Derived Biodiesel and Renewable Fuels  

Science Journals Connector (OSTI)

Life-Cycle Assessment of Energy Use and Greenhouse Gas Emissions of Soybean-Derived Biodiesel and Renewable Fuels ... Hill, J.; Nelson, E.; Tilman, D.; Polasky, S.; Tiffany, D. Environmental, Economic, and Energetic Costs and Benefits of Biodiesel and Ethanol Biofuels Proc. ...

Hong Huo; Michael Wang; Cary Bloyd; Vicky Putsche

2008-12-23T23:59:59.000Z

195

Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities  

E-Print Network [OSTI]

and agriculture. Chinas national Ministry of Environmental Protection is responsible for promoting LCA

Lu, Hongyou

2010-01-01T23:59:59.000Z

196

FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2  

SciTech Connect (OSTI)

For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters. The range is primarily due to uncertainties associated with the Tank Waste Remediation System (TWRS) program, including uncertainties regarding retrieval of long-length equipment, scheduling, and tank retrieval technologies.

Templeton, K.J.

1996-05-23T23:59:59.000Z

197

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia

2014-01-01T23:59:59.000Z

198

Signs of a Heart Attack - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletter & Updates > Safety Meeting Toolkits > Signs of a Heart Attack Newsletter & Updates Health News & InsideOut Newsletter Pandemic Preparedness Diabetes Ergonomic Awareness...

199

Protective interlayer for high temperature solid electrolyte electrochemical cells  

DOE Patents [OSTI]

A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA)

1986-01-01T23:59:59.000Z

200

Protective interlayer for high temperature solid electrolyte electrochemical cells  

DOE Patents [OSTI]

A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA); Zymboly, Gregory E. (Penn Hills Township, Allegheny County, PA)

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Protective interlayer for high temperature solid electrolyte electrochemical cells  

DOE Patents [OSTI]

A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA)

1987-01-01T23:59:59.000Z

202

To Recycle or Not to Recycle: That Is the Question - Insights from Life-Cycle Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MRS BULLETIN MRS BULLETIN * VOLUME 37 * APRIL 2012 * www.mrs.org/bulletin © 2012 Materials Research Society MANUFACTURING * RECYCLING Why recycle? The most commonly stated reason for recycling is to reduce burdens associated with the disposal of our never-ending stream of wastes. Waste disposal potentially causes air and water pollution and is costly; moreover, landfi lls compete with other land uses. In addition, recycling can extend our supply of materials to alleviate scarcity and to moderate rising prices of raw materials. Furthermore, recycling is often more environmentally benign than using virgin raw materials and can reduce energy use and emissions of greenhouse gases and other pollutants. Life-cycle analysis Despite these positive attributes, not all recycling processes

203

Step 8: Work with the building owner to complete the ENERGY STAR lifecycle  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: Work with the building owner to complete the ENERGY STAR 8: Work with the building owner to complete the ENERGY STAR lifecycle Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Why you should design to earn the ENERGY STAR Follow EPA's step-by-step process Step 1: Assemble a team Step 2: Set an energy performance target Step 3: Evaluate your target using ENERGY STAR tools Step 4: Design to be energy efficient

204

TRPLSC-658; No of Pages 7 Review Life-cycle analysis and the ecology of biofuels  

E-Print Network [OSTI]

Biofuels have been proposed as an ecologically benign alternative to fossil fuels. There is, however, considerable uncertainty in the scientific literature about their ecological benefit. Here, we review studies that apply life-cycle analysis (LCA), a computational tool for assessing the efficiency and greenhouse gas (GHG) impact of energy systems, to biofuel feedstocks. Published values for energy efficiency and GHG differ significantly even for an individual species, and we identify three major sources of variation in these LCA results. By providing new information on biogeochemistry and plant physiology, ecologists and plant scientists can increase the accuracy of LCA for biofuel production systems. Plant science in the energy industry Plant biomass as a source of liquid fuel for transportation

unknown authors

205

Reduction of Electric Vehicle Life-Cycle Impacts through Battery Recycling  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reduction of Electric Vehicle Life-Cycle Impacts through Battery Recycling 29 th International Battery Seminar and Exhibit Ft. Lauderdale, FL March 15, 2012 The submitted manuscript has been created by UChicago Argonne, LLC, Operator of Argonne National Laboratory ("Argonne"). Argonne, a U.S. Department of Energy Office of Science laboratory, is operated under Contract No. DE-AC02-06CH11357. The U.S. Government retains for itself, and others acting on its behalf, a paid-up nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government. Why think about recycling?  Material scarcity alleviated

206

Life-cycle analysis results of geothermal systems in comparison to other power systems.  

SciTech Connect (OSTI)

A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET model shows that fossil thermal plants have fossil energy use and GHG emissions per kWh of electricity output about one order of magnitude higher than renewable power systems, including geothermal power.

Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

2010-10-11T23:59:59.000Z

207

Life-cycle energy and emission analysis of power generation from forest biomass  

Science Journals Connector (OSTI)

Abstract Forest harvest residues, which include limbs, branches, and tree tops, have the potential to generate energy. This paper uses a life-cycle assessment to determine the energy input-to-output ratios for each unit operation in the use of these residues for power generation. Two preparation options for obtaining the biomass were evaluated. For Option 1, the forest residues were chipped at the landing, while for Option 2 they were bundled and chipped at the power plant. Energy use and greenhouse gas (GHG) emissions were found for power plants sizes ranging from 10 to 300MW. For power plants with capacities greater than 30MW, the transportation of either bundles or woodchips to the power plant used the most energy, especially at larger power plant sizes. Option 1 used less energy than Option 2 for all power plant sizes, with the difference between the two becoming smaller for larger power plants. For the life-cycle GHG emissions, Option 1 ranges from 14.71 to 19.51g-CO2eq/kWh depending on the power plant size. Option 2 ranges from 21.42 to 20.90g-CO2eq/kWh. The results are not linear and are close to equal at larger power plant sizes. The GHG emissions increase with increasing moisture content. For a 300MW power plant with chipping at the landing, the GHG emissions range from 11.17 to 22.24g-CO2eq/kWh for moisture contents from 15% to 50%. The sensitivity analysis showed both energy use and GHG emissions are most sensitive to moisture content and then plant lifetime. For the equipment, both the energy use and GHG emissions are most sensitive to changes in the fuel consumption and load capacity of the chip van and the log-haul truck used to transport either bundles or wood chips to the power plant.

Amit Thakur; Christina E. Canter; Amit Kumar

2014-01-01T23:59:59.000Z

208

Life-cycle assessment of corn-based butanol as a potential transportation fuel.  

SciTech Connect (OSTI)

Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

2007-12-31T23:59:59.000Z

209

Fire Protection  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1066-2012 December 2012 _______________ Supersedes DOE-STD-1066-99 DOE STANDARD FIRE PROTECTION U.S. Department of Energy AREA FIRP Washington, DC 20585 DISTRIBUTION STATEMENT. Approved for public release; distribution is unlimited. This document is available on the Department of Energy Technical Standards Program Web page at http://www.hss.doe.gov/nuclearsafety/ns/techstds/ DOE-STD-1066-2012 FOREWORD This Department of Energy (DOE) Standard (STD) supersedes DOE-STD-1066-99 1 and is approved for use by DOE and its contractors. The following fire protection standard is canceled with the issuance of this Standard and appropriate technical content was incorporated into this Standard:  DOE-STD-1088-95, Fire Protection for Relocatable Structures

210

Physical Protection  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys (DOEs) purview ranging from facilities, buildings, Government property, and employees to national security interests such as classified information, special nuclear material (SNM), and nuclear weapons. Cancels Section A of DOE M 470.4-2 Chg 1. Canceled by DOE O 473.3.

2009-07-23T23:59:59.000Z

211

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

212

Attacking Systems ecurity vulnerabilities related to buffer overruns  

E-Print Network [OSTI]

Attacking Systems S ecurity vulnerabilities related to buffer overruns account for the largest exploits that take ad- vantage of the vulnerability to attack a system. The traditional approach and even security profession- als seemingly assume that all buffer overrun exploits operate in a similar

Sekar, R.

213

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

214

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

215

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks  

E-Print Network [OSTI]

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J by an implementation of the relay attack that has been tested on live systems. Once designers appreciate the risk to the smartcard standard, based on a distance bounding protocol, which provides adequate resistance to the relay

Xu, Wenyuan

216

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

217

An Analysis of the Economic and Financial Life-Cycle Costs of Reverse-Osmosis Desalination in South Texas: A Case Study of the Southmost Facility  

E-Print Network [OSTI]

Desalination provides a supply alternative for potable water for many communities, along with possible defenses against security threats potentially affecting clean water supplies. The economic and financial life-cycle costs associated with building...

Sturdivant, A.; Rister, M.; Rogers, C.; Lacewell, R.; Norris, J.; Leal, J.; Garza, J.; Adams, J.

218

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

219

On the algebraic attack against summation type keystream generators  

Science Journals Connector (OSTI)

The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.

Md. Iftekhar Salam; Hoon-Jae Lee

2012-01-01T23:59:59.000Z

220

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

222

Life-Cycle Energy Use and Greenhouse Gas Emission Implicaitons of Brazilian Sugarcane Ethanol Simulated with the GREET Model  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Life-Cycle Energy Use and Greenhouse Gas Emission Implications of Life-Cycle Energy Use and Greenhouse Gas Emission Implications of Brazilian Sugarcane Ethanol Simulated with the GREET Model Michael Wang*, May Wu, Hong Huo and Jiahong Liu Center for Transportation Research, Argonne National Laboratory, 9700 South Cass Avenue, Argonne, IL 60439, USA. *Contact author: Tel: +1 (630) 252 2819 Fax: +1 (630) 252 3443 Email: mqwang@anl.gov In International Sugar Journal 2008, Vol. 110, No. 1317 ABSTRACT By using data available in the open literature, we expanded the Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model developed by Argonne National Laboratory to include Brazilian-grown sugarcane ethanol. With the expanded GREET model, we examined the well-to-wheels (WTW) energy use and

223

PoisonAmplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. ...

Jialong Zhang; Chao Yang; Zhaoyan Xu; Guofei Gu

2012-09-01T23:59:59.000Z

224

FY 1996 solid waste integrated life-cycle forecast container summary volume 1 and 2  

SciTech Connect (OSTI)

For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the containers expected to be used for these waste shipments from 1996 through the remaining life cycle of the Hanford Site. In previous years, forecast data have been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to the more detailed report on waste volumes: WHC-EP0900, FY 1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary. Both of these documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on the types of containers that will be used for packaging low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major waste generators for each waste category and container type are also discussed. Containers used for low-level waste (LLW) are described in Appendix A, since LLW requires minimal treatment and storage prior to onsite disposal in the LLW burial grounds. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste are expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters.

Valero, O.J.

1996-04-23T23:59:59.000Z

225

How car material life-cycle emissions are considered in environmental rating methodologies? Suggestion of expedite models and discussion  

Science Journals Connector (OSTI)

Abstract This paper reviews existing vehicle environmental rating methodologies worldwide and focuses on how these methodologies deal with alternative vehicle technologies (plug-in vehicles, hybrid vehicles, and fuel cell vehicles) and emissions of greenhouse gases (CO2, N2O, and CH4) and pollutants (NOx, VOC, CO, SOx, PM10 and PM2.5) derived from embodied materials life cycle. United States, Mexico, Europe and Australia have public access data and websites with top 10 rankings. The ways the scores are calculated for each vehicle have differences in what regards the considered boundaries for the emissions analysis. In Europe, there is still not a unique rating methodology or ranking system, e.g., Belgium, Germany and United Kingdom have their specific scoring schemes. Multilinear regression models were developed as an attempt to estimate the vehicle embodied emissions as a function of vehicle lifecycle mileage, electricity mix, vehicle mass, battery mass and fuel cell power to cope with different production regions and different alternative vehicle technologies. The regression models were validated against Volkswagen life cycle assessments (LCAs), and compared against American Council for an Energy Efficient Economy (ACEEE) Green Book linear functions for material assessment and UK 12 material dataset for materials assessment. The developed models proved to be useful in applications related to rating methodologies using life-cycle concepts, with good reliability for comparisons considering the complexity of processes involved in vehicle materials life-cycle assessment.

Gonalo N. Correia; Teresa P. Batista; Sara S. Marques; Carla M. Silva

2014-01-01T23:59:59.000Z

226

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

227

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

228

E-Print Network 3.0 - attacks influence driving Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

229

E-Print Network 3.0 - attacks draft resolution Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(and our attacks) to four real-world PRNGs. We close Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 8 Cryptanalytic Attacks on...

230

Complex Attack Analysis and Safeguard Selection: a Cost-Oriented Approach.  

E-Print Network [OSTI]

??When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vulnerability. Rather, they achieve their goals by composing attacks and (more)

TANG, SUK WAH CRISTINA

2009-01-01T23:59:59.000Z

231

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware...

Jialong Zhang; Chao Yang; Zhaoyan Xu

2012-01-01T23:59:59.000Z

232

A hybrid life-cycle inventory for multi-crystalline silicon PV module manufacturing in China  

Science Journals Connector (OSTI)

China is the world's largest manufacturer of multi-crystalline silicon photovoltaic (mc-Si PV) modules, which is a key enabling technology in the global transition to renewable electric power systems. This study presents a hybrid life-cycle inventory (LCI) of Chinese mc-Si PV modules, which fills a critical knowledge gap on the environmental implications of mc-Si PV module manufacturing in China. The hybrid LCI approach combines process-based LCI data for module and poly-silicon manufacturing plants with a 2007 China IO-LCI model for production of raw material and fuel inputs to estimate 'cradle to gate' primary energy use, water consumption, and major air pollutant emissions (carbon dioxide, methane, sulfur dioxide, nitrous oxide, and nitrogen oxides). Results suggest that mc-Si PV modules from China may come with higher environmental burdens that one might estimate if one were using LCI results for mc-Si PV modules manufactured elsewhere. These higher burdens can be reasonably explained by the efficiency differences in China's poly-silicon manufacturing processes, the country's dependence on highly polluting coal-fired electricity, and the expanded system boundaries associated with the hybrid LCI modeling framework. The results should be useful for establishing more conservative ranges on the potential 'cradle to gate' impacts of mc-Si PV module manufacturing for more robust LCAs of PV deployment scenarios.

Yuan Yao; Yuan Chang; Eric Masanet

2014-01-01T23:59:59.000Z

233

Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.  

SciTech Connect (OSTI)

A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M. (Energy Systems)

2012-02-08T23:59:59.000Z

234

A building life-cycle information system for tracking building performance metrics  

SciTech Connect (OSTI)

Buildings often do not perform as well in practice as expected during pre-design planning, nor as intended at the design stage. While this statement is generally considered to be true, it is difficult to quantify the impacts and long-term economic implications of a building in which performance does not meet expectations. This leads to a building process that is devoid of quantitative feedback that could be used to detect and correct problems both in an individual building and in the building process itself. One key element in this situation is the lack of a standardized method for documenting and communicating information about the intended performance of a building. This paper describes the Building Life-cycle Information System (BLISS); designed to manage a wide range of building related information across the life cycle of a building project. BLISS is based on the Industry Foundation Classes (IFC) developed by the International Alliance for Interoperability. A BLISS extension to th e IFC that adds classes for building performance metrics is described. Metracker, a prototype tool for tracking performance metrics across the building life cycle, is presented.

Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

1999-04-01T23:59:59.000Z

235

Life-cycle assessment of diesel, natural gas and hydrogen fuel cell bus transportation systems  

Science Journals Connector (OSTI)

The Sustainable Transport Energy Programme (STEP) is an initiative of the Government of Western Australia, to explore hydrogen fuel cell technology as an alternative to the existing diesel and natural gas public transit infrastructure in Perth. This project includes three buses manufactured by DaimlerChrysler with Ballard fuel cell power sources operating in regular service alongside the existing natural gas and diesel bus fleets. The life-cycle assessment (LCA) of the fuel cell bus trial in Perth determines the overall environmental footprint and energy demand by studying all phases of the complete transportation system, including the hydrogen infrastructure, bus manufacturing, operation, and end-of-life disposal. The \\{LCAs\\} of the existing diesel and natural gas transportation systems are developed in parallel. The findings show that the trial is competitive with the diesel and natural gas bus systems in terms of global warming potential and eutrophication. Emissions that contribute to acidification and photochemical ozone are greater for the fuel cell buses. Scenario analysis quantifies the improvements that can be expected in future generations of fuel cell vehicles and shows that a reduction of greater than 50% is achievable in the greenhouse gas, photochemical ozone creation and primary energy demand impact categories.

Jamie Ally; Trevor Pryor

2007-01-01T23:59:59.000Z

236

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack the key deriva- tion of IPsec

Paris-Sud XI, Université de

237

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec the confidentiality of other Internet standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack

Fouque, Pierre-Alain

238

Fatal Chimpanzee Attack in Loango National Park, Gabon  

Science Journals Connector (OSTI)

In some populations, chimpanzees engage in lethal aggression within and between social units. We report a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found a...

Christophe Boesch; Josephine Head; Nikki Tagg

2007-10-01T23:59:59.000Z

239

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

240

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

242

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

243

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1, we have built a simulation model using OPNET simulation package, where the attack agents create as in the non-attacked condition. Keywords: Network Security, Denial-of-Service Attack, TCP Flooding, Router

Merat, Francis L.

244

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

245

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars  

E-Print Network [OSTI]

to certain types of relay attacks 1 . Our attack allowed to open and start the car while the true distanceRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris.francillon, boris.danev, srdjan.capkun}@inf.ethz.ch Abstract We demonstrate relay attacks on Passive Keyless Entry

246

Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems  

SciTech Connect (OSTI)

Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

Bri Rolston

2005-09-01T23:59:59.000Z

247

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

248

Role of Lignin in Reducing Life-Cycle Carbon Emissions, Water Use, and Cost for United States Cellulosic Biofuels  

Science Journals Connector (OSTI)

The grid electricity offset credits alone can reduce the life-cycle greenhouse gas (GHG) footprint of cellulosic ethanol by up to 20 g CO2e/MJ ethanol, in some cases resulting in a net negative GHG footprint. ... Case 2 represents a system in which the solids boiler and steam turbine from case 1 remain operational, but imported natural gas is used to operate an additional 65 MW gas turbine, resulting in a net power output of 50 MW. ... In each case, the capital costs for gas turbines are calculated on the basis of the gross power output rating. ...

Corinne D. Scown; Amit A. Gokhale; Paul A. Willems; Arpad Horvath; Thomas E. McKone

2014-07-02T23:59:59.000Z

249

A fundamental threat to quantum cryptography: gravitational attacks  

E-Print Network [OSTI]

An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

R. Plaga

2006-03-26T23:59:59.000Z

250

Protecting Life on Earth  

E-Print Network [OSTI]

Review: Protecting Life on Earth: An Introduction to thePeter B. Protecting Life on Earth: An Introduction to theof Protecting Life on Earth is to explain to an intelligent

Anderson, Byron P.

2011-01-01T23:59:59.000Z

251

Estimating life-cycle monetary losses due to wind hazards: Fragility analysis of long-span bridges  

Science Journals Connector (OSTI)

Abstract A numerical framework was developed for estimating the life-cycle monetary losses (maintenance and repair costs) due to wind-induced damage on a long-span bridge. The wind loading on the bridge deck was evaluated by means of flutter derivatives (FDs), which are measured in a wind tunnel test on a section-model of the deck. These aeroelastic coefficients are random due to experimental errors. A statistical approach was employed to evaluate the effects of this uncertainty source on the wind-induced response and the damage produced on the structure. In the first part of the study fragility curves and surfaces were used to estimate the exceedance probability of representative structural performance threshold indicators by accounting for experimental errors in the estimation of FDs. These thresholds were based on deck acceleration (for user comfort) and peak deck displacements (for structural damage). In the second part the results of the initial fragility analysis were used to analyze monetary losses, produced by wind loading. The proposed model for cost analysis was adapted from an existing life-cycle simulation algorithm for earthquake hazards. The pilot study employs a 1200-m suspension bridge model and data from wind tunnel experiments conducted at Northeastern University in the United States.

Dong-Woo Seo; Luca Caracoglia

2013-01-01T23:59:59.000Z

252

Life-Cycle Assessment of Energy Use and Greenhouse Gas Emissions of Soybean-Derived Biodiesel and Renewable Fuels  

SciTech Connect (OSTI)

In this study, we used Argonne National Laboratory's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model to assess the life-cycle energy and greenhouse gas (GHG) emission impacts of four soybean-derived fuels: biodiesel fuel produced via transesterification, two renewable diesel fuels (I and II) produced from different hydrogenation processes, and renewable gasoline produced from catalytic cracking. Five approaches were employed to allocate the coproducts: a displacement approach; two allocation approaches, one based on the energy value and the other based on the market value; and two hybrid approaches that integrated the displacement and allocation methods. The relative rankings of soybean-based fuels in terms of energy and environmental impacts were different under the different approaches, and the reasons were analyzed. Results from the five allocation approaches showed that although the production and combustion of soybean-based fuels might increase total energy use, they could have significant benefits in reducing fossil energy use (>52%), petroleum use (>88%), and GHG emissions (>57%) relative to petroleum fuels. This study emphasized the importance of the methods used to deal with coproduct issues and provided a comprehensive solution for conducting a life-cycle assessment of fuel pathways with multiple coproducts.

Huo, H.; Wang, M.; Bloyd, C.; Putsche, V.

2009-01-01T23:59:59.000Z

253

Optimal threshold-based network-level transportation infrastructure life-cycle management with heterogeneous maintenance actions  

Science Journals Connector (OSTI)

Transportation infrastructure life-cycle management deals with maintenance decision making of transportation facilities such as pavement, bridges, and railways under budget constraints. In practice, transportation agencies adopt threshold-based rules for maintenance planning because they are intuitive and easy to implement. However, the thresholds are often determined based on engineering judgment without any systematic approach. Therefore, maintenance budgets cannot be used effectively and facility conditions are not optimized. This research uses hybrid dynamic models to represent threshold-based maintenance for transportation infrastructure in a realistic manner. Hybrid dynamic models combine continuous states such as pavement roughness and age with discrete states such as maintenance history. These models are also capable of considering multiple maintenance actions with heterogeneous effects. Based on facility conditions and maintenance thresholds, corresponding maintenance actions are selected automatically and the facility switches between deterioration modes to reflect the effects of the chosen action. Furthermore, to consider users reactions to maintenance actions and accurately predict deterioration for a network of facilities, threshold-based maintenance is formulated as an upper-level problem, and user response is incorporated as a lower-level problem. This leads to a bi-level programming problem where maintenance thresholds are decision variables, which is solved with a modified tabu search algorithm. The proposed methodology is validated with the road network of an urban area and the generated maintenance thresholds are reasonable and robust, which shows that the methodology has great potential to support transportation infrastructure life-cycle management in practice.

James C. Chu; Yin-Jay Chen

2012-01-01T23:59:59.000Z

254

ORISE: Protecting Human Subjects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

or performed by DOE employees, addresses the protection of human subjects. The Oak Ridge Institute for Science and Education (ORISE) supports DOE in its efforts to protect...

255

Office of Physical Protection  

Broader source: Energy.gov [DOE]

The Office of Physical Protection is comprised of a team of security specialists engaged in providing Headquarters-wide physical protection.

256

Cathodic protection deployment on space shuttle solid rocket boosters  

SciTech Connect (OSTI)

Corrosion protection of the space shuttle solid rocket boosters incorporates the use of cathodic protection (anodes) in concert with several coatings systems. The SRB design has large carbon/carbon composite (motor nozzle) electrically connected to an aluminum alloy structure. Early in the STS program, the aluminum structures incurred tremendous corrosive attack at coating damage locations due primarily to galvanic coupling with the carbon/carbon nozzle. Also contributing to the galvanic corrosion problem were stainless steel and titanium alloy components housed within the aluminum structures and electrically connected to the aluminum structures. This paper highlights the evolution in the protection of the aluminum structures, providing historical information and summary data from the operation of the corrosion protection systems. Also, data and information are included regarding the evaluation and application of inorganic zinc rich primers to provide anode area on the aluminum structures.

Zook, L.M.

1999-07-01T23:59:59.000Z

257

Watermarking Attack: Security of WSS Techniques Francois Cayre1  

E-Print Network [OSTI]

carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal. This approach is certainly not the only one but secret disclosure is a very powerful hack: it gives the access of the communication channel at the lowest distortion price to hack content. The key idea of this security analysis

Boyer, Edmond

258

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

259

Energy Attacks and Defense Techniques for Wireless Systems  

E-Print Network [OSTI]

systems, where energy is the most critical constraint to life- time and reliability. We for the first time propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden Security Keywords Wireless security, hardware Trojan, leakage energy 1. INTRODUCTION Wireless communication

Potkonjak, Miodrag

260

Generalized watermarking attack based on watermark estimation and perceptual remodulation  

E-Print Network [OSTI]

on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise image statistics to perform the best watermark removal or damage. The proposed attack is based and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; b) watermark alteration

Genève, Université de

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

262

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

263

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

264

Measuring Topological Robustness of Networks under Sustained Targeted Attacks  

Science Journals Connector (OSTI)

In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network ... Keywords: complex networks, robustness, social networks

Mahendra Piraveenan; Shahadat Uddin; Kon Shing Kenneth Chung

2012-08-01T23:59:59.000Z

265

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

266

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

that could deplete IMD resources (e.g., battery power) quickly. The RD attacks could reduce the lifetime are powered by a non-rechargeable battery and replacing the battery requires surgery. Re-charging an IMD from an external RF electromagnetic source causes thermal effects in the organs and thus is not recommended. Unlike

Wu, Jie

267

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

268

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

269

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

270

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

271

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network [OSTI]

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

272

CCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW landfill disposal  

E-Print Network [OSTI]

CCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW in waste-to-energy (WTE) facilities. In other countries, the predominant disposal option for wood, others have not, and the product continues to enter the waste stream from construction, demolition

Florida, University of

273

Life-Cycle Assessment in Pesticide Product Development:? Methods and Case Study on Two Plant-Growth Regulators from Different Product Generations  

Science Journals Connector (OSTI)

Life-cycle assessment (LCA) enables a more comprehensive evaluation by additionally assessing the impacts of pesticide production and application (e.g. ... Also, the break-even point depends strongly on the yield increase data determined in field trials, which are specific to the use of growth regulators in intensive agriculture. ...

Georg Geisler; Stefanie Hellweg; Thomas B. Hofstetter; Konrad Hungerbuehler

2005-03-04T23:59:59.000Z

274

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

275

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......of dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...Support System for Nuclear Emergency Management...Hazard Release Risk Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

276

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...potentially security sensitive...System for Nuclear Emergency...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

277

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

278

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

279

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

280

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle

Diem, Claus

282

Governments' and Terrorists' Defense and Attack in a T-Period Game  

Science Journals Connector (OSTI)

We analyze how a government allocates its resources between attacking to downgrade a terrorist's resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government's asset and defending ... Keywords: conflict, contest success function, dynamics, game theory, multiple-period game, terror capacity, terrorism, threat

Kjell Hausken; Jun Zhuang

2011-03-01T23:59:59.000Z

283

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato  

E-Print Network [OSTI]

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

284

An attack on CFB mode encryption as used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to determine 16 bits of any block of plaintext with about 215 oracle ... Keywords: OpenPGP, chosen-ciphertext attacks, cipher-feedback mode, encryption

Serge Mister; Robert Zuccherato

2005-08-01T23:59:59.000Z

285

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

286

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering  

E-Print Network [OSTI]

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks without stuttering. The attack takes around O(285 ) CPU clocks with 278 keystream observations. Keywords

287

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

288

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

289

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

290

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ... Keywords: Attacker intent and strategy modeling, attack strategy inference, game theory

Peng Liu; Wanyu Zang; Meng Yu

2005-02-01T23:59:59.000Z

291

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

292

Ice slurry technology can save heart attack victims, surgery patients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

293

Argonne applied mathematicians use INCITE awards to attack energy problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

294

Secondary Prevention after Ischemic Stroke or Transient Ischemic Attack  

Science Journals Connector (OSTI)

...-pressure lowering depend on the particular class of antihypertensive drugs or simply on the antihypertensive effect of all such drugs remains controversial, although most of the evidence appears to support the latter. The PROGRESS trial showed a greater reduction in the risk of stroke and other vascular... This article reviews recommended strategies to reduce the risk of a subsequent stroke in patients with a history of transient ischemic attack (TIA) or stroke.

Davis S.M.; Donnan G.A.

2012-05-17T23:59:59.000Z

295

Factors contributing to resistance of cotton to pink bollworm attack  

E-Print Network [OSTI]

cage used in the anti?biosis s t u d y . . . . . . . . . . . . . . . . 5 ? 0 Appendix II. Figure 1* Pink bollworm emergence data, College Station, Texas ,19f?6-195>8. . 1^2 FACTORS CONTRIBUTING TO RESISTANCE OF COTTON TO PINK BOLLWORM ATTACK... hybrids resulting from crosses of aphid- resistant and susceptible cantaloupes were resistant and that the F2 progeny were three-fourths resistant and one- fourth susceptible* This typical Mendellan ratio indicates that resistance was due to a single...

Williams, Robert Kenneth

2013-10-04T23:59:59.000Z

296

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

297

Development of the Updated Environmental Protection Agency Manual of Protective Action Guides (PAGS) and Protective Actions for Nuclear Incidents  

SciTech Connect (OSTI)

As a student intern with the United States Environmental Protection Agency (EPA) Headquarters, the author was trained in the National Response Plan (NRP) and assisted in the editing of the new (unpublished) EPA Protective Action Guides (PAGs) [1] which has been revised in light of the perceived post 9/11 potential for 'Dirty Bomb' and 'Improvised Nuclear Device' attacks on civilian areas. Technical aspects and the public policy aspects of developing the new guides are discussed. Early Phase initial responses discussed include: Notification of state and/or local authorities, immediate evacuation/sheltering prior to release information or measurements, monitoring of releases and exposure rate measurements, estimation of dose consequences, implementation of protective actions in other areas. The new PAG clarifies the use of 1992 PAGs [2] for incidents other than nuclear power plant accidents, lowers projected thyroid dose for potassium iodine (KI), provides drinking water guidance, includes guidance for long-term site restoration, and updates dosimetry from ICRP 26 to ICRP 60. (authors)

Carter, L.M. [Texas A and M Univ., College Station, TX (United States)

2008-07-01T23:59:59.000Z

298

Protection Program Operations  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes requirements for the management and operation of the Department of Energy (DOE) Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE.

2014-10-14T23:59:59.000Z

299

Protective Force Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements to supplement DOE O 473.2, Protective Force Program, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Does not cancel other directives.

2000-06-30T23:59:59.000Z

300

Safety & Environmental Protection Services  

E-Print Network [OSTI]

Safety & Environmental Protection Services Guidance Note --------------------------------------------------------------------------------------------------------------------------------------------- UNIVERSITY OF GLASGOW Safety & Environmental Protection Services 1 Telephone: 0141-330-5532 Email: safety of others who live near you. It is about fire and the tragic consequences of getting some simple things

Guo, Zaoyang

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Safety & Environmental Protection Services  

E-Print Network [OSTI]

Safety & Environmental Protection Services Guidance Note --------------------------------------------------------------------------------------------------------------------------------------------- UNIVERSITY OF GLASGOW Safety & Environmental Protection Services 1 Telephone: 0141-330-5532 Email: safety FOR THE CURRENT REVISION. Emergency Fire Action Plan Revision 03/10 Listed below are the procedures and other

Guo, Zaoyang

302

Fire Protection Related Sites  

Broader source: Energy.gov [DOE]

Fire Protection related sites for Department of Energy, Non-DOE Government and Non-Government information.

303

RADIONUCLIDE RADIATION PROTECTION  

E-Print Network [OSTI]

COPYRIGHT 2002 Nuclear Technology Publishing #12;3 #12;4 #12;5 Radiation Protection Dosimetry Vol. 98, No'Energie Atomique, CEA/Saclay, France ISBN 1 870965 87 6 RADIATION PROTECTION DOSIMETRY Vol. 98 No 1, 2002 Published by Nuclear Technology Publishing #12;RADIONUCLIDE AND RADIATION PROTECTION DATA HANDBOOK 2nd Edition (2002

Healy, Kevin Edward

304

FIRE PROTECTION ENGINEERING  

E-Print Network [OSTI]

FIRE PROTECTION ENGINEERING FPE College of Engineering California Polytechnic State University San problems and develop fire safety design solutions in a variety of professional settings. Fire Protection Engineering Science � Apply concepts associated with the thermal sciences, to the analysis of fire protection

Sze, Lawrence

305

FIRE PROTECTION ENGINEERING  

E-Print Network [OSTI]

FIRE PROTECTION ENGINEERING FPE College of Engineering California Polytechnic State University San and develop fire safety design solutions in a variety of professional settings. Fire Protection Engineering Science · Apply concepts associated with the thermal sciences, to the analysis of fire protection

Sze, Lawrence

306

Department of Energy Launches Initiative with Industry to Better Protect  

Broader source: Energy.gov (indexed) [DOE]

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

307

Implications of protective measurements on de Broglie-Bohm trajectories  

E-Print Network [OSTI]

Protective measurements which were defined by Aharonov and Vaidman in 1993 played an important role in the discussion about the interpretation of quantum mechanics. In 1999, following an early work by Englert et al., Aharonov et al. wrote an article in which they showed that protective measurements can be used to demonstrate the `surrealism' of Bohmian mechanics. Bohmian mechanics also known as pilot-wave interpretation is certainly the best-known hidden variable interpretation of quantum mechanics. It played a fundamental role in the discovery by Bell of his famous non locality theorem. Therefore, any attacks against pilot-wave interpretation is particularly interesting and instructive to learn something new about the mysterious quantum universe. It is the aim of this chapter to review the debate surrounding protective measurement and pilot-wave and to show if it is possible to reconciliate the different interpretations of the results given in the work by Aharonov et al.

A. Drezet

2014-02-25T23:59:59.000Z

308

Coastal Marshlands Protection Act (Georgia  

Broader source: Energy.gov [DOE]

The Coastal Marshlands Protection Act provides the Coastal Resources Division with the authority to protect tidal wetlands. The Coastal Marshlands Protection Act limits certain activities and...

309

ORISE: Human Subjects Protection Resource Protection Book  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Human Subjects Protection Resource Book Human Subjects Protection Resource Book The Human Subjects Protection Resource Book synthesizes information currently available on the protection of human subjects in research, the continuing application of such information to new areas of endeavor, and ever-changing rules, regulations, and guidance. This resource, to which the Oak Ridge Institute for Science and Education (ORISE) contributed, is for investigators, institutional review boards, research organizations, research subjects and others. The book contains chapters that provide background information on the history and development of federal regulations; chapters that discuss procedural and substantive issues regarding the review and conduct of human subjects research; and chapters that are specific to one type of research

310

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon  

E-Print Network [OSTI]

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon populations. Module 1 The Psychological Effects of Terror 1. Terror as a Strategy of Psychological Warfare against the Masses 2. Mental Health

Rhode Island, University of

311

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

312

Program Record 13006 (Offices of Vehicle Technologies and Fuel Cell Technologies: Life-Cycle Costs of Mid-Size Light-Duty Vehicles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Record (Offices of Vehicle Technologies & Fuel Cell Program Record (Offices of Vehicle Technologies & Fuel Cell Technologies) Record #: 13006 Date: April 24, 2013 Title: Life-cycle Costs of Mid-Size Light-Duty Vehicles Originator: Tien Nguyen & Jake Ward Approved by: Sunita Satyapal Pat Davis Date: April 25, 2013 Items: DOE is pursuing a portfolio of technologies with the potential to significantly reduce greenhouse gases (GHG) emissions and petroleum consumption while being cost-effective. This record documents the assumptions and results of analyses conducted to estimate the life-cycle costs resulting from several fuel/vehicle pathways, for a future mid-size car. The results are summarized graphically in the following figure. Costs of Operation for Future Mid-Size Car

313

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

314

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

315

National Infrastructure Protection Plan  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

316

Respiratory Protection Program  

Broader source: Energy.gov [DOE]

This page is supported by the Respiratory Protection Program Administrators Group. The Respiratory Protection Program Administrators Group is a volunteer organization co-sponsored by the DOE Office of Worker Safety and Health Policy and the Energy Facility Contractors Group (EFCOG) to provide a forum for DOE and DOE contractor personnel to identify respiratory protection issues of concern to the DOE and pursue solutions to issues identified.

317

Preliminary life-cycle assessment of biomass-derived refinery feedstocks for reducing CO{sub 2} emissions  

SciTech Connect (OSTI)

The US by ratification of the United Nations Framework Convention on Climate Change has pledged to emit no higher levels of greenhouse gases in the year 2000 than it did in 1990. Biomass-derived products have been touted as a possible solution to the potential problem of global warming. However, past studies related to the production of liquid fuels, chemicals, gaseous products, or electricity from biomass, have only considered the economics of producing these commodities. The environmental benefits have not been fully quantified and factored into these estimates until recently. Evaluating the environmental impact of various biomass systems has begun using life-cycle assessment. A refinery Linear Programming model previously developed has been modified to examine the effects of CO{sub 2}-capping on the US refining industry and the transportation sector as a whole. By incorporating the results of a CO{sub 2} emissions inventory into the model, the economic impact of emissions reduction strategies can be estimated. Thus, the degree to which global warming can be solved by supplementing fossil fuels with biomass-derived products can be measured, allowing research and development to be concentrated on the most environmentally and economically attractive technology mix. Biomass gasification to produce four different refinery feedstocks was considered in this analysis. These biomass-derived products include power, fuel gas, hydrogen for refinery processing, and Fischer-Tropsch liquids for upgrading and blending into finished transportation fuels.

Marano, J.J. [Burns and Roe Services Corp., Pittsburgh, PA (United States); Rogers, S. [Dept. of Energy, Pittsburgh, PA (United States); Spath, P.L.; Mann, M.K. [National Renewable Energy Lab., Golden, CO (United States)

1995-12-31T23:59:59.000Z

318

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

319

Physical Protection Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Supplements DOE O 473.1, by establishing requirements for the physical protection of safeguards and security interests. Cancels: DOE M 5632.1C-1

2002-12-23T23:59:59.000Z

320

Asset Protection Analysis Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide provides examples of the application of as set protection analysis to several common problems. Canceled by DOE N 251.80.

2008-08-21T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Radiation Protection Act (Pennsylvania)  

Broader source: Energy.gov [DOE]

This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

322

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

323

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

324

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

325

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

326

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table... are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table...

Ramanathan, Anu

2012-06-07T23:59:59.000Z

327

E-Print Network 3.0 - amyloid oxidative attack Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: amyloid oxidative attack Page: << < 1 2 3 4 5 > >> 1 Brain Research Reviews 43 (2003) 164178 www.elsevier.comlocatebrainresrev Summary: to...

328

Effect of Tricalcium Silicate Content on Expansion in Internal Sulfate Attack.  

E-Print Network [OSTI]

??The purpose of this study was to determine the cementitious parameters and placement temperature that impact internal sulfate attack in concrete. Concrete structures make up (more)

Whitfield, Troy T.

2006-01-01T23:59:59.000Z

329

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

330

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

331

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

332

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

333

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

334

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

335

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

336

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

337

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

338

Environmental Protection Implementation Plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. The Environmental Protection Implementation Plan serves as an aid to management and staff to implement new environmental programs in a timely manner.

Brekke, D.D.

1994-01-01T23:59:59.000Z

339

Protective Force Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements to supplement DOE O 473.2, PROTECTIVE FORCE PROGRAM, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Change 1 revised pages in Chapters IV and VI on 12/20/2001.

2001-12-20T23:59:59.000Z

340

Environmental protection Implementation Plan  

SciTech Connect (OSTI)

This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

R. C. Holland

1999-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Protection of Human Subjects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes Department of Energy (DOE) procedures and responsibilities for implementing the policy and requirements set forth in 10 Code of Federal Regulations (CFR) Part 745, Protection of Human Subjects; and in DOE P 443.1A, Protection of Human Subjects, dated 12-20-07. Cancels DOE O 443.1. Canceled by DOE O 443.1B.

2007-12-20T23:59:59.000Z

342

Protection of Human Subjects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish DOE procedures and responsibilities for implementing the policy and requirements set forth in 10 CFR Part 745, Protection of Human Subjects, ad in DOE P 443.1, Policy on the Protection of Human Subjects. Cancels DOE O 1300.3. Canceled by DOE O 443.1A.

2000-05-15T23:59:59.000Z

343

Environmental Protection Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Cancels DOE 5400.1 and DOE N 450.4.

2003-01-15T23:59:59.000Z

344

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

25 Federal Register 25 Federal Register / Vol. 76, No. 209 / Friday, October 28, 2011 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9484-2] Children's Health Protection Advisory Committee (CHPAC); Notice of Charter Renewal AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Charter Renewal. Notice is hereby given that the Environmental Protection Agency (EPA) has determined that, in accordance with the provisions of the Federal Advisory Committee Act (FACA), 5 U.S.C. App.2. The Children's Health Protection Advisory Committee (CHPAC) is a necessary committee which is in the public interest. Accordingly, CHPAC will be renewed for an additional two- year period. The purpose of CHPAC is to provide advice and recommendations to the Administrator of EPA on issues

345

ORISE: Human Subjects Protection  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Human Subjects Protection Human Subjects Protection The Oak Ridge Institute for Science and Education (ORISE) performs technical assessments to assist U.S. Department of Energy (DOE) laboratories involved in human subjects research projects. Under DOE Order and Policy 443.1A, Protection of Human Subjects, and 10 CFR 745, DOE employees and contractors are expected to protect the rights and welfare of human research subjects. In support of the DOE Office of Science and the Human Subjects Protection Program (HSPP), ORISE has most recently assisted with the development and distribution of tools to address classified research and to track potential human social cultural behavior systems (HSCB) research conducted by DOE laboratories. Examples of products that ORISE has developed in support of the HSPP

346

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

347

Measurement of attacks and interferences with health care in conflict: validation of an incident reporting tool for attacks on and interferences with health care in eastern Burma  

Science Journals Connector (OSTI)

Attacks on health care in armed conflict and other civil disturbances, including those on health workers, health facilities, patients and health transports, represent a critical yet often overlooked violation ...

Rohini J Haar; Katherine HA Footer; Sonal Singh; Susan G Sherman

2014-11-01T23:59:59.000Z

348

An ab initio investigation into the SN2 reaction: Frontside attack versus backside attack in the reaction of F? with CH3F  

Science Journals Connector (OSTI)

The energy hypersurface for the attack of fluoride ion on methyl fluoride has been explored with ab initio LCAO-SCF calculations at a split-valence basis set level. Transition states for frontside and backside at...

H. Bernhard Schlegel; Kurt Mislow; Fernando Bernardi

1977-01-01T23:59:59.000Z

349

Analytic study for physical protection system (PPS) in nuclear power plants (NPPs)  

Science Journals Connector (OSTI)

Abstract The nuclear safeguard is analyzed in the aspect of the physical protection system (PPS) in nuclear power plants (NPPs). The PPS is reviewed and its related terror scenarios are investigated. The PPS is developed using analytical methods. In the terror scenarios, there are 8 possible cases for the terror attacks to the NPPs. Then, the likelihood of terror is classified by the general terror incidents. The consequence of terror is classified by Design Basis Threat (DBT) of the International Atomic Energy Agency (IAEA) scale. The physical protection method is suggested by defense-in-depth constraints and severe accident countermeasures. Finally, the advanced PPS is constructed, which could be used for the preparation for the possible terror attacks in the NPPs.

Tae Ho Woo

2013-01-01T23:59:59.000Z

350

Office of River Protection (ORP) and Washingotn River Protection Solutions,  

Broader source: Energy.gov (indexed) [DOE]

Office of River Protection (ORP) and Washingotn River Protection Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project The Mission of the Office of River Protection is to safely retrieve and treat Hanford's tank waste and close the Tank Farms to protect the Columbia River. Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project More Documents & Publications 2011 Annual Workforce Analysis and Staffing Plan Report - Office of River Protection Consent Order, Washington River Protection Solutions, LLC - NCO-2011-01

351

Environmental Protection, Safety, and Health Protection Program for DOE Operations  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This order establishes the Environmental Protection, Safety, and Health Protection Program for Department of Energy (DOE) operations. Cancels Interim Management Directive No. 5001, Safety, Health And Environmental Protection dated 9-29-77.

1980-05-05T23:59:59.000Z

352

Game theoretic analysis of physical protection system design  

SciTech Connect (OSTI)

The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefit analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.

Canion, B.; Schneider, E. [Nuclear and Radiation Engineering Program, University of Texas, 204 E. Dean Keeton Street, Stop C2200, Austin, TX 78712 (United States); Bickel, E.; Hadlock, C.; Morton, D. [Operations Research Program, University of Texas, 204 E. Dean Keeton Street, Stop C2200, Austin, TX 78712 (United States)

2013-07-01T23:59:59.000Z

353

Functionalized chitosan-based coatings for active corrosion protection  

Science Journals Connector (OSTI)

Abstract Chitosan-based coatings were suggested in this work as a green alternative for active corrosion protection of aluminum alloys. 2-Mercaptobenzothiazole (MBT) was used here as an efficient corrosion inhibitor for AA2024. The electrochemical impedance spectroscopy has demonstrated a strong inhibiting action of MBT showing no corrosion attack even after one week in full immersion tests when MBT-loaded chitosan coatings are applied. The surface properties of the chitosan coatings were improved by chemical grafting with poly(ethylene-alt-maleic anhydride) (PEMA) and poly(maleic anhydride-alt-1-octadecene) (POMA), aiming at increasing hydrophobicity that is crucial for corrosion protection in atmospheric conditions. The high contact angles, in the range of 140, were obtained on the MBT-containing chitosan films.

J. Carneiro; J. Tedim; S.C.M. Fernandes; C.S.R. Freire; A. Gandini; M.G.S. Ferreira; M.L. Zheludkevich

2013-01-01T23:59:59.000Z

354

Fire Protection Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Program Fire Protection Overview The Department of Energy (DOE) Fire Protection Program is multi-faceted. It includes published fire safety directives (Orders, standards, and guidance documents), a range of oversight activities, an annual fire protection program summary, and a directory of fire safety professionals. DOE also sponsors fire safety conferences, various training initiatives, and a spectrum of technical assistance activities. This Home Page is intended to bring together in one location as much of the Program's resources as possible to facilitate greater understanding, communication, and efficiency of operations. Guidelines -- NFPA Codes and standards, CFRs, and DOE Directives (policy statements, Orders, Standards, and Guidance Documents)

355

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

356

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

357

Digital image watermarking resistant to geometric and removal attacks in the wavelet transform domain  

E-Print Network [OSTI]

,2]. The watermark is embedded in the image additively, in the difficulty. g · Translation · Row and column removalDigital image watermarking resistant to geometric and removal attacks in the wavelet transform watermarking scheme resistant to various commonly used removal attacks. g p y watermark image will still

Qi, Xiaojun

358

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

359

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

360

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

Düntsch, Ivo

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Framework for using grocery data for early detection of bio-terrorism attacks  

E-Print Network [OSTI]

Framework for using grocery data for early detection of bio-terrorism attacks #3; Anna Goldenberg 15213 anya@cmu.edu October 16, 2001 Abstract Early detection of epidemics and bio-terrorism attacks. The main goal of this project is to investigate the possibility of detecting epidemics and bio-terrorism

Goldenberg, Anna

362

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

363

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad ... Keywords: attack prediction, computer security, game theory

Peng Liu; Wanyu Zang

2003-10-01T23:59:59.000Z

364

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

365

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

366

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-08-03T23:59:59.000Z

367

Bird Protection in Illinois  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protection in Illinois Protection in Illinois Nature Bulletin No. 550-A January 18, 1975 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BIRD PROTECTION IN ILLINOIS Very few people are indifferent about birds. Almost every bird is the feathered friend of somebody or some organization ready to do battle in its behalf. At present, in Illinois, songbirds and most other wild birds, together with their nests and eggs, are completely protected by law at all times. A few kinds, called game birds, may be shot by hunters -- pheasants and quail, also migratory ducks, geese, coots, jacksnipes, woodcocks, and doves. Such hunting must be done with shotguns in certain places in certain open seasons with many other detailed restrictions. Now, even crow hunters are licensed. The only unprotected birds are those three immigrants or exotics: the English sparrow, the European starling and the "domestic " pigeon. These, too, have their friends .

368

Protective Force Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To prescribe Department of Energy policy, responsibilities, and requirements for the management and operation of the Protective Force Program. Chg 1 dated 2-13-95. Cancels DOE O 5632.7 and DOE O 5632.8.

1995-02-13T23:59:59.000Z

369

Mondriaan memory protection  

E-Print Network [OSTI]

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

370

Physical Protection Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes Department of Energy management objectives, requirements and responsibilities for the physical protection of safeguards and security interests. Cancels DOE 5632.1C. Canceled by DOE O 470.4.

2002-12-23T23:59:59.000Z

371

Voluntary Protection Program  

Broader source: Energy.gov [DOE]

VPP Steering Committee - The Department of Energy Voluntary Protection Program (DOE-VPP) Federal Field Steering Committee is a group of Federal field office staff members from offices where at...

372

Federal Protective Force  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

2009-07-15T23:59:59.000Z

373

Protection of Human Subjects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to establish DOE-specific policy for the protection of human subjects involved in DOE research. Canceled by DOE P 443.1A.

2000-05-15T23:59:59.000Z

374

Protection of Human Subjects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Policy is to establish DOE-specific principles for the protection of human subjects involved in DOE research. Cancels DOE P 443.1. Canceled by DOE O 443.1B

2007-12-20T23:59:59.000Z

375

General Environmental Protection Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish environmental protection program requirements, authorities, and responsibilities for Department of Energy (DOE) Operations for assuring compliance with applicable Federal, State and local environmental protection laws and regulations, Executive Orders, and internal Department policies. Cancels DOE O 5480.1A. Para. 2b, 4b, and 4c of Chap. II and para. 2d and 3b of Chap. III canceled by DOE O 231.1.

1990-06-29T23:59:59.000Z

376

Voluntary Protection Program- Basics  

Broader source: Energy.gov [DOE]

The Department of Energy Voluntary Protection Program (DOE-VPP) promotes safety and health excellence through cooperative efforts among labor, management, and government at the Department of Energy (DOE) contractor sites. DOE has also formed partnerships with other Federal agencies and the private sector for both advancing and sharing its Voluntary Protection Program (VPP) experiences and preparing for program challenges in the next century. The safety and health of contractor and federal employees are a high priority for the Department.

377

Environmental Protection Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Chg 1, dated 1-24-05; Chg 2, dated 12-7-05; Admin Chg 1, dated 1-3-07. Cancels DOE 5400.1 and DOE N 450.4.

2003-01-15T23:59:59.000Z

378

Protections: Sediment Control = Contaminant Retention  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment Control Protections: Sediment Control Contaminant Retention LANL maintains hundreds of wells, stream sampling stations and stormwater control structures to protect...

379

Data Protection Policy Page 1 DATA PROTECTION POLICY  

E-Print Network [OSTI]

Data Protection Policy Page 1 DATA PROTECTION POLICY POLICY STATEMENT The University intends to fully comply with all requirements of the Data Protection Act 1998 (,,Act) in so far as it affects the Universitys activities. SCOPE This Data Protection Policy: Covers the processing of all personal information

Greenlees, John

380

If you have heart disease, or think you do, there's a lot you can do to protect your heart health. This fact sheet  

E-Print Network [OSTI]

If you have heart disease, or think you do, there's a lot you can do to protect your heart health. This fact sheet gives you the key steps to control the disease, including how to survive a heart attack and prevent serious dam- age to heart muscle. Caring for your heart is worth the effort. Use the information

Bandettini, Peter A.

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Scaling property and opinion model for interevent time of terrorism attack  

E-Print Network [OSTI]

The interevent time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows it follows a scale-free property. In order to understand the dynamic mechanism of such statistic feature, an opinion dynamic model with memory effect is proposed on a two-dimension lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter of the system reaches a critical value. Ultimately, the model reproduces the same statistical property as the empirical data and gives a good understanding of terrorism attack.

Zhu, Jun-Fang; Wang, Bing-Hong

2009-01-01T23:59:59.000Z

382

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

076 Federal Register 076 Federal Register / Vol. 77, No. 250 / Monday, December 31, 2012 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9006-8] Notice of Intent: Designation of an Expanded Ocean Dredged Material Disposal Site (ODMDS) off Charleston, South Carolina AGENCY: U.S. Environmental Protection Agency (EPA) Region 4. ACTION: Notice of Intent to prepare an Environmental Assessment (EA) for the designation of an expanded ODMDS off Charleston, South Carolina. Purpose: EPA has the authority to designate ODMDSs under Section 102 of the Marine Protection, Research and Sanctuaries Act of 1972 (33 U.S.C. 1401 et seq.). It is EPA's policy to prepare a National Environmental Policy Document for all ODMDS designations (63 FR 58045, October 1998). FOR FURTHER INFORMATION, TO

383

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

22 Federal Register 22 Federal Register / Vol. 75, No. 103 / Friday, May 28, 2010 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9156-1] Office of Research and Development; Ambient Air Monitoring Reference and Equivalent Methods: Designation of One New Equivalent Method AGENCY: Environmental Protection Agency. ACTION: Notice of the designation of one new equivalent method for monitoring ambient air quality. SUMMARY: Notice is hereby given that the Environmental Protection Agency (EPA) has designated, in accordance with 40 CFR Part 53, one new equivalent method for measuring concentrations of lead (Pb) in total suspended particulate matter (TSP) in the ambient air. FOR FURTHER INFORMATION CONTACT: Surender Kaushik, Human Exposure and Atmospheric Sciences Division (MD-D205-03), National Exposure

384

Microscope collision protection apparatus  

DOE Patents [OSTI]

A microscope collision protection apparatus for a remote control microscope which protects the optical and associated components from damage in the event of an uncontrolled collision with a specimen, regardless of the specimen size or shape. In a preferred embodiment, the apparatus includes a counterbalanced slide for mounting the microscope's optical components. This slide replaces the rigid mounts on conventional upright microscopes with a precision ball bearing slide. As the specimen contacts an optical component, the contacting force will move the slide and the optical components mounted thereon. This movement will protect the optical and associated components from damage as the movement causes a limit switch to be actuated, thereby stopping all motors responsible for the collision.

DeNure, Charles R. (Pocatello, ID)

2001-10-23T23:59:59.000Z

385

River Protection.PDF  

Broader source: Energy.gov (indexed) [DOE]

cc: cc: DOE/IG-0506 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS I N S P E C T I O N O F SELECTED ASPECTS OF THE OFFICE OF RIVER PROTECTION PERFORMANCE-BASED INCENTIVE PROGRAM JUNE 2001 U.S. DEPARTMENT OF ENERGY Washington, DC 20585 June 14, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Selected Aspects of the Office of River Protection Performance-Based Incentive Program" BACKGROUND The Office of River Protection (ORP), which reports to the Office of Environmental Management, is responsible for remediation of the radioactive waste stored in tanks at the Hanford Site in the State of Washington. For Fiscal Year (FY) 2000, ORP established 26 performance-based contract

386

Environmental Protection Division  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Site Details Site Details EPD Home Staff List (pdf) Org Chart (pdf) Compliance / Permits Programs Other Information Land Use & Institutional Controls Mapping Site Environmental Reports Environmental Monitoring Plan (EMP) Spill Response BNL Site Index Can't View PDFs? Developing Environmental Products and Services for Brookhaven Stakeholders The Environmental Protection Division (EPD) develops and delivers environmental products and services for all Brookhaven stakeholders. We manage environmental programs such as pollution prevention, groundwater protection, and natural resource management; provide technical assistance on environmental requirements; maintain the Laboratory's IS0 14001-registered Environmental Management System; prepare environmental permit applications; conduct environmental monitoring; manage data

387

Protection Program Operations  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for the management and operation of the DOE Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE. Cancels DOE M 470.4-2A, DOE M 470.4-3A, and DOE M 470.4-8. Appendix C Safeguards and Security Alarm Management and Control Systems, of DOE M 470.4-2A, is retained and incorporated into this Order as Attachment 3, Annex 1.

2011-06-29T23:59:59.000Z

388

Substation fire protection features  

SciTech Connect (OSTI)

This paper describes Commonwealth Edison`s (ComEd) approach to substation fire protection. Substation fires can have a major operational, financial, as well as political impact on a utility. The overall Company philosophy encompasses both active and passive fire protection features to provide prompt detection, notification, and confinement of fire and its by-products. Conservatively designed smoke detection systems and floor and wall penetration seals form the backbone of this strategy. The Company has implemented a program to install these features in new and existing substations. Thus far these measures have been successful in mitigating the consequences of substation fires.

Hausheer, T.G. [Commonwealth Edison Co., Chicago, IL (United States)

1995-10-01T23:59:59.000Z

389

Environmental protection implementation plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

Holland, R.C.

1998-03-01T23:59:59.000Z

390

Environmental Protection Implementation Plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. This report focuses on the following: notification of environmental occurrences; general planning and reporting; special programs and plans; environmental monitoring program; and quality assurance and data verification.

Brekke, D.D.

1995-11-01T23:59:59.000Z

391

BNL | Cloud Lifecycle Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

392

BNL | Aerosol Lifecycle IOP  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Program Aerosol Life Cycle IOP The primary objectives that make up the Aerosol Life Cycle IOP can be broken down into three categories: Scientific; Logistical; and GVAX preparation. Scientific Objectives The science goals are to conduct intensive aerosol observations in a region exposed to anthropogenic, biogenic, and marine emissions with atmospheric processing times depending on air mass trajectories and time of day. Take advantage of new instruments in the MAOS (e.g., SP2, HR-PTRMS, ACSM, Trace Gas Suite, PASS-3, Aethelometer, UHSAS). Within this broad umbrella are embedded three main foci: Aerosol light absorption: How does the aerosol mass absorption coefficient (absorption per unit mass of BC) vary with atmospheric processing? Do observations agree with a shell-core model?

393

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

Motors Corporation and Argonne National Laboratory, May (ifeu.pdf. General Motors, Argonne National Lab, et al. ,volumes, published by Argonne National Laboratory, June (

Delucchi, Mark

2006-01-01T23:59:59.000Z

394

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

McAloon, The 2001 Net Energy Balance of Corn-Ethanol, U. S.Graboski, Estimating the Net Energy Balance of Corn Ethanol,and M. Wang, The Energy Balance of Corn Ethanol: An Update,

Delucchi, Mark

2006-01-01T23:59:59.000Z

395

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

2004). www.bioproducts- bioenergy.gov/pdfs/NRDC-Growing-as Feedstock for a Bioenergy and Bioproducts Industry: Theof Biobased Polymers and Bioenergy, Journal of Industrial

Delucchi, Mark

2006-01-01T23:59:59.000Z

396

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

The syngas exiting the gasifier is cooled and then quenchedThe equipment downstream of the gasifier for conversion to

Delucchi, Mark

2006-01-01T23:59:59.000Z

397

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

Emissions Impacts of Fuel Ethanol, Energy Systems Division2002). www.ncga.com/ethanol/pdfs/energy_balance_report_264 R. Hammerschlag, Ethanols Energy Return on Investment:

Delucchi, Mark

2006-01-01T23:59:59.000Z

398

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

content of biomass in wood plantations, which as indicatedC content of the biomass in wood plantations is estimated to

Delucchi, Mark

2006-01-01T23:59:59.000Z

399

Lifecycle Analyses of Biofuels  

E-Print Network [OSTI]

between grain-to-ethanol processes and cellulose-to-ethanolcorn ethanol from corn, cellulose ethanol from corn stoverfrom corn - 50% to -10% Ethanol from cellulose -100% to -40%

Delucchi, Mark

2006-01-01T23:59:59.000Z

400

Protective sheath for a continuous measurement thermocouple  

DOE Patents [OSTI]

Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device. 4 figures.

Phillippi, R.M.

1991-12-03T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Who Protects My Trust?  

Science Journals Connector (OSTI)

......they trust to protect their interests? The eBay points model of trust works and users understand that. We need something...behavioural advertising. It is claimed they are able to predict flu outbreaks and even know when a woman is pregnant before she does......

Rick Chandler

2013-01-01T23:59:59.000Z

402

United States Environmental Protection  

E-Print Network [OSTI]

Public Health and Environmental Radiation Protection Standards for Yucca Mountain, Nevada (40 CFR Part 197)--Final Rule Response to Comments Document #12;Yucca Mountain Standards Response to Comments Standards for Yucca Mountain, Nevada 40 CFR Part 197 June, 2001 Office of Radiation and Indoor Air U

403

Armored garment for protecting  

DOE Patents [OSTI]

A lightweight, armored protective garment for protecting an arm or leg from blast superheated gases, blast overpressure shock, shrapnel, and spall from a explosive device, such as a Rocket Propelled Grenade (RPG) or a roadside Improvised Explosive Device (IED). The garment has a ballistic sleeve made of a ballistic fabric, such as an aramid fiber (e.g., KEVLAR.RTM.) cloth, that prevents thermal burns from the blast superheated gases, while providing some protection from fragments. Additionally, the garment has two or more rigid armor inserts that cover the upper and lower arm and protect against high-velocity projectiles, shrapnel and spall. The rigid inserts can be made of multiple plies of a carbon/epoxy composite laminate. The combination of 6 layers of KEVLAR.RTM. fabric and 28 plies of carbon/epoxy laminate inserts (with the inserts being sandwiched in-between the KEVLAR.RTM. layers), can meet the level IIIA fragmentation minimum V.sub.50 requirements for the US Interceptor Outer Tactical Vest.

Purvis, James W. (Albuquerque, NM); Jones, II, Jack F. (Albuquerque, NM); Whinery, Larry D. (Albuquerque, NM); Brazfield, Richard (Albuquerque, NM); Lawrie, Catherine (Tijeras, NM); Lawrie, David (Tijeras, NM); Preece, Dale S. (Watkins, CO)

2009-08-11T23:59:59.000Z

404

Protective Force Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes policy, requirements, responsibilities, and authorities, for the management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE 5632.7A

2000-06-30T23:59:59.000Z

405

United States Environmental Protection  

E-Print Network [OSTI]

quality in public water systems; remediation of contaminated sites, sediments and ground water; preventionUnited States Environmental Protection Agency Hydrogeologic Framework, Ground-Water Geochemistry/R-02/008 January 2002 Hydrogeologic Framework, Ground-Water Geochemistry, and Assessment of Nitrogen

406

Contractor Protective Force  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes requirements for the management and operation of the U.S. Department of Energy contractor protective forces. Cancels: DOE M 470.4-3 Chg 1, CRD (Attachment 2) only, except for Section C. Canceled by DOE O 473.3.

2008-11-05T23:59:59.000Z

407

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

408

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

409

E-Print Network 3.0 - attack model development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: for the development of realistic models of DoS traffic, can be packaged as an automated tool to aid in rapid response... to detect and re- spond to attacks quickly....

410

An Attack on CFB Mode Encryption as Used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP...15 oracle queries for the initial setup work and 215 oracle queries for each block. S...

Serge Mister; Robert Zuccherato

2006-01-01T23:59:59.000Z

411

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

412

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks  

Science Journals Connector (OSTI)

Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet. Its distributed and cooperative nature makes i...

Angelo Furfaro; Pasquale Pace; Andrea Parise

2014-01-01T23:59:59.000Z

413

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

414

Antibiosis and Preferences as Factors in the Resistance of Certain Cottons to Pink Bollworm Attack  

E-Print Network [OSTI]

of resistance in this host-parasite relationship. There are sevezal economicaUy important paste attacking cotton. Resistant qualities have been demonstrated 1n certain varieties aga1nst sevezal of these pasta. Isely (1935) reported that cotton bo...

Reed, David Kent

1960-01-01T23:59:59.000Z

415

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Ettringite Fly ash Microstructural studies Sulfate attack a b s t r a c t A conventional solution in reducing of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

416

Proactive Intrusion Prevention and Response via Attack Graphs Steven Noel and Sushil Jajodia  

E-Print Network [OSTI]

triage and after-the-fact remediation. This chapter examines proactive methods of attack risk reduction for optimal countermeasures. This chapter describes the latest advances in an innovative proactive approach

Noel, Steven

417

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

418

A National Survey of Stress Reactions after the September 11, 2001, Terrorist Attacks  

Science Journals Connector (OSTI)

...population represented in the March 2001 Current Population Survey, our sample slightly overrepresented women, non-Hispanic whites, and persons with higher levels of education and household income, which is typical of samples selected by means of random-digit dialing. As a sensitivity analysis, we repeated... After the September 11 terrorist attacks, Americans experienced symptoms of psychological stress. This survey of U.S. adults performed just five days after the attacks quantifies the extent of the stress reactions.

Schuster M.A.; Stein B.D.; Jaycox L.H.

2001-11-15T23:59:59.000Z

419

Environmental Protection, Safety, and Health Protection Program for DOE Operations  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes the Environmental Protection, Safety. and Health Protection Program for Department of Energy (DOE) operations. Cancels DOE 5480.1, dated 5-5-1980, its chapters are not canceled. Canceled by DOE O 5480.1B

1981-08-13T23:59:59.000Z

420

Protecting Spreadsheets Against Fraud  

E-Print Network [OSTI]

Previous research on spreadsheet risks has predominantly focussed on errors inadvertently introduced by spreadsheet writers i.e. it focussed on the end-user aspects of spreadsheet development. When analyzing a faulty spreadsheet, one might not be able to determine whether a particular error (fault) has been made by mistake or with fraudulent intentions. However, the fences protecting against fraudulent errors have to be different from those shielding against inadvertent mistakes. Faults resulting from errors committed inadvertently can be prevented ab initio by tools that notify the spreadsheet writer about potential problems whereas faults that are introduced on purpose have to be discovered by auditors without the cooperation of their originators. Even worse, some spreadsheet writers will do their best to conceal fraudulent parts of their spreadsheets from auditors. In this paper we survey the available means for fraud protection by contrasting approaches suitable for spreadsheets with those known from frau...

Mittermeir, Roland T; Hodnigg, Karin

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Fire Protection Program: Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary Summary Since May 1950, an Annual Fire Protection Program Summary has been submitted by DOE's fire protection community. Currently, this report is required by section 5a.(8) of DOE Order 231.1. "Environment, Safety and Health Reporting." In 1999, an automation initiative was undertaken to streamline data collection and provide a more through review of DOE Reporting Element activities. This action resulted in the delayed publications of the CY 1999 and 2000 reports until 2002. It is now possible however to view all Annual Summary Reporting Element responses since 1991 at the Site, Operations, Lead Program Secretarial Office and Headquarters levels. Additionally, a build-in reference to other DOE reporting activities (CAIRS and ORPS) is available that allows Reporting Elements and managers the opportunity to review all fire protection events along previously mentioned categories. Reports listed below were generated from this application. To obtain a copy of the Annual Summary Application please contact Jim Bisker in the Office of Nuclear and Facility Safety Policy (EH-53) at (301)903-6542 or Jim Bisker.

422

GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION.  

SciTech Connect (OSTI)

THE DEPARTMENT OF ENERGY ORDER 5400.1, GENERAL ENVIRONMENTAL PROTECTION PROGRAM, REQUIRES THE DEVELOPMENT AND IMPLEMENTATION OF A GROUNDWATER PROTECTION PROGRAM. THE BNL GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION PROVIDES AN OVERVIEW OF HOW THE LABORATORY ENSURES THAT PLANS FOR GROUNDWATER PROTECTION, MONITORING, AND RESTORATION ARE FULLY DEFINED, INTEGRATED, AND MANAGED IN A COST EFFECTIVE MANNER THAT IS CONSISTENT WITH FEDERAL, STATE, AND LOCAL REGULATIONS.

PAQUETTE,D.E.; BENNETT,D.B.; DORSCH,W.R.; GOODE,G.A.; LEE,R.J.; KLAUS,K.; HOWE,R.F.; GEIGER,K.

2002-05-31T23:59:59.000Z

423

Assessment of potential life-cycle energy and greenhouse gas emission effects from using corn-based butanol as a transportation fuel.  

SciTech Connect (OSTI)

Since advances in the ABE (acetone-butanol-ethanol) fermentation process in recent years have led to significant increases in its productivity and yields, the production of butanol and its use in motor vehicles have become an option worth evaluating. This study estimates the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. It employs a well-to-wheels (WTW) analysis tool: the Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model. The estimates of life-cycle energy use and greenhouse gas (GHG) emissions are based on an Aspen Plus(reg. sign) simulation for a corn-to-butanol production process, which describes grain processing, fermentation, and product separation. Bio-butanol-related WTW activities include corn farming, corn transportation, butanol production, butanol transportation, and vehicle operation. In this study, we also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. We then compared the results for bio-butanol with those of conventional gasoline. Our study shows that driving vehicles fueled with corn-based butanol produced by the current ABE fermentation process could result in substantial fossil energy savings (39%-56%) and avoid large percentage of the GHG emission burden, yielding a 32%-48% reduction relative to using conventional gasoline. On energy basis, a bushel of corn produces less liquid fuel from the ABE process than that from the corn ethanol dry mill process. The coproduction of a significant portion of acetone from the current ABE fermentation presents a challenge. A market analysis of acetone, as well as research and development on robust alternative technologies and processes that minimize acetone while increase the butanol yield, should be conducted.

Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

2008-01-01T23:59:59.000Z

424

Voluntary Protection Program Manuals | Department of Energy  

Office of Environmental Management (EM)

Voluntary Protection Program Manuals Voluntary Protection Program Manuals Voluntary Protection Program Manual U.S. Department Of Energy Approval Memo Issuing Revised VPP Program...

425

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

426

Designing radiation protection signs  

SciTech Connect (OSTI)

Entry into hazardous areas without the proper protective equipment is extremely dangerous and must be prevented whenever possible. Current postings of radiological hazards at the Rocky Flats Environmental Technology Site (RFETS) do not incorporate recent findings concerning effective warning presentation. Warning information should be highly visible, quickly, and easily understood. While continuing to comply with industry standards (e.g., Department of Energy (DOE) guidelines), these findings can be incorporated into existing radiological sign design, making them more effective in terms of usability and compliance. Suggestions are provided for designing more effective postings within stated guidelines.

Rodriguez, M.A.; Richey, C.L.

1995-03-01T23:59:59.000Z

427

Income Protection (IP) Insurance  

E-Print Network [OSTI]

of the daily futures market closing prices for the insured crop prior to the sales closing date and during harvest. IP uses the Group Risk Plan?s (GRP) county yield index to adjust IP premium rates. The insurance is provided for an enter- prise unit... equals 27.5 percent of the approved yield times 100 percent of the projected price. An insured?s total guaranteed dollar amount of protection is the net acres of the insured crop (acres times share) in the county multiplied by the IP dollar guaran- tee...

Stokes, Kenneth; Barnaby, G. A. Art; Waller, Mark L.; Outlaw, Joe

1999-06-09T23:59:59.000Z

428

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

429

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

430

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack  

Science Journals Connector (OSTI)

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-06-24T23:59:59.000Z

431

Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack  

E-Print Network [OSTI]

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-02-01T23:59:59.000Z

432

Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation  

SciTech Connect (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. We show that - for protocols that use quantum channels of any dimension and completely characterize them by state tomography - the noise threshold for classical advantage distillation of a specific kind is substantially lower than the threshold for quantum entanglement distillation if the eavesdropper can perform powerful coherent attacks. In marked contrast, earlier investigations had shown that the thresholds are identical for incoherent attacks on the same classical distillation scheme. It remains an open question whether other schemes for classical advantage distillation have higher thresholds for coherent eavesdropping attacks.

Kaszlikowski, Dagomir; Lim, J.Y.; Englert, Berthold-Georg [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Kwek, L.C. [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); National Institute of Education, Nanyang Technological University, Singapore 639798 (Singapore)

2005-10-15T23:59:59.000Z

433

Protection Program Operations - DOE Directives, Delegations,...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Operations by jcronin Functional areas: Physical Protection, Protective Force, Safeguards, Security, and Emergency Management The Order establishes requirements for the...

434

Water Efficiency Improvements at Various Environmental Protection...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Efficiency Improvements at Various Environmental Protection Agency Sites Water Efficiency Improvements at Various Environmental Protection Agency Sites Water Efficiency...

435

MANUAL OF PROTECTIVE ACTION GUIDES-AND PROTECTIVE ACTIONS FOR...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Laboratory (July 15, 1977). 10. International Commission on Radiological Protection. Report of a Task Group of Committee 2 on Reference Man. Publication 23. p. 360. Pergamon...

436

Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems  

E-Print Network [OSTI]

Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2007-04-24T23:59:59.000Z

437

Protected Planet | Open Energy Information  

Open Energy Info (EERE)

Protected Planet Protected Planet Jump to: navigation, search Tool Summary Name: Protected Planet Agency/Company /Organization: United Nations Environment Programme (UNEP), International Union for Conservation of Nature Sector: Energy, Land Topics: Co-benefits assessment, - Environmental and Biodiversity Resource Type: Dataset, Maps, Software/modeling tools User Interface: Website Website: protectedplanet.net/about Cost: Free Protected Planet Screenshot References: Protected Planet[1] "Be inspired by the most beautiful places on the planet. Explore the worlds national parks, wilderness areas and world heritage sites. Help us find and improve information on every protected area in the world. Protectedplanet.net lets you discover these incredible places through elegant mapping and intuitive searching. Protectedplanet.net wants you to

438

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

94 Federal Register 94 Federal Register / Vol. 74, No. 209 / Friday, October 30, 2009 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-8798-8] Environmental Impact Statements and Regulations; Availability of EPA Comments Availability of EPA comments prepared pursuant to the Environmental Review Process (ERP), under section 309 of the Clean Air Act and Section 102(2)(c) of the National Environmental Policy Act as amended. Requests for copies of EPA comments can be directed to the Office of Federal Activities at 202-564-7146 or http://www.epa.gov/ compliance/nepa/. An explanation of the ratings assigned to draft environmental impact statements (EISs) was published in FR dated July 17, 2009 (74 FR 34754). Draft EISs EIS No. 20090290, ERP No. D-FTA- F54014-WI, Kenosha-Racine-Milwaukee

439

Solar collector overheating protection  

Science Journals Connector (OSTI)

Prismatic structures in a thermal solar collector are used as overheating protection. Such structures reflect incoming light efficiently back whenever less thermal power is extracted from the solar collector. Maximum thermal power is generated when the prismatic structure is surrounded by a switching fluid with an index of refraction comparable to that of the prismatic structure. Thermal heat can be harvested via extra fluid channels in the solar absorber or directly via the switching fluid near the prisms. The light reducing effect of prismatic structures is demonstrated for a typical day and a season cycle of the Earth around the Sun. The switchability and the light reducing effect are also demonstrated in a prototype solar collector.

M. Slaman; R. Griessen

2009-01-01T23:59:59.000Z

440

Environmental Protection Agency  

Office of Legacy Management (LM)

Protection Agency Protection Agency . . Book, 4 Project Rulison Off-Site Surveillance Operation for the Flaring Period - October 26 - November 3, 1970 DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available original document. P r e l i m i n a r y Report March 1 0 , 1 9 7 1 PROJECT RULISON OFF-SITE ' SURVEILLANCE FOR THE E'LARING OPERATION OF OCTOBER 26 - November 3, 1970 S o u t h w e s t e r n R a d i o l o g i c a l H e a l t h Laboratqry ~ u g i n g . . . t h e p e r i o d of O c t o b e r 26' through November 3 , ,1970, n a t u r a l g a s f r o m -.._. -- . . t h e P r o j e c t R u l i s o n t e s t w e l l was f l a r e d f o r t h e h i g h - r a t e p r o d u c t i o n f l a r i n g t e s t . . The' f l a r i n g o p e r a t i o n was s t a r t e d , a t 1430 M!5T on October 2 6 , 1970. The g a s flow r a t e w a s i n c r e a s e d o v e r a six-hour p

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Protective Force Firearms Qualification Courses  

Broader source: Energy.gov (indexed) [DOE]

PROTECTIVE FORCE PROTECTIVE FORCE FIREARMS QUALIFICATION COURSES U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security AVAILABLE ONLINE AT: INITIATED BY: http://www.hss.energy.gov Office of Health, Safety and Security Protective Force Firearms Qualification Courses July 2011 i TABLE OF CONTENTS SECTION A - APPROVED FIREARMS QUALIFICATION COURSES .......................... I-1 CHAPTER I . INTRODUCTION ................................................................................... I-1 1. Scope .................................................................................................................. I-1 2. Content ............................................................................................................... I-1

442

CEBAF - environmental protection program plan  

SciTech Connect (OSTI)

An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan.

NONE

1995-10-01T23:59:59.000Z

443

ORISE: Protecting Human Subjects Website  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

provide protection with respect to the rights and welfare of research subjects. The Oak Ridge Institute for Science and Education (ORISE) administers the Oak Ridge Sitewide...

444

Florida Radiation Protection Act (Florida)  

Broader source: Energy.gov [DOE]

The Department of Public Health is responsible for administering a statewide radiation protection program. The program is designed to permit development and utilization of sources of radiation for...

445

Classified Matter Protection and Control  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements to supplement DOE O 471.2, which establishes policy for the protection and control of classified and unclassified information. Does not cancel other directives.

1995-09-26T23:59:59.000Z

446

Environmental Protection and Natural Resources  

E-Print Network [OSTI]

moved forward, environmentalists and Mexican stakeholders59 Stat. 1219. U.S. Environmental Protection Agency (EPA).1992. Integrated Environmental Plan for the Mexican-U.S.

Snchez-Rodrguez, Roberto; Mumme, Stephen

2010-01-01T23:59:59.000Z

447

MIE -H&S -08 -Personal Protection Personal Protection  

E-Print Network [OSTI]

type of work. Safety glasses 2. Safety boots are optional, except when heavy parts are to be moved or worked on. Open toe shoes must not worn at the work site or in the laboratories. Safety boots 3. GlovesMIE - H&S - 08 - Personal Protection Personal Protection 1. Safety glasses must be worn when any

448

EPA's Radiation Protection Standards Protecting the Environment from  

E-Print Network [OSTI]

cancer. EPA does not regulate naturally occurring radiation or the non-ionizing radiation that is emittedEPA's Radiation Protection Standards Protecting the Environment from Radioactive Materials EPA materials. These radioactive materials emit ionizing radiation, which can damage living tissue and cause

449

Protecting FWP Participant Personally Identifiable Information/Protected  

Broader source: Energy.gov (indexed) [DOE]

Protecting FWP Participant Personally Identifiable Protecting FWP Participant Personally Identifiable Information/Protected Health Information Protecting FWP Participant Personally Identifiable Information/Protected Health Information The confidentiality and privacy rights of former workers are not only a legal requirement, they are crucial to establishing and maintaining credibility with the former worker community. All medical information that is collected as part of this program is treated as confidential and is used only as allowed by the Privacy Act of 1974. All FWP activities are conducted with the approval of the Institutional Review Boards, or Human Subjects Committees, of DOE and involved universities. All individuals sign an informed consent and Health Insurance Portability and Accountability Act

450

Combined group ECC protection and subgroup parity protection  

DOE Patents [OSTI]

A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

2013-06-18T23:59:59.000Z

451

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States  

E-Print Network [OSTI]

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2

Wang, Hai

452

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry Abstract--This paper explores distributed smart grid attack strategies to destabilize power system

Kundur, Deepa

453

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Broader source: Energy.gov (indexed) [DOE]

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

454

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter  

E-Print Network [OSTI]

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

Cao, Xiaojun (Matt)

455

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid  

E-Print Network [OSTI]

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid Wenkai Wang, Qiao Cai Department, Stevens Institute of Technology, Hoboken, NJ 07030 Abstract--The power grid network is a complex of power grid in terms of cascading failures caused by node failures. Specifically, we define three metrics

Sun, Yan Lindsay

456

Dynamic pharming attacks and locked same-origin policies for web browsers  

Science Journals Connector (OSTI)

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based ... Keywords: pharming, same-origin policy, web authentication

Chris Karlof; Umesh Shankar; J. D. Tygar; David Wagner

2007-10-01T23:59:59.000Z

457

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

458

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

459

A Proposal of QLearning to Control the Attack of a 2D Robot Soccer Simulation Team  

Science Journals Connector (OSTI)

This document presents a novel approach to control the attack behavior of a team of simulated soccer playing robot of the Robocup 2D category. The presented approach modifies the behavior of each player only when in the state "controlling the ball". ... Keywords: Simulated robot soccer, machine learning, learning, Q-Learning algorithm

Jose Rodrigo Ferreira Neri; Maicon Rafael Zatelli; Carlos Henrique Farias dos Santos; Joao Alberto Fabro

2012-10-01T23:59:59.000Z

460

The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC  

E-Print Network [OSTI]

Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

California at Davis, University of

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

"How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks  

E-Print Network [OSTI]

"How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

Gelman, Andrew

462

Trojan horse attack free fault-tolerant quantum key distribution protocols  

Science Journals Connector (OSTI)

This work proposes two quantum key distribution (QKD) protocols--each of which is robust under one kind of collective noises--collective-dephasing noise and collective-rotation noise. Due to the use of a new coding function which produces error-robust ... Keywords: Collective noise, GHZ state, Quantum cryptography, Quantum key distribution, Trojan horse attack

Chun-Wei Yang; Tzonelih Hwang

2014-03-01T23:59:59.000Z

463

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

464

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

disturbances. I. INTRODUCTION The smart grid promises increased capacity, security and re- liability through smart grid is challenging on several fronts. Asset own- ers must understand how to best prioritize reliability metrics are then employed to characterize the effects of the attack. Such approaches are valuable

Kundur, Deepa

465

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin  

E-Print Network [OSTI]

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O¨urich, Switzerland srdjan.capkun@inf.ethz.ch Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses

466

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)  

E-Print Network [OSTI]

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack Abstract A widespread security claim of the Bitcoin system, presented in the original Bitcoin white, as the distributed Bitcoin network is ideally supposed to be. Propagation of the at- tacker's block can

467

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

468

A Denial of Service Attack against Fair Computations using Bitcoin Deposits  

E-Print Network [OSTI]

A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

469

Quantifying the Attack Surface of a Web Application Thomas Heumann, Jorg Keller Sven Turpe  

E-Print Network [OSTI]

qualitative and quantitative indicators. We propose a multi- dimensional metric for the attack surface of web Introduction Measuring security properties is challenging yet necessary. The need to make informed decisions implies necessity, while the complex and sometimes counter-intuitive nature of security makes measuring

Keller, Jörg

470

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...a powdery form. Once...of poorly crystalline calcium silicate...and well-crystalline phases...containment of nuclear waste. Applying...conducted in accelerated conditions...attack. Chemical Reaction in...matrix, the chemical reactions with...because of aging of the binding...confirming the form of the...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

471

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...was associated with the formation of ettringite crystals [Ca 6 Al 2 (OH) 12 (SO 4 ) 3...bacillus. During sulfate attack, ettringite is often formed from the monosulfate...the aluminate ions in the formation of ettringite. The reaction to generate ettringite...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

472

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and lim- ited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

473

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

474

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore  

E-Print Network [OSTI]

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore Computer Laboratory consumption of a normal ¢¡£ Read-only Memory(ROM) is simulated in HSPICE. Randomness is later inserted to mask the data-dependent information leakage. A dual-rail version of the ROM is then presented

Moore, Simon

475

Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective  

E-Print Network [OSTI]

with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

Politècnica de Catalunya, Universitat

476

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed  

E-Print Network [OSTI]

detection is an essential to minimize the damage of distributed denial of services (DDoS) attacks. However of the flooding traffic [13, 20]. Unfortunately, damages have already been caused when consequences are observed Experimentation and Test, in conjunction with USENIX Security Symposium, Boston, MA. August 6-7, 2007

Chen, Yu

477

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks*  

E-Print Network [OSTI]

can work cooperatively to raise early warning to avoid catastrophic damages. This paper proposes) mechanism to enable early detection of DDoS attacks on community networks. We want to detect flooding. * Manuscript submitted on March 10, 2006 to the IEEE International Symposium on Collaborative Technologies

Chen, Yu

478

Practical Attacks on Proximity Identification Systems (Short Paper) Gerhard P. Hancke  

E-Print Network [OSTI]

of relay and eavesdropping attacks on RFID de- vices they don't always describe implementations or show 1 a contactless smart card system and simulated the distances achievable for readertoken and tokenreader communication in the context of a relay at- tack. As discussed in section 2, RFID is a general term for any near

Hancke, Gerhard

479

Distributed Internet-based Load Altering Attacks against Smart Power Grids  

E-Print Network [OSTI]

to cause circuite overflow or other malfunctions and damage the power system equipments. To gain insights-intrusion attempt may target any sector in a power system: generation, distribution and control, and consumption as shown in Fig. 1. A Type I cyber-attack targets power plants and aims in disrupting or taking over

Mohsenian-Rad, Hamed

480

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network [OSTI]

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Zhou, Yuanyuan

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Trust Anchor  

Broader source: Energy.gov (indexed) [DOE]

Adrian R Chavez Adrian R Chavez Sandia National Laboratories Protecting PCS against Lifecycle Attacks Using Trust Anchors Summary Slide: Trust Anchors / Code Seal  Outcomes: Trust Anchor technology enables new security strategies addressing lifecycle attacks for which there are currently no relevant defenses  Roadmap Challenge: Develop and Integrate Protective Measures  Major Successes: Implemented and improved performance of trust anchor algorithms and implementation  Schedule: Implement Trust Anchors 3/10; Performance Testing/Prototype 8/10; Scenario Development 1/11; Vulnerability Assessment 3/11  Level of Effort: $400K  Funds Remaining: $257K  Performers: SNL  Partners: Exploring industry opportunities to commercialize technology CodeSeal CodeSeal

482

Data Protection Office October 2010  

E-Print Network [OSTI]

Data Protection Office October 2010 AUTHORISATION FORM FOR DATA PROCESSING BY STUDENTS This form should be completed where students are processing personal data for research or study purposes. In order to meet the requirements of the Data Protection Act 1998 and ensure the personal data is being processed

Mottram, Nigel

483

Alcohol Quantity and Type on Risk of Recurrent Gout Attacks: An Internet-based Case-crossover Study  

Science Journals Connector (OSTI)

AbstractObjectives Although beer and liquor have been associated with risk of incident gout, wine has not. Yet anecdotally, wine is thought to trigger gout attacks. Further, how much alcohol intake is needed to increase the risk of gout attack is not known. We examined the quantity and type of alcohol consumed on risk of recurrent gout attacks. Methods We conducted a prospective Internet-based case-crossover study in the US among participants with gout and who had at least one attack during the 1 year of follow-up. We evaluated the association of alcohol intake over the prior 24 hours as well as the type of alcoholic beverage with risk of recurrent gout attack, adjusting for potential time-varying confounders. Results This study included 724 participants with gout (78% men, mean age 54 years). There was a significant dose-response relationship between amount of alcohol consumption and risk of recurrent gout attacks (P gout attack was 1.36 (95% confidence interval [CI], 1.00-1.88) and 1.51 (95% CI, 1.09-2.09) times higher for >1-2 and >2-4 alcoholic beverages, respectively, compared with no alcohol consumption in the prior 24 hours. Consuming wine, beer, or liquor was each associated with an increased risk of gout attack. Conclusions Episodic alcohol consumption, regardless of type of alcoholic beverage, was associated with an increased risk of recurrent gout attacks, including potentially with moderate amounts. Individuals with gout should limit alcohol intake of all types to reduce the risk of recurrent gout attacks.

Tuhina Neogi; Clara Chen; Jingbo Niu; Christine Chaisson; David J. Hunter; Yuqing Zhang

2014-01-01T23:59:59.000Z

484

Comparative analysis of the production costs and life-cycle GHG emissions of FT liquid fuels from coal and natural gas  

SciTech Connect (OSTI)

Liquid transportation fuels derived from coal and natural gas could help the United States reduce its dependence on petroleum. The fuels could be produced domestically or imported from fossil fuel-rich countries. The goal of this paper is to determine the life-cycle GHG emissions of coal- and natural gas-based Fischer-Tropsch (FT) liquids, as well as to compare production costs. The results show that the use of coal- or natural gas-based FT liquids will likely lead to significant increases in greenhouse gas (GHG) emissions compared to petroleum-based fuels. In a best-case scenario, coal- or natural gas-based FT-liquids have emissions only comparable to petroleum-based fuels. In addition, the economic advantages of gas-to-liquid (GTL) fuels are not obvious: there is a narrow range of petroleum and natural gas prices at which GTL fuels would be competitive with petroleum-based fuels. CTL fuels are generally cheaper than petroleum-based fuels. However, recent reports suggest there is uncertainty about the availability of economically viable coal resources in the United States. If the U.S. has a goal of increasing its energy security, and at the same time significantly reducing its GHG emissions, neither CTL nor GTL consumption seem a reasonable path to follow. 28 refs., 2 figs., 4 tabs.

Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (USA). Civil and Environmental Engineering Department

2008-10-15T23:59:59.000Z

485

Optimization and life-cycle cost of health clinic PV system for a rural area in southern Iraq using HOMER software  

SciTech Connect (OSTI)

This paper addresses the need for electricity of rural areas in southern Iraq and proposes a photovoltaic (PV) solar system to power a health clinic in that region. The total daily health clinic load is 31.6 kW h and detailed loads are listed. The National Renewable Energy Laboratory (NREL) optimization computer model for distributed power, ''HOMER,'' is used to estimate the system size and its life-cycle cost. The analysis shows that the optimal system's initial cost, net present cost, and electricity cost is US$ 50,700, US$ 60,375, and US$ 0.238/kW h, respectively. These values for the PV system are compared with those of a generator alone used to supply the load. We found that the initial cost, net present cost of the generator system, and electricity cost are US$ 4500, US$ 352,303, and US$ 1.332/kW h, respectively. We conclude that using the PV system is justified on humanitarian, technical, and economic grounds. (author)

Al-Karaghouli, Ali; Kazmerski, L.L. [National Renewable Energy Laboratory, 1617 Cole Blvd., Golden, CO 80401 (United States)

2010-04-15T23:59:59.000Z

486

Protection of spruce from colonization by the bark beetle, Ips perturbatus, in Alaska  

Science Journals Connector (OSTI)

Field bioassays were conducted in south-central Alaska in a stand of Lutz spruce, Piceaנlutzii, to determine whether a semiochemical interruptant (verbenone and trans-conophthorin) and/or a defense-inducing plant hormone (methyl jasmonate, MJ) could be used to protect individual standing trees from bark beetle attack. During two experiments (initiated in May 2004 and 2005, respectively), attacks by Ips perturbatus on standing trees were induced by using a three-component aggregation pheromone (ipsenol, cis-verbenol, and ipsdienol) and prevented by using the interruptant. In 2005, treatments from 2004 were repeated and additional treatments were evaluated by using MJ spray or injection with and without the interruptant. Aggregation began before 3 or 7 June, and attack density was monitored through 3 or 16 August. During both years, tree mortality caused by I. perturbatus was recorded twice (in August, and in May of the following year). In both experiments, attack density was greatest on trees baited with the three-component attractive pheromone, but was significantly reduced by addition of the semiochemical interruptant to trees baited with the attractant. There were no significant differences in attack density between attractant+interruptant-treated trees and unbaited trees. In 2004, mortality was highest among attractant-baited trees, whereas addition of the interruptant significantly reduced the level of initial (10 week post-treatment) and final (54 week post-treatment) mortality. In 2005, no significant reduction in attack density occurred on trees baited with the attractant when MJ was sprayed or injected. The highest initial (10.6 week post-treatment) and final (49.4 week post-treatment) mortality was observed among trees that had been injected with MJ and baited with the attractant. Mortality at the final assessment was significantly lower in all other treatment groups. As in 2004, addition of the interruptant to attractant-baited trees significantly reduced the level of final mortality compared to attractant-baited trees. MJ was not attractive or interruptive to I. perturbatus or associated bark beetles in a flight trapping study. However, MJ-treated trees (sprayed or injected) exuded copious amounts of resin on the bark surface. Anatomical analyses of felled trees from four treatment groups [Tween (solvent)-sprayed, MJ-sprayed, Tween-injected, and MJ-injected+attractant baited] showed that treatment with MJ increased the number and size of resin ducts produced following treatment. These analyses also revealed a reduction in radial growth in MJ-treated trees. Our results show that during both years, treatment with a simple, two-component interruptant system of verbenone and trans-conophthorin significantly reduced I. perturbatus attack density and tree mortality on attractant-baited trees and provided a full year of protection from bark beetle attack.

Andrew D. Graves; Edward H. Holsten; Mark E. Ascerno; Kenneth P. Zogas; John S. Hard; Dezene P.W. Huber; Robert A. Blanchette; Steven J. Seybold

2008-01-01T23:59:59.000Z

487

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Broader source: Energy.gov (indexed) [DOE]

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

488

Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481  

SciTech Connect (OSTI)

The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R}, were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R} models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation reactions with both dissolved ions and the hydrated cement paste. The carbonation process itself does not have a negative effect, per se, on the paste physical properties and can even result in reduced porosity and can help form a protective layer at the surface of concrete. However, carbonation has been shown to increase leaching of some constituents and can potentially have a detrimental effect on reinforced concrete structures by lowering pH to ca. 9 and de-passivating embedded steel (e.g. rebar) and accelerating corrosion, which are important processes related to high-level waste tank integrity and closure evaluations. The use of the CBP Software Toolbox to simulate these important degradation phenomena for both concrete vaults and high-level waste tanks are demonstrated in this paper. (authors)

Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S. [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States)] [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States); Flach, G.; Langton, C.; Smith, F.G.III; Burns, H. [Savannah River National Laboratory, Aiken, SC 29808 (United States)] [Savannah River National Laboratory, Aiken, SC 29808 (United States); Van der Sloot, H. [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands)] [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands); Meeussen, J.C.L. [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands)] [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands); Seignette, P.F.A.B. [Energy Research Center of The Netherlands, Petten (Netherlands)] [Energy Research Center of The Netherlands, Petten (Netherlands); Samson, E. [SIMCO Technologies, Inc., Quebec (Canada)] [SIMCO Technologies, Inc., Quebec (Canada); Mallick, P.; Suttora, L. [U.S. Department of Energy, Washington, DC (United States)] [U.S. Department of Energy, Washington, DC (United States); Esh, D.; Fuhrmann, M.; Philip, J. [U.S. Nuclear Regulatory Commission, Washington, DC (United States)] [U.S. Nuclear Regulatory Commission, Washington, DC (United States)

2013-07-01T23:59:59.000Z

489

NRT is currently for adults (18 or older) and not approved for use in pregnancy or for persons with active chest pain or a recent heart attack.  

E-Print Network [OSTI]

with active chest pain or a recent heart attack. Nicotine Replacement Therapy What strength do I use? What

MacAdam, Keith

490

Fire Protection Account Request Form  

Broader source: Energy.gov (indexed) [DOE]

Fire Protection System Account Request Form Fire Protection System Account Request Form To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to hssUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your

491

FAQS Reference Guide Radiation Protection  

Broader source: Energy.gov [DOE]

This reference guide has been developed to address the competency statements in the December 2003 edition of DOE-STD-1174-2003, Radiation Protection Functional Area Qualification Standard.

492

Health Physicist (Radiation Protection Specialist)  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as the Health Physicist (Radiation Protection Specialist) senior subject matter expert for health physics/radiation safety at the sites. You will...

493

Physical Protection of Classified Matter  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes policy and objectives for physical protection of classified matter. This directive does not cancel another directive. Chg 1, 7-30-93. Canceled by 5632.1C.

1988-02-03T23:59:59.000Z

494

Illinois Groundwater Protection Act (Illinois)  

Broader source: Energy.gov [DOE]

It is the policy of the State of Illinois to restore, protect, and enhance the groundwaters of the State, as a natural and public resource. The State recognizes the essential and pervasive role of...

495

Model Fire Protection Assessment Guide  

Broader source: Energy.gov [DOE]

This Assessment guide covers the implementation of the DOE's responsibility of assuring that DOE and the DOE Contractors have established Fire Protection Programs that are at the level required for the area being assessed.

496

Transforming Parks and Protected Areas  

E-Print Network [OSTI]

Transforming Parks and Protected Areas Policy and governance in a changing world Edited by Kevin S from the British Library Library of Congress Cataloging In Publication Data Transforming parks

Bolch, Tobias

497

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems  

Science Journals Connector (OSTI)

Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attacknamely, the time-shift attackagainst a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (?4%) to break the security of the system. Eves success is due to the well-known detection efficiency loophole in the experimental testing of Bells inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2008-10-28T23:59:59.000Z

498

Radiological Protection for DOE Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes radiological protection program requirements that, combined with 10 CFR 835 and its associated implementation guidance, form the basis for a comprehensive program for protection of individuals from the hazards of ionizing radiation in controlled areas. Extended by DOE N 441.3. Cancels DOE 5480.11, DOE 5480.15, DOE N 5400.13, DOE N 5480.11; please note: the DOE radiological control manual (DOE/EH-0256T)

1995-09-29T23:59:59.000Z

499

Effect of aerodynamic uncertainties on unconventional lateral control at high angle of attack  

E-Print Network [OSTI]

EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATERAL CONTROL AT HIGH ANGLE OF ATTACK A Thesis by BOB GENSEN ELLER Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December 1987 Major Subject: Aerospace Engineering EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATEHAI CONTROL AT HIGH ANGI. E (&F A'I'TACK A Thesis by BOB GENSEN ELLER Approved as to style and content by: Donald T...

Eller, Bob Gensen

1987-01-01T23:59:59.000Z

500

Department of Energy - Voluntary Protection Program Contract...  

Office of Environmental Management (EM)

Contract Transition Process Department of Energy - Voluntary Protection Program Contract Transition Process The purpose of the Department of Energy (DOE) Voluntary Protection...