Powered by Deep Web Technologies
Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

secure software providing independent testing, monitoring, and control of energy control system component operation Trust Anchor Lifecycle Attack Protection More Documents...

2

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

3

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

4

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

5

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

6

Lifecycle Management of Protection, Control and Associated Data Acquisition Infrastructure: Challenges and R&D Needs  

Science Conference Proceedings (OSTI)

Protection and control technologies are experiencing fundamental and revolutionary changes. In the transition from legacy electro-mechanical relays to the state of the art digital assets, utilities are facing the emerging challenges in the life-cycle management of a highly diverse and increasingly complicated P&C infrastructure. Most installed electro-mechanical devices are aging and close to their designed life cycle; meanwhile, new generation of microprocessor relays tend to have a much ...

2012-12-14T23:59:59.000Z

7

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

8

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

9

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

10

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

11

Memoization Attacks and Copy Protection in Partitioned Applications  

E-Print Network (OSTI)

Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...

O'Donnell, Charles W.

2006-12-08T23:59:59.000Z

12

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

13

CHALLENGES AND OPPORTUNITIES--INTEGRATED LIFE-CYCLE OPTIMIZATION INITIATIVES FOR THE HANFORD RIVER PROTECTION PROJECT--WASTE TREATMENT PLANT  

Science Conference Proceedings (OSTI)

This paper describes the ongoing integrated life-cycle optimization efforts to achieve both design flexibility and design stability for activities associated with the Waste Treatment Plant at Hanford. Design flexibility is required to support the Department of Energy Office of River Protection Balance of Mission objectives, and design stability to meet the Waste Treatment Plant construction and commissioning requirements in order to produce first glass in 2007. The Waste Treatment Plant is a large complex project that is driven by both technology and contractual requirements. It is also part of a larger overall mission, as a component of the River Protection Project, which is driven by programmatic requirements and regulatory, legal, and fiscal constraints. These issues are further complicated by the fact that both of the major contractors involved have a different contract type with DOE, and neither has a contract with the other. This combination of technical and programmatic drivers, constraints, and requirements will continue to provide challenges and opportunities for improvement and optimization. The Bechtel National, Inc. team is under contract to engineer, procure, construct, commission and test the Waste Treatment Plant on or ahead of schedule, at or under cost, and with a throughput capacity equal to or better than specified. The Department of Energy is tasked with the long term mission of waste retrieval, treatment, and disposal. While each mission is a compliment and inextricably linked to one another, they are also at opposite ends of the spectrum, in terms of expectations of one another. These mission requirements, that are seemingly in opposition to one another, pose the single largest challenge and opportunity for optimization: one of balance. While it is recognized that design maturation and optimization are the normal responsibility of any engineering firm responsible for any given project, the aspects of integrating requirements and the management of issues across contract boundaries is a more difficult matter. This aspect, one of a seamless systems approach to the treatment of tank wastes at the Hanford site, is the focus of the Optimization Studies. This ''big O''Optimization of Life-Cycle operations is what is meant when the term ''optimization'' is used on the River Protection Project and initiatives cited in this paper. From the early contractor centric methods and processes used to move toward an integrated solution, through extensive partnering approaches, to the current quality initiatives with multi-organizational participation, significant progress is being made towards achieving the goal of truly integrated life-cycle optimization for the Department of Energy's River Protection Project and Waste Treatment Plant.

Auclair, K. D.

2002-02-25T23:59:59.000Z

14

Life-Cycle Cost Analysis Tool for Chem/Bio Protection of ...  

Science Conference Proceedings (OSTI)

... Bio protection strategies based on user-defined scenarios. ... produces the types of analysis results that ... Based on the analyses performed, the results ...

2011-02-07T23:59:59.000Z

15

Protecting Buildings From a Biological or Chemical Attack: actions to take  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

16

HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134  

SciTech Connect

Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

PIERSON KL; MEINERT FL

2012-01-26T23:59:59.000Z

17

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

Graboski analyzes lifecycle fossil energy use only. ) Notanalyzes lifecycle fossil energy use only. ) Analysis of2003). M. S. Graboski, Fossil Energy Use in the Manufacture

Delucchi, Mark

2006-01-01T23:59:59.000Z

18

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

08 Lifecycle Analyses of Biofuels Draft Report (May be citedLIFECYCLE ANALYSES OF BIOFUELS Draft manuscript (may belifecycle analysis (LCA) of biofuels for transportation has

Delucchi, Mark

2006-01-01T23:59:59.000Z

19

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

20

Chemical Lifecycle Management Cost  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemical Lifecycle Management Cost Presented by: J.M. Hieb, CH2M HILL Plateau Remediation Company CHPRC1204-04 Chemical Lifecycle Management Cost Everyone is trying to stretch a...

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

22

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

23

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

24

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

Balances for a Range of Biofuel Options, Project Number8. F UELCYCLE EMISSIONS FOR BIOFUEL VEHICLES IN DIFFERENTch. and LEM % ch. For a few biofuel lifecycles there can be

Delucchi, Mark

2006-01-01T23:59:59.000Z

25

Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances  

E-Print Network (OSTI)

When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a file server virtual machine running on the same physical host and export it to other virtual machines running on the same host. We implement this private file server virtual machine using a modified version of an NFS server installed in a virtual machine under various virtualization environments such as Xen and VMware. We also demonstrate that by placing the user’s applications in a virtual machine rather than directly on the base machine we can provide near instant recovery of system configuration information. We quantify the costs of this architecture by comparing benchmarks running directly on a base operating system and accessing data in a local filesystem to those running in a guest operating system and accessing data in an NFS partition mounted from a file server virtual machine. We find that for Xen the overhead of read intensive workloads is at most 5 % and for write intensive workloads the overhead is at most 24%. For system benchmarks that stress CPU and memory performance, we see no noticeable degradation.

Jeanna N. Matthews; Jason J. Herne; Todd M. Deshane; Patty A. Jablonski; Leslie R. Cherian; Mike T. Mccabe

2005-01-01T23:59:59.000Z

26

Lifecycle building card: toward paperless and visual lifecycle management tools  

Science Conference Proceedings (OSTI)

This paper presents a novel vision of paperless and visual lifecycle building management tools based on the coupling between Building Information Models (BIM) and Augmented Reality (AR) called Lifecycle Building Card. As the use of BIM increases within ... Keywords: augmented reality, building information model, building lifecycle, visual simulation

Holger Graf; Souheil Soubra; Guillaume Picinbono; Ian Keough; Alex Tessier; Azam Khan

2011-04-01T23:59:59.000Z

27

Cybersecurity - Foiling attackers | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in...

28

Photovoltaics: Life-cycle Analyses  

DOE Green Energy (OSTI)

Life-cycle analysis is an invaluable tool for investigating the environmental profile of a product or technology from cradle to grave. Such life-cycle analyses of energy technologies are essential, especially as material and energy flows are often interwoven, and divergent emissions into the environment may occur at different life-cycle-stages. This approach is well exemplified by our description of material and energy flows in four commercial PV technologies, i.e., mono-crystalline silicon, multi-crystalline silicon, ribbon-silicon, and cadmium telluride. The same life-cycle approach is applied to the balance of system that supports flat, fixed PV modules during operation. We also discuss the life-cycle environmental metrics for a concentration PV system with a tracker and lenses to capture more sunlight per cell area than the flat, fixed system but requires large auxiliary components. Select life-cycle risk indicators for PV, i.e., fatalities, injures, and maximum consequences are evaluated in a comparative context with other electricity-generation pathways.

Fthenakis V. M.; Kim, H.C.

2009-10-02T23:59:59.000Z

29

Alternative Fuels Data Center: Lifecycle Energy Balance  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

AFDC AFDC Printable Version Share this resource Send a link to Alternative Fuels Data Center: Lifecycle Energy Balance to someone by E-mail Share Alternative Fuels Data Center: Lifecycle Energy Balance on Facebook Tweet about Alternative Fuels Data Center: Lifecycle Energy Balance on Twitter Bookmark Alternative Fuels Data Center: Lifecycle Energy Balance on Google Bookmark Alternative Fuels Data Center: Lifecycle Energy Balance on Delicious Rank Alternative Fuels Data Center: Lifecycle Energy Balance on Digg Find More places to share Alternative Fuels Data Center: Lifecycle Energy Balance on AddThis.com... More in this section... Lifecycle Energy Balance The fossil "energy balance" of ethanol has been the subject of debate despite the fact that this metric is not as useful to policymakers as

30

Sustainability: Economics, Lifecycle Analysis, Green House Gases ...  

Science Conference Proceedings (OSTI)

Report on Linking Transformational Materials and Processing for Energy and ... LIFECYCLE ANALYSIS, GREEN HOUSE GASES, AND CLIMATE CHANGE ...

31

Information Resources: Life-Cycle Assessment of Energy and Environmental  

NLE Websites -- All DOE Office Websites (Extended Search)

Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL alternatives. The reports for Parts 1 and 2 were published in February 2012 and June 2012, respectively, providing a literature review and life-cycle assessment (LCA) for lamps utilizing these three light source technologies. Presenters Jason Tuenge of Pacific Northwest National Laboratory and Brad Hollomon of Compa Industries focused on findings from Part 3, which augments the LCA results with chemical analysis of a variety of lamps using standard testing procedures from the U.S. Environmental Protection Agency and the State of California. A total of 22 samples, representing 11 different lamps, were tested to ascertain whether potentially toxic elements are present in concentrations that exceed regulatory thresholds for hazardous waste.

32

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a...

33

Heat exchanger Exergoeconomic lifecycle cost optimization  

Science Conference Proceedings (OSTI)

Considering lifecycle cost analysis during the design phase of thermal systems gives the design effort more worth. Furthermore thermodynamic exergetic optimization is proven to be useful method for determining the most lifecycle cost optimal design of ... Keywords: entropy generation, exergy destruction, heat exchanger, operating cost, optimization, thermodynamics

Liaquat Ali Khan; Ali El-Ghalban

2008-02-01T23:59:59.000Z

34

Roles and Lifecycle | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Roles and Lifecycle Roles and Lifecycle Roles and Lifecycle Employee Property Responsibilities by Role Director, Office of Administration The Director, Office of Administration, has the following responsibilities: *Establish a personal property management program for DOE Headquarters, except for the Federal Energy Regulatory Commission (FERC); *Appoint an Organizational Property Management Officer (OPMO) who is responsible for the Headquarters personal property management program; and *Approve, conditionally approve, or disapprove contractor property management systems for all DOE direct operations at Headquarters except for the FERC. Organizational Property Management Officer (OPMO) The OPMO has the following primary responsibilities: *Manage the control, management, and disposal of personal property in the

35

Lifecycle Assessments and Sustainability Analyses | Open Energy Information  

Open Energy Info (EERE)

Lifecycle Assessments and Sustainability Analyses Lifecycle Assessments and Sustainability Analyses Jump to: navigation, search The National Renewable Energy Laboratory performs lifecycle and technoeconomic analyses to promote sustainable energy development. Conducting full life-cycle assessments for biomass products, including electricity, biodiesel, and ethanol, is important for determining environmental benefits. NREL analysts use a life-cycle inventory modeling package and supporting databases to conduct life-cycle assessments. These tools can be applied on a global, regional, local, or project basis. Integrated system analyses, technoeconomic analyses, life-cycle assessments (LCAs), and other analysis tools are essential to our research and development efforts. They provide an understanding of the economic,

36

Probabilistic algebraic attacks  

Science Conference Proceedings (OSTI)

This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the ... Keywords: algebraic attack, algebraic immunity, annihilator, combination and filter generator, walsh spectrum

An Braeken; Bart Preneel

2005-12-01T23:59:59.000Z

37

Seven Deadliest Network Attacks  

Science Conference Proceedings (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

2010-05-01T23:59:59.000Z

38

Modeling and visualization of lifecycle building performance assessment  

Science Conference Proceedings (OSTI)

Lifecycle building performance assessment (LBPA) ensures that buildings perform and operate as intended during building lifecycle. Such assessment activities are typically multi-phase and multi-disciplinary, and generate large amounts of information ...

Ipek Gursel; Sevil Sariyildiz; Ömer Akin; Rudi Stouffs

2009-10-01T23:59:59.000Z

39

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

40

Introduction to side channel attacks and non invasive attacks  

Science Conference Proceedings (OSTI)

... FIPS conference side channel attacks and perturbation attacks 7 Pow er analysis Pow er leakage usec m A Instruction fetch Instruction processing ...

2007-09-21T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Extending the resynchronization attack  

Science Conference Proceedings (OSTI)

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their ...

Frederik Armknecht; Joseph Lano; Bart Preneel

2004-08-01T23:59:59.000Z

42

Beware of BGP attacks  

Science Conference Proceedings (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

Ola Nordström; Constantinos Dovrolis

2004-04-01T23:59:59.000Z

43

Life-Cycle Analysis Process Steps  

Science Conference Proceedings (OSTI)

Table 1   Example of a life-cycle inventory for an unspecified product...70 Nontoxic chemicals 2,000 Water effluents, mg COD 1,000 BOD 150 Acid, as H + 75 Nitrates 5 Metals 300 Ammonium ions 5 Chloride ions 120 Dissolved organics 20 Suspended solids 400 Oil 100 Hydrocarbons 100 Phenol 1 Dissolved solids 400 Phosphate 5 Other nitrogen 10 Sulfate ions 10 COD, chemical...

44

Life-Cycle Water and Greenhouse Gas Implications of Alternative...  

NLE Websites -- All DOE Office Websites (Extended Search)

of life-cycle assessment and optimization in assessing such questions as: a.) How will future transportation energy production impact water resource availability in the US? b.)...

45

Vehicle Manufacturing Futures in Transportation Life-cycle Assessment  

E-Print Network (OSTI)

GHG emissions of future transportation modes. These resultsVehicle Manufacturing Futures in Transportation Life-cycleVehicle Manufacturing Futures in Transportation Life-cycle

Chester, Mikhail; Horvath, Arpad

2011-01-01T23:59:59.000Z

46

Berkeley Lab Study of Hydrogen Generating Technology's Lifecycle...  

NLE Websites -- All DOE Office Websites (Extended Search)

Berkeley Lab Study of Hydrogen Generating Technology's Lifecycle Net Energy Balance Designated a 'Hot' Article by Journal Photoelectrochemical hydrogen technology LCA analysis July...

47

GPS software attacks  

Science Conference Proceedings (OSTI)

Since its creation, the Global Positioning System (GPS) has grown from a limited purpose positioning system to a ubiquitous trusted source for positioning, navigation, and timing data. To date, researchers have essentially taken a signal processing approach ... Keywords: gps, rf attacks, security

Tyler Nighswander; Brent Ledvina; Jonathan Diamond; Robert Brumley; David Brumley

2012-10-01T23:59:59.000Z

48

Life-Cycle Decision Making: Volume 1: Getting Started  

Science Conference Proceedings (OSTI)

Life-Cycle Decision Making (LCDM) 2.0 is a suite of integrated tools for making a wide range of decisions based on life-cycle costs and revenues. LCDM puts powerful methods and tools at the fingertips of employees, empowering them to quickly make better day-to-day business decisions based on the true costs and benefits to the company.

1998-11-12T23:59:59.000Z

49

New Tool Yields Custom Environmental Data for Lifecycle Analysis |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tool Yields Custom Environmental Data for Lifecycle Analysis Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's National Energy Technology Laboratory (NETL) - can be used with other data or models to build an emissions inventory of various feedstocks as part of a comprehensive lifecycle analysis of the fuels. Lifecycle analysis is a new and innovative way to analyze and compare different pathways for producing power and transportation fuels.

50

Building Life-Cycle Cost (BLCC) Program | Open Energy Information  

Open Energy Info (EERE)

Building Life-Cycle Cost (BLCC) Program Building Life-Cycle Cost (BLCC) Program Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Building Life-Cycle Cost (BLCC) Program Agency/Company /Organization: United States Department of Energy Partner: National Institute of Standards and Technology Sector: Energy Focus Area: Buildings, Energy Efficiency Phase: Create a Vision, Determine Baseline, Evaluate Options, Develop Goals, Prepare a Plan Topics: Finance, Pathways analysis Resource Type: Software/modeling tools User Interface: Desktop Application Website: www1.eere.energy.gov/femp/information/download_blcc.html Cost: Free OpenEI Keyword(s): EERE tool, Building Life-Cycle Cost, BLCC References: Building Life-Cycle Cost (BLCC) Programs[1] Building Energy Software Tools Directory: BLCC[2]

51

New Tool Yields Custom Environmental Data for Lifecycle Analysis |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's National Energy Technology Laboratory (NETL) - can be used with other data or models to build an emissions inventory of various feedstocks as part of a comprehensive lifecycle analysis of the fuels. Lifecycle analysis is a new and innovative way to analyze and compare different pathways for producing power and transportation fuels.

52

Inhibiting card sharing attacks  

Science Conference Proceedings (OSTI)

The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number ...

Michael Tunstall; Konstantinos Markantonakis; Keith Mayes

2006-10-01T23:59:59.000Z

53

Life-Cycle Assessment of Electric Power Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Life-Cycle Assessment of Electric Power Systems Life-Cycle Assessment of Electric Power Systems Title Life-Cycle Assessment of Electric Power Systems Publication Type Journal Article Year of Publication 2013 Authors Masanet, Eric R., Yuan Chang, Anand R. Gopal, Peter H. Larsen, William R. Morrow, Roger Sathre, Arman Shehabi, and Pei Zhai Journal Annual Review of Environment and Resources Volume 38 Date Published 2013 Keywords electricity, energy policy, environmental analysis, life-cycle impact, life-cycle inventory Abstract The application of life-cycle assessment (LCA) to electric power (EP) technologies is a vibrant research pursuit that is likely to continue as the world seeks ways to meet growing electricity demand with reduced environmental and human health impacts. While LCA is an evolving methodology with a number of barriers and challenges to its effective use, LCA studies to date have clearly improved our understanding of the life-cycle energy, GHG emissions, air pollutant emissions, and water use implications of EP technologies. With continued progress, LCA offers promise for assessing and comparing EP technologies in an analytically-thorough and environmentally-holistic manner for more robust deployment decisions. This article summarizes: (1) major challenges in applying LCA to EP technologies thus far, (2) LCA results to date on the various impacts of EP technologies, and (3) opportunities for improving LCAs as applied to EP technologies moving forward.

54

Beware of BGP Attacks  

E-Print Network (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.

Ola Nordström; Constantinos Dovrolis

2004-01-01T23:59:59.000Z

55

CCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW landfill disposal  

E-Print Network (OSTI)

Environmental Protection Agency (US EPA) regulations, it produces energy and does not emit fossil carbonCCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW in waste-to-energy (WTE) facilities. In other countries, the predominant disposal option for wood

Florida, University of

56

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials Prospective Life-Cycle Modeling of Novel Carbon Capture Materials Speaker(s): Roger Sathre Date: December 5, 2011 - 3:30pm Location: 90-4133 Seminar Host/Point of Contact: Anita Estner Barbara Adams In this presentation we describe the prospective life-cycle modeling of metal-organic frameworks (MOF), a novel type of material with the potential for efficiently capturing CO2. Life-cycle modeling of emerging technologies, conducted early in the innovation process, can generate knowledge that can feed back to inform scientific discovery and development. We discuss the challenges of credibly modeling a system that does not yet exist, and describe methodological approaches including parametric system modeling (quantifying relations between system elements), scenario projections (defining plausible pathways for system scale-up),

57

Economics of Lifecycle Analysis and Greenhouse Gas Regulation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Deepak Rajagopal Date: May 28, 2009 - 12:00pm Location: 90-3122 Unlike with conventional fossil fuels, lifecycle GHG emissions from energy sources such as biofuels, batteries, oil...

58

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Life-Cycle Modeling of Novel Carbon Capture Materials Speaker(s): Roger Sathre Date: December 5, 2011 - 3:30pm Location: 90-4133 Seminar HostPoint of Contact: Anita...

59

Review of Electricity Generation Technology Lifecycle GHG Emissions  

Science Conference Proceedings (OSTI)

This paper presents and discusses results from a selection of published cross-technology assessments and two recent meta-analyses evaluating life-cycle greenhouse gas emissions from different electricity generation technologies. Differences in life-cycle GHG estimates reflect differing assessment methodologies, plant and equipment construction practices, power plant conversion efficiencies, power plant size and operating characteristics, practices in fuel preparation and transport, and system boundary as...

2010-01-29T23:59:59.000Z

60

The principles of life-cycle analysis  

SciTech Connect

Decisionmakers representing government agencies must balance competing objectives when deciding on the purchase and sale of assets. The goal in all cases should be to make prudent or financially {open_quotes}cost-effective{close_quotes} decisions. That is, the revenues from the purchase or sale of assets should exceed any out-of-pocket costs to obtain the revenues. However, effects external to these financial considerations such as promoting environmental quality, creating or maintaining jobs, and abiding by existing regulations should also be considered in the decisionmaking process. In this paper, we outline the principles of life-cycle analysis (LCA), a framework that allows decisionmakers to make informed, balanced choices over the period of time affected by the decision, taking into account important external effects. Specifically, LCA contains three levels of analysis for any option: (1) direct financial benefits (revenues) and out-of-pocket costs for a course of action; (2) environmental and health consequences of a decision; and (3) other economic and socio-institutional effects. Because some of the components of LCA are difficult to value in monetary terms, the outcome of the LCA process is not generally a yes-no answer. However, the framework allows the decisionmaker to at least qualitatively consider all relevant factors in analyzing options, promoting sound decisionmaking in the process.

Hill, L.J.; Hunsaker, D.B.; Curlee, T.R.

1996-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The Life-cycle of Operons  

SciTech Connect

Operons are a major feature of all prokaryotic genomes, but how and why operon structures vary is not well understood. To elucidate the life-cycle of operons, we compared gene order between Escherichia coli K12 and its relatives and identified the recently formed and destroyed operons in E. coli. This allowed us to determine how operons form, how they become closely spaced, and how they die. Our findings suggest that operon evolution is driven by selection on gene expression patterns. First, both operon creation and operon destruction lead to large changes in gene expression patterns. For example, the removal of lysA and ruvA from ancestral operons that contained essential genes allowed their expression to respond to lysine levels and DNA damage, respectively. Second, some operons have undergone accelerated evolution, with multiple new genes being added during a brief period. Third, although most operons are closely spaced because of a neutral bias towards deletion and because of selection against large overlaps, highly expressed operons tend to be widely spaced because of regulatory fine-tuning by intervening sequences. Although operon evolution seems to be adaptive, it need not be optimal: new operons often comprise functionally unrelated genes that were already in proximity before the operon formed.

Price, Morgan N.; Arkin, Adam P.; Alm, Eric J.

2005-11-18T23:59:59.000Z

62

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

63

Lifecycle-analysis for heavy vehicles.  

DOE Green Energy (OSTI)

Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

Gaines, L.

1998-04-16T23:59:59.000Z

64

Life-Cycle Cost Analysis | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Life-Cycle Cost Analysis Life-Cycle Cost Analysis Life-Cycle Cost Analysis October 16, 2013 - 4:41pm Addthis Constructed Costs of a Net-Zero Office Building Facility: Research Support Facility at the National Renewable Energy Laboratory in Golden, Colorado Operational: August 2010 Constructed cost: $259/ft2 to achieve 50% less energy use than code Constructed cost of similar office buildings in area: $225 to $300/ft2 Reaching Net-Zero: A 1.27 MW photovoltaic system was added to the project in two phases to bring the system to net-zero. This system was financed through a power purchase agreement and did not add to the constructed cost of the building. If those costs were included in the capital costs, the total constructed cost would have been 291/ft2 to reach net-zero energy use. Learn more about the Research Support

65

Solid-State Lighting: Life-Cycle Assessment of Energy and Environmenta...  

NLE Websites -- All DOE Office Websites (Extended Search)

Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products to someone by E-mail Share Solid-State Lighting: Life-Cycle Assessment of Energy and...

66

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

67

Optimization of Transmission Line Design Using Life-Cycle Costing  

Science Conference Proceedings (OSTI)

When an overhead line is designed, all costs incurred during the expected life of the line should be considered. The total cost during the life, or life-cycle cost, of a transmission line is a combination of the initial capital cost, operation and maintenance (O&M) cost, cost of electrical losses over its entire life, and dependability-associated costs. The option that has the lowest life-cycle cost is selected as the optimized design. A tool is required by utility engineers to help them readily select a...

2008-12-09T23:59:59.000Z

68

Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes  

Science Conference Proceedings (OSTI)

Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasures, a number of secure architectures based on linear and nonlinear error detecting codes were proposed. Linear codes provide protection only against primitive ... Keywords: arithmetic codes, cryptography, multipliers, sidechannel attacks

Zhen Wang, Mark Karpovsky, Ajay Joshi

2012-06-01T23:59:59.000Z

69

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

70

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network (OSTI)

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

71

Lifecycle Costs of Ultracapacitors in Electric Vehicle Applications A. G. Simpson G. R. Walker  

E-Print Network (OSTI)

and cost of the battery under consideration. However, it is likely that the lifecycle cost benefits that examines the lifecycle costs of ultracapacitors in battery electric vehicle applications. The lifecycle). · The high capital cost and relatively short lifetime (commonly 3 years) of electrochemical batteries, which

Walker, Geoff

72

A Look In the Mirror: Attacks on Package Managers Author Names Removed for Anonymous Submission  

E-Print Network (OSTI)

for security. There is no protection of package metadata or the root metadata. Package Metadata An attacker can of the package in the package meta- data protects the package from tampering. Packages Resistance to metadata, the package metadata is protected from tam- pering. Packages The signature on the root metadata prevents

Hartman, John H.

73

Mo-Si-B Based Coating For Oxidation Protection of SiC Composites  

Science Conference Proceedings (OSTI)

... in engine, aircraft and aerospace applications requires an external protective ... from attack due to corrosive combustion environments and active oxidation.

74

Totally green: evaluating and designing servers for lifecycle environmental impact  

Science Conference Proceedings (OSTI)

The environmental impact of servers and datacenters is an important future challenge. System architects have traditionally focused on operational energy as a proxy for designing green servers, but this ignores important environmental implications from ... Keywords: datacenter design, dematerialization, disaggregation, environmental sustainability, exergy, green computing, lifecycle impact, server architecture

Jichuan Chang; Justin Meza; Parthasarathy Ranganathan; Amip Shah; Rocky Shih; Cullen Bash

2012-04-01T23:59:59.000Z

75

Ambient Intelligence in Product Life-cycle Management  

Science Conference Proceedings (OSTI)

To fulfil the increasing demands today the short innovation time and the high quality of production itself is not enough in production of goods, but all phases of a product (from idea to recycling) should be managed by advanced tools and means. Nowadays ... Keywords: Ambient Intelligence, Product Life-cycle Management, Service engineering

G. Kovács; S. Kopácsi; G. Haidegger; R. Michelini

2006-12-01T23:59:59.000Z

76

Life-cycle cost analysis project. Final report  

Science Conference Proceedings (OSTI)

An investigation was conducted to demonstrate the impact of life-cycle costing in Ohio's residential building sector. Typical single-family, townhouse, and multifamily housing units were modeled using sophisticated computer programs to predict annual energy comsumption. Energy conservation techniques were applied to the typical units and the resulting utility savings were computed. Installed costs were estimated for each energy conservation technique.

Davies, G.R.; Temming, S.J.

1980-09-30T23:59:59.000Z

77

Incorporating UCD into the software development lifecycle: a case study  

Science Conference Proceedings (OSTI)

This case study addresses how we applied user centered design (UCD) to the software development lifecycle for the new City of Austin Utilities Online Customer Care website. The case study focuses on the use of personas, prototypes, and user testing, ... Keywords: personas, prototypes, simulations, ucd, usability, user centered design, user experience

Andy Switzky

2012-05-01T23:59:59.000Z

78

Market disruption, cascading effects, and economic recovery:a life-cycle hypothesis model.  

Science Conference Proceedings (OSTI)

This paper builds upon previous work [Sprigg and Ehlen, 2004] by introducing a bond market into a model of production and employment. The previous paper described an economy in which households choose whether to enter the labor and product markets based on wages and prices. Firms experiment with prices and employment levels to maximize their profits. We developed agent-based simulations using Aspen, a powerful economic modeling tool developed at Sandia, to demonstrate that multiple-firm economies converge toward the competitive equilibria typified by lower prices and higher output and employment, but also suffer from market noise stemming from consumer churn. In this paper we introduce a bond market as a mechanism for household savings. We simulate an economy of continuous overlapping generations in which each household grows older in the course of the simulation and continually revises its target level of savings according to a life-cycle hypothesis. Households can seek employment, earn income, purchase goods, and contribute to savings until they reach the mandatory retirement age; upon retirement households must draw from savings in order to purchase goods. This paper demonstrates the simultaneous convergence of product, labor, and savings markets to their calculated equilibria, and simulates how a disruption to a productive sector will create cascading effects in all markets. Subsequent work will use similar models to simulate how disruptions, such as terrorist attacks, would interplay with consumer confidence to affect financial markets and the broader economy.

Sprigg, James A.

2004-11-01T23:59:59.000Z

79

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

80

Life-Cycle Assessment of Electric Power Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Life-Cycle Life-Cycle Assessment of Electric Power Systems Eric Masanet, 1 Yuan Chang, 1 Anand R. Gopal, 2 Peter Larsen, 2,3 William R. Morrow III, 2 Roger Sathre, 2 Arman Shehabi, 2 and Pei Zhai 2 1 McCormick School of Engineering and Applied Science, Northwestern University, Evanston, Illinois 60208; email: eric.masanet@northwestern.edu, yuan.chang@northwestern.edu 2 Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720; email: argopal@lbl.gov, wrmorrow@lbl.gov, rsathre@lbl.gov, ashehabi@lbl.gov, pzhai@lbl.gov 3 Management Science and Engineering Department, Stanford University, Stanford, California 94305; email: phlarsen@lbl.gov Annu. Rev. Environ. Resour. 2013. 38:107-36 First published online as a Review in Advance on August 7, 2013 The Annual Review of Environment and Resources is online at http://environ.annualreviews.org

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

The Velocity of Money in a Life-Cycle Model  

E-Print Network (OSTI)

The determinants of the velocity of money have been examined based on life-cycle hypothesis. The velocity of money can be expressed by reciprocal of the average value of holding time which is defined as interval between participating exchanges for one unit of money. This expression indicates that the velocity is governed by behavior patterns of economic agents and open a way to constructing micro-foundation of it. It is found that time pattern of income and expense for a representative individual can be obtained from a simple version of life-cycle model, and average holding time of money resulted from the individual's optimal choice depends on the expected length of relevant planning periods.

Wang, Y; Wang, Yougui; Qiu, Hanqing

2005-01-01T23:59:59.000Z

82

Life-cycle analysis of shale gas and natural gas.  

SciTech Connect

The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M. (Energy Systems); ( EVS)

2012-01-27T23:59:59.000Z

83

Life-Cycle Cost and Payback Period Analysis for Commercial Unitary...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Payback Period Analysis for Commercial Unitary Air Conditioners Title Life-Cycle Cost and Payback Period Analysis for Commercial Unitary Air Conditioners Publication Type...

84

Life of Sugar: Developing Lifecycle Methods to Evaluate the Energy and Environmental Impacts of Sugarcane Biofuels.  

E-Print Network (OSTI)

??Lifecycle Assessment (LCA) is undergoing a period of rapid change as it strives to become more policy-relevant. Attributional LCA, the traditional LCA category, is beginning… (more)

Gopal, Anand Raja

2011-01-01T23:59:59.000Z

85

Comparison of Li-Ion Battery Recycling Processes by Life-Cycle...  

NLE Websites -- All DOE Office Websites (Extended Search)

Center for Transportation Research Argonne National Laboratory Comparison of Li-Ion Battery Recycling Processes by Life-Cycle Analysis Electric Vehicles and the Environment...

86

Attacking Automatic Wireless Network Selection  

E-Print Network (OSTI)

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as Preferred or Trusted Networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker’s wireless network without user interaction or notification. This will occur even if the user has never connected to a wireless network before or they have an empty Preferred/Trusted Networks List. We describe these vulnerabilities as well as their implementation and impact. 1

Dino A. Dai Zovi; Shane A. Macaulay

2005-01-01T23:59:59.000Z

87

Serial model for attack tree computations  

Science Conference Proceedings (OSTI)

In this paper we extend the standard attack tree model by introducing temporal order to the attacker's decision making process. This will allow us to model the attacker's behaviour more accurately, since this way it is possible to study his actions related ...

Aivo Jürgenson; Jan Willemson

2009-12-01T23:59:59.000Z

88

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

89

TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.  

SciTech Connect

Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

Willenbring, James M.; Bartlett, Roscoe Ainsworth (Oak Ridge National Laboratory, Oak Ridge, TN); Heroux, Michael Allen

2012-01-01T23:59:59.000Z

90

SIMULATED LIFECYCLE COSTS OF ULTRACAPACITORS IN BATTERY ELECTRIC VEHICLES A.G. Simpson*, P.C. Sernia and G.R. Walker  

E-Print Network (OSTI)

SIMULATED LIFECYCLE COSTS OF ULTRACAPACITORS IN BATTERY ELECTRIC VEHICLES A.G. Simpson*, P, vehicle driving range, battery pack lifetime, and potential reductions in system lifecycle cost costs of ultracapacitors in battery electric vehicle applications. The lifecycle operation

Walker, Geoff

91

Experiences with early life-cycle performance modeling for architecture assessment  

Science Conference Proceedings (OSTI)

In this paper we describe our preliminary experiences of a performance modeling "Blending" approach for early life-cycle architecture assessment and risk mitigation in a large enterprise integration project. The goal was to use performance modeling to ... Keywords: blended performance modeling, early life-cycle risk mitigation

Paul C. Brebner

2012-06-01T23:59:59.000Z

92

Year 2006 UCD-ITS-RR-06-08 Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

Year 2006 UCD-ITS-RR-06-08 Lifecycle Analyses of Biofuels Draft Report (May be cited as draft://its.ucdavis.edu/ #12;DRAFT WORKING MANUSCRIPT LIFECYCLE ANALYSES OF BIOFUELS Draft manuscript (may be cited as draft analysis (LCA) of biofuels for transportation has three major parts: I. An analysis of greenhouse

Delucchi, Mark

93

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

94

A collusion attack optimization strategy for digital fingerprinting  

Science Conference Proceedings (OSTI)

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of ... Keywords: Multimedia security, collusion attack, digital fingerprinting, optimization

Hui Feng; Hefei Ling; Fuhao Zou; Weiqi Yan; Zhengding Lu

2012-09-01T23:59:59.000Z

95

Protecting clients from insider attacks on trust accounts  

Science Conference Proceedings (OSTI)

Law firms are no exception to the trend towards computerized information infrastructures, particularly because the very nature of their business is collecting and storing highly confidential client data. One area of activity which has come under intense ... Keywords: Fraud, IT security, Trust account

Sameera Mubarak; Jill Slay

2009-11-01T23:59:59.000Z

96

Optimal Power Grid Protection through A Defender-Attacker ...  

E-Print Network (OSTI)

DC power flow model is used to compute power ... Constraints (4) capture the active DC power flows on a ..... Board on Energy and Environmental Systems; Na -.

97

Non-Invasive Attack Testing Workshop  

Science Conference Proceedings (OSTI)

Non-Invasive Attack Testing Workshop. Purpose: To encourage development of test methods, metrics and tools for evaluating the effectiveness of ...

2013-05-14T23:59:59.000Z

98

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

99

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

100

Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs  

Science Conference Proceedings (OSTI)

As computers have become ever more interconnected, the complexity of security configuration has exploded. Management tools have not kept pace, and we show that this has made identity snowball attacks into a critical danger. Identity snowball attacks ... Keywords: access control, attack graph, authentication, combinatorial optimization, identity snowball, machine learning, sparsest cut, support vector machine

John Dunagan; Alice X. Zheng; Daniel R. Simon

2009-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Metracker version 1.5: Life-cycle performance metricstracking  

SciTech Connect

Buildings often do not perform as well in practice as expected during pre-design planning, nor as intended at the design stage, nor even as measured during commissioning and maintenance operations. While this statement is generally considered to be true, it is difficult to quantify the impacts and long-term economic implications of a building in which performance does not meet expectations. This leads to a building process that is devoid of quantitative feedback that could be used to detect and correct problems both in an individual building and in the building process itself. A key element in this situation is the lack of a standardized method for documenting and communicating information about the intended and actual performance of a building. This deficiency leads to several shortcomings in the life-cycle management of building information. Planners have no means of clearly specifying their expectations. Designers do not concisely document their design intent. Commissioning personnel have no standardized method for documenting the results of performance testing. Post-occupancy building performance cannot readily be compared to expectations in an attempt to evaluate and improve design and operation decisions. Lastly, without quantification of the magnitude of performance problems it is difficult to motivate building process participants to alter their current practice. This document describes an information management concept and a prototype tool based on this concept that has been developed to address this situation. The Building Life-cycle Information System (BLISS) has been designed to manage a wide range of building related information across the life cycle of a building project. Metracker is a prototype implementation of BLISS based on the International Alliance for Interoperability's (IAI) Industry Foundation Classes (IFC). The IFC is an evolving data model under development by a variety of architectural, engineering, and construction (AEC) industry firms and organizations (IAI, 2001). Metracker has been developed to demonstrate and explore the process of tracking performance metrics across the building life cycle.

Hitchcock, Robert J.

2002-01-17T23:59:59.000Z

102

Survey and taxonomy of botnet research through life-cycle  

Science Conference Proceedings (OSTI)

Of all current threats to cybersecurity, botnets are at the top of the list. In consequence, interest in this problem is increasing rapidly among the research community and the number of publications on the question has grown exponentially in recent ... Keywords: Attack, botnet, defense, detection, survey, taxonomy

Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro

2013-08-01T23:59:59.000Z

103

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

104

Higher Order Differential Attack of Camellia (II)  

Science Conference Proceedings (OSTI)

Camellia is a 128-bit block cipher, proposed by NTT and Mitsubishi in 2000. It has been shown that 10 round variant without FL function under a 256-bit secret key is attackable by Higher Order Differential Attack and even if FL function is included, ...

Yasuo Hatano; Hiroki Sekine; Toshinobu Kaneko

2002-08-01T23:59:59.000Z

105

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

106

Life-Cycle Analysis and Energy Efficiency in State Buildings | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Life-Cycle Analysis and Energy Efficiency in State Buildings Life-Cycle Analysis and Energy Efficiency in State Buildings Life-Cycle Analysis and Energy Efficiency in State Buildings < Back Eligibility State Government Savings Category Heating & Cooling Commercial Heating & Cooling Cooling Home Weatherization Construction Commercial Weatherization Design & Remodeling Heating Appliances & Electronics Water Heating Bioenergy Manufacturing Buying & Making Electricity Alternative Fuel Vehicles Hydrogen & Fuel Cells Energy Sources Solar Water Wind Program Info State Missouri Program Type Energy Standards for Public Buildings Provider Office of Administration Several provisions of Missouri law govern energy efficiency in state facilities. In 1993 Missouri enacted legislation requiring life-cycle cost analysis for all new construction of state buildings and substantial

107

Life-Cycle Water Impacts of U.S. Transportation Fuels  

E-Print Network (OSTI)

144 Figure 63: Impact of Hydroelectricity on the Life-Cycle157 Figure 64: Impact of Hydroelectricity on the Water68 Table 14: Hydroelectricity-Related FWSE (Data Source: (

Scown, Corinne Donahue

2010-01-01T23:59:59.000Z

108

Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production  

E-Print Network (OSTI)

Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production Transportation Energy The Issue Algae biofuels directly address the Energy Commission's Public Interest Energy Research fuels more carbonintensive than conventional biofuels. Critics of this study argue that alternative

109

Guidance on Life-Cycle Cost Analysis Required by Executive Order...  

NLE Websites -- All DOE Office Websites (Extended Search)

alternative 2. Federal Life-Cycle Cost Criteria (a) Discount rate (b) DOE energy price escalation rates (c) Use of constant dollars (d) Study period (e) Presumption of cost...

110

A MULTI-COUNTRY ANALYSIS OF LIFECYCLE EMISSIONS FROM TRANSPORTATION FUELS AND MOTOR VEHICLES  

E-Print Network (OSTI)

of the lifecycle of gasoline: crude oil recovery, petroleummaterials are input to the crude-oil recovery process, whichresults in an output of crude oil. This crude oil output is

Delucchi, Mark

2005-01-01T23:59:59.000Z

111

A Multi-Country Analysis of Lifecycle Emissions From Transportation Fuels and Motor Vehicles  

E-Print Network (OSTI)

of the lifecycle of gasoline: crude oil recovery, petroleummaterials are input to the crude-oil recovery process, whichresults in an output of crude oil. This crude oil output is

Delucchi, Mark

2005-01-01T23:59:59.000Z

112

Life-Cycle Cost Analysis Overhead Transmission Lines (LCCA) Version 1.1  

Science Conference Proceedings (OSTI)

The LCCA software is a tool to assist transmission line designers in selecting the optimized design for an overhead line by comparing the life-cycle cost of various design options. Windows2000, XP, and Vista Excel 2003 and 2007

2011-12-15T23:59:59.000Z

113

Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)  

DOE Green Energy (OSTI)

This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

Not Available

2010-11-01T23:59:59.000Z

114

Solid-State Lighting: Text Alternative Version: Life-Cycle Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products to someone by E-mail Share Solid-State Lighting: Text Alternative...

115

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

NLE Websites -- All DOE Office Websites (Extended Search)

NISTIR 85-3273-28 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S....

116

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2010  

Energy.gov (U.S. Department of Energy (DOE))

Report describes the 2010 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities.

117

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

NLE Websites -- All DOE Office Websites (Extended Search)

7 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D....

118

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

NLE Websites -- All DOE Office Websites (Extended Search)

5 (Rev. 510) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special...

119

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

Science Conference Proceedings (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

120

Literature Review and Sensitivity Analysis of Biopower Life-Cycle Assessments and Greenhouse Gas Emission  

Science Conference Proceedings (OSTI)

Biomass power offers utilities a potential pathway to increase their renewable generation portfolios for compliance with renewable energy standards and to reduce greenhouse gas (GHG) emissions relative to current fossil-based technologies. To date, a large body of life-cycle assessment (LCA) literature assessing biopower’s life-cycle GHG emissions has been published.Phase A of this project performed an exhaustive search of the biopower LCA literature yielding 117 references that ...

2013-01-30T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Survey of life-cycle measures and metrics for concurrent product and process design  

Science Conference Proceedings (OSTI)

Concurrent Engineering needs a series of measures (or measurement criteria) that are distinct to each process, and a set of metrics to check (and validate) the outcome when two or more of the life-cycle processes are overlapped or required to be executed ... Keywords: Concurrent Engineering, Knowledge-based Systems, Life-cycle Measures and Metrics, Rule-based Optimization, Rule-based Simulation

Biren Prasad

2000-04-01T23:59:59.000Z

122

State of the Science of Biopower Life-Cycle Greenhouse Gas Emissions  

Science Conference Proceedings (OSTI)

Biomass power offers utilities a potential pathway to increase their renewable generation portfolio for compliance with renewable energy standards and to reduce greenhouse gas emissions relative to current fossil-based technologies. To date, a large body of life-cycle assessment (LCA) literature assessing biopower's life-cycle greenhouse gas (GHG) emissions has been published. An exhaustive search of the biopower LCA literature yielded 117 references that passed quality and relevance screening criteria. ...

2011-12-30T23:59:59.000Z

123

Iago attacks: why the system call API is a bad untrusted RPC interface  

Science Conference Proceedings (OSTI)

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted application's state. Under such ... Keywords: iago attacks, overshadow, system call

Stephen Checkoway; Hovav Shacham

2013-04-01T23:59:59.000Z

124

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

125

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

126

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

127

National Infrastructure Protection Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Protection Plan Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation's CI/KR as weapons of mass destruction could have even more

128

Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities  

E-Print Network (OSTI)

gases are emitted throughout the production lifecycle, during "uranium mining (open pit and underground), milling, conversion, enrich- ment (diffusion and centrifuge),

Hagan, Colin R.

2012-01-01T23:59:59.000Z

129

Life-cycle analysis of alternative aviation fuels in GREET  

SciTech Connect

The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet fuel production unless carbon management practices, such as carbon capture and storage, are used.

Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S. (Energy Systems)

2012-07-23T23:59:59.000Z

130

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

131

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein  

Science Conference Proceedings (OSTI)

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein. For Immediate Release: November 3, 2009. ...

2012-10-02T23:59:59.000Z

132

Environmental Protection Division (ENV)  

National Nuclear Security Administration (NNSA)

in reducing environmental hazards, conserve environmental resources, minimize life-cycle costs and liability of DOE programs, and maximize operational capability through...

133

Effect of cumulative seismic damage and corrosion on life-cycle cost of reinforced concrete bridges  

E-Print Network (OSTI)

Bridge design should take into account not only safety and functionality, but also the cost effectiveness of investments throughout a bridge life-cycle. This work presents a probabilistic approach to compute the life-cycle cost (LCC) of corroding reinforced concrete (RC) bridges in earthquake prone regions. The approach is developed by combining cumulative seismic damage and damage associated to corrosion due to environmental conditions. Cumulative seismic damage is obtained from a low-cycle fatigue analysis. Chloride-induced corrosion of steel reinforcement is computed based on Fick’s second law of diffusion. The proposed methodology accounts for the uncertainties in the ground motion parameters, the distance from source, the seismic demand on the bridge, and the corrosion initiation time. The statistics of the accumulated damage and the cost of repairs throughout the bridge life-cycle are obtained by Monte-Carlo simulation. As an illustration of the proposed approach, the effect of design parameters on the life-cycle cost of an example RC bridge is studied. The results are shown to be valuable in better estimating the condition of existing bridges (i.e., total accumulated damage at any given time) and, therefore, can help schedule inspection and maintenance programs. In addition, by taking into consideration the deterioration process over a bridge life-cycle, it is possible to make an estimate of the optimum design parameters by minimizing, for example, the expected cost throughout the life of the structure.

Kumar, Ramesh

2007-12-01T23:59:59.000Z

134

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

135

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

136

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

137

When Utility Bills Attack! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

138

Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel  

NLE Websites -- All DOE Office Websites (Extended Search)

Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel Life-Cycle Water and Greenhouse Gas Implications of Alternative Fuel Production Speaker(s): Corinne Scown Date: January 31, 2012 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Michael Sohn If the goal of science is to understand the structure and behavior of the physical and natural world, and the goal of engineering is to design, build, and manage systems that serve society's needs, then the study of civil infrastructure systems acts as a link between the two. Understanding the reliance of engineered systems on constrained natural resources, as well as their impact on human well-being and the environment, is key to building and maintaining infrastructure that is sustainable in the broader sense. This talk will explore the important role of life-cycle assessment and optimization in assessing such questions as: a.)

139

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 (Rev. 5/10) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 May 2010 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2010 to March 31, 2011 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

140

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

April 2005 April 2005 NISTIR 85-3273-26 (Rev. 9/11) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program September 2011 NISTIR 85-3273-26 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2011 to March 31, 2012 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Molasses for ethanol: The economic and environmental impacts of a new pathway for the lifecycle greenhouse gas  

E-Print Network (OSTI)

greenhouse gas analysis of sugarcane ethanol Anand R Gopal1,4,6 and Daniel M Kammen1,2,3,5 1 Energy lifecycle results of the existing GREET model for Brazilian ethanol to derive lifecycle greenhouse gas this in regulation. Keywords: LCA, biofuels, sugarcane ethanol, greenhouse gas emissions, GREET 6 Corresponding

Kammen, Daniel M.

142

The Pentagon Shield Field Program: Toward Critical Infrastructure Protection  

Science Conference Proceedings (OSTI)

The Pentagon, and its 25,000+ occupants, represents a likely target for a future terrorist attack using chemical, biological, or radiological material released into the atmosphere. Motivated by this, a building-protection system, called Pentagon ...

Thomas Warner; Paul Benda; Scott Swerdlin; Jason Knievel; Jeff Copeland; Andrew Crook; Yubao Liu; Shane Mayor; Bruce Morley; Robert Sharman; Scott Spuler; Juanzhen Sun; Mei Xu; Al Yates; Ying Zhang; Edward Argenta; Bryan Aronian; James Bowers; Donald Storwold; Ben Balsley; Michael Jensen; Yannick Meillier; Roger Carter; Kirk Clawson; Pamela Clark; Rod Frehlich; Jeffrey Weil

2007-02-01T23:59:59.000Z

143

The effect of lighting system components on lighting quality, energy use, and life-cycle cost  

SciTech Connect

A computational method was developed to examine the effect of lamp, ballast, and fixture selection on the quality and quantity of illumination, energy consumption, and life-cycle cost of lighting systems. Applying this analysis to lighting layouts using different lamp/ballast/fixture combinations suggested that combinations with higher lumen outputs reduced the uniformity of the illuminance distribution at the workplace but did not reduce visibility levels. The use of higher lumen output lamp/ballast/fixture systems and higher efficiency components tended to reduce life-cycle costs as long as the premium cost of the components was not too high.

Rubinstein, F.; Clark, T.; Siminovitch, M.; Verderber, R.

1986-07-01T23:59:59.000Z

144

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

145

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

146

Extending gibson's attacks on the GPT cryptosystem  

Science Conference Proceedings (OSTI)

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibson's attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank ...

Raphael Overbeck

2005-03-01T23:59:59.000Z

147

Trust Anchor Fact Sheet.cdr  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Sandia National Laboratories The Concept The Approach Commercial-off-the-shelf energy control systems and components are primarily designed, produced, and maintained by foreign companies. With control of commercial hardware and software supply chains and routine access through configuration and updates, foreign developers have an unprecedented

148

Life-Cycle Cost Study for a Low-Level Radioactive Waste Disposal Facility in Texas  

SciTech Connect

This report documents the life-cycle cost estimates for a proposed low-level radioactive waste disposal facility near Sierra Blanca, Texas. The work was requested by the Texas Low-Level Radioactive Waste Disposal Authority and performed by the National Low-Level Waste Management Program with the assistance of Rogers and Associates Engineering Corporation.

B. C. Rogers; P. L. Walter (Rogers and Associates Engineering Corporation); R. D. Baird

1999-08-01T23:59:59.000Z

149

TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING  

E-Print Network (OSTI)

TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING K. Smarsly1) strategies can enable wind turbine manufacturers, owners, and operators to precisely schedule maintenance behavior of wind turbines and to reduce (epistemic) uncertainty. Both the resistance parameters

Stanford University

150

A review of battery life-cycle analysis : state of knowledge and critical needs.  

DOE Green Energy (OSTI)

A literature review and evaluation has been conducted on cradle-to-gate life-cycle inventory studies of lead-acid, nickel-cadmium, nickel-metal hydride, sodium-sulfur, and lithium-ion battery technologies. Data were sought that represent the production of battery constituent materials and battery manufacture and assembly. Life-cycle production data for many battery materials are available and usable, though some need updating. For the remaining battery materials, lifecycle data either are nonexistent or, in some cases, in need of updating. Although battery manufacturing processes have occasionally been well described, detailed quantitative information on energy and material flows is missing. For all but the lithium-ion batteries, enough constituent material production energy data are available to approximate material production energies for the batteries, though improved input data for some materials are needed. Due to the potential benefit of battery recycling and a scarcity of associated data, there is a critical need for life-cycle data on battery material recycling. Either on a per kilogram or per watt-hour capacity basis, lead-acid batteries have the lowest production energy, carbon dioxide emissions, and criteria pollutant emissions. Some process-related emissions are also reviewed in this report.

Sullivan, J. L.; Gaines, L.; Energy Systems

2010-12-22T23:59:59.000Z

151

APPENDIX A: ENERGY USE AND EMISSIONS FROM THE LIFECYCLE OF DIESEL-LIKE FUELS DERIVED FROM  

E-Print Network (OSTI)

Sciences, Idaho State University, Pocatello, Idaho, 83209-8007, U.S.A. (e-mail: smitrose@isu.edu). #12 Committee, Idaho State University, Pocatello, Idaho. References Anderson, R.S., and Peck, S.B. 1985 and reporting life-cycle duration in insects and arachnids. Eur. J. Entomol. 97: 285­303. Eggert, A

Delucchi, Mark

152

Exploring decisions' influence on life-cycle performance to aid “design for Multi-X”  

Science Conference Proceedings (OSTI)

The problem addressed in this paper is that design decisions can have a propagation effect spanning multiple life-phases influencing life-cycle metrics such as cost, time, and quality. It introduces a computational framework of a “Knowledge of ... Keywords: Concurrent Synthesis, DFX, KICAD, Knowledge Modelling, Providence

Jonathan C. Borg; Xiu-Tian Yan; Neal P. Juster

2000-04-01T23:59:59.000Z

153

Management of lifecycle costs and benefits: Lessons from information systems practice  

Science Conference Proceedings (OSTI)

Assessing the economic feasibility of information systems (IS) projects and operations remains a challenge for most organizations. This research investigates lifecycle cost and benefit management practices and demonstrates that, overall, although organizations ... Keywords: IT governance, IT value, Information management, Information system evaluation, Information system value

Egon Berghout; Menno Nijland; Philip Powell

2011-09-01T23:59:59.000Z

154

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2012  

Energy.gov (U.S. Department of Energy (DOE))

Report provides tables of present-value factors for use in the life-cycle cost analysis of capital investment projects for federal facilities. It also provides energy price indices based on the U.S. Department of Energy (DOE) forecasts from 2012 to 2042.

155

Defending against side-channel attacks : DynamoREA  

E-Print Network (OSTI)

Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

156

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

157

Development of the Household Sample for Furnace and Boiler Life-Cycle Cost  

NLE Websites -- All DOE Office Websites (Extended Search)

Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Analysis Title Development of the Household Sample for Furnace and Boiler Life-Cycle Cost Analysis Publication Type Report LBNL Report Number LBNL-55088 Year of Publication 2005 Authors Whitehead, Camilla Dunham, Victor H. Franco, Alexander B. Lekov, and James D. Lutz Document Number LBNL-55088 Pagination 22 Date Published May 31 Publisher Lawrence Berkeley National Laboratory City Berkeley Abstract Residential household space heating energy use comprises close to half of all residential energy consumption. Currently, average space heating use by household is 43.9 Mbtu for a year. An average, however, does not reflect regional variation in heating practices, energy costs, or fuel type. Indeed, a national average does not capture regional or consumer group cost impacts from changing efficiency levels of heating equipment. The US Department of Energy sets energy standards for residential appliances in, what is called, a rulemaking process. The residential furnace and boiler efficiency rulemaking process investigates the costs and benefits of possible updates to the current minimum efficiency regulations. Lawrence Berkeley National Laboratory (LBNL) selected the sample used in the residential furnace and boiler efficiency rulemaking from publically available data representing United States residences. The sample represents 107 million households in the country. The data sample provides the household energy consumption and energy price inputs to the life-cycle cost analysis segment of the furnace and boiler rulemaking. This paper describes the choice of criteria to select the sample of houses used in the rulemaking process. The process of data extraction is detailed in the appendices and is easily duplicated.The life-cycle cost is calculated in two ways with a household marginal energy price and a national average energy price. The LCC results show that using an national average energy price produces higher LCC savings but does not reflect regional differences in energy price.

158

On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs  

Science Conference Proceedings (OSTI)

Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to protect the intellectual property and to prevent fraud, ... Keywords: FPGA, bitstream encryption, side-channel attacks, triple des

Amir Moradi; Alessandro Barenghi; Timo Kasper; Christof Paar

2011-10-01T23:59:59.000Z

159

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

160

Countering DoS attacks with stateless multipath overlays  

Science Conference Proceedings (OSTI)

Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that attackers will attack a fixed and bounded set of overlay nodes causing service ... Keywords: key agreement, spread-spectrum communications

Angelos Stavrou; Angelos D. Keromytis

2005-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

162

On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers  

E-Print Network (OSTI)

the vulnerabilities of DNS and SIP message handling in the Vonage phone, stealthily become the remote MITM and launch flaw in handling a malformed INVITE message, which allows the remote attacker to remotely crashOn the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers Ruishan

Wang, Xinyuan "Frank"

163

Incorporating the Effect of Price Changes on CO2-Equivalent Emissions From Alternative-Fuel Lifecycles: Scoping the Issues  

E-Print Network (OSTI)

and solids produced by corn-to-ethanol plants) Coproducts ofCoproducts of the corn-to-ethanol background GHG emissionsimpact on LCGE in the corn-to-ethanol lifecycle. In the

Delucchi, Mark

2005-01-01T23:59:59.000Z

164

INCORPORATING THE EFFECT OF PRICE CHANGES ON CO2- EQUIVALENT EMSSIONS FROM ALTERNATIVE-FUEL LIFECYCLES: SCOPING THE ISSUES  

E-Print Network (OSTI)

and solids produced by corn-to-ethanol plants) Coproducts ofCoproducts of the corn-to-ethanol background GHG emissionsimpact on LCGE in the corn-to-ethanol lifecycle. In the

Delucchi, Mark

2005-01-01T23:59:59.000Z

165

Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities  

E-Print Network (OSTI)

to close the gap on unregulated greenhouse gas emissions.a higher lifecycle greenhouse gas content than conventionalIN- FORMATION ON GREENHOUSE GAS EMISSIONs AssocIATEIDn wrri

Hagan, Colin R.

2012-01-01T23:59:59.000Z

166

Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities  

E-Print Network (OSTI)

from coal- or natural gas-fired power plants occur "up-of natural gas is lost before reaching the power plant." 30power plant. Yet, when it comes to upstream emissions, the lifecycle for natural gas

Hagan, Colin R.

2012-01-01T23:59:59.000Z

167

A study on information wrapper protection profile  

Science Conference Proceedings (OSTI)

How to help the end-users to identify and analyze the attacks in cyberspace has become extremely important to the information security task. Based on the standard of the Information Security Audit and Alarms Framework published by ISO, in this paper ... Keywords: common criteria (CC), information security audit and alarms, protection profile (PP), security assurance, security functional

Kwo-Jean Farn; Shu-Kuo Lin; Jiann-Ming Hwang

2007-04-01T23:59:59.000Z

168

LBNL-54244 Life-cycle Cost and Payback Period Analysis for Commercial Unitary Air Conditioners  

NLE Websites -- All DOE Office Websites (Extended Search)

44 44 Life-cycle Cost and Payback Period Analysis for Commercial Unitary Air Conditioners Greg Rosenquist, Katie Coughlin, Larry Dale, James McMahon, Steve Meyers Energy Analysis Department Environmental Energy Technologies Division Ernest Orlando Lawrence Berkeley National Laboratory University of California Berkeley, CA 94720 March 2004 This work was supported by the Office of Building Technologies of the U.S. Department of Energy, under Contract No. DE-AC03-76SF00098. ii iii ABSTRACT This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results

169

Step 6: Complete the ENERGY STAR lifecycle | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

6: Complete the ENERGY STAR lifecycle 6: Complete the ENERGY STAR lifecycle Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Why design to earn ENERGY STAR Design to earn ENERGY STAR Step 1: Include efficiency in your project specs Step 2: Meet with your team and set a goal Step 3: Apply for Designed to Earn the ENERGY STAR recognition Step 4: Market your project as Designed to Earn the ENERGY STAR

170

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-28 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-28 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-28

171

A Review of Battery Life-Cycle Analysis: State of Knowledge and Critical Needs  

NLE Websites -- All DOE Office Websites (Extended Search)

Battery Life-Cycle Analysis: Battery Life-Cycle Analysis: State of Knowledge and Critical Needs ANL/ESD/10-7 Energy Systems Division Availability of This Report This report is available, at no cost, at http://www.osti.gov/bridge. It is also available on paper to the U.S. Department of Energy and its contractors, for a processing fee, from: U.S. Department of Energy Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831-0062 phone (865) 576-8401 fax (865) 576-5728 reports@adonis.osti.gov Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor UChicago Argonne, LLC, nor any of their employees or officers, makes any warranty, express

172

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-27 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-27 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-27

173

Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage  

NLE Websites -- All DOE Office Websites (Extended Search)

6719 6719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report NREL/TP-560-46719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden Prepared under Task No. H278.3400 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government.

174

Life-cycle energy analyses of electric vehicle storage batteries. Final report  

DOE Green Energy (OSTI)

The results of several life-cycle energy analyses of prospective electric vehicle batteries are presented. The batteries analyzed were: Nickel-zinc; Lead-acid; Nickel-iron; Zinc-chlorine; Sodium-sulfur (glass electrolyte); Sodium-sulfur (ceramic electrolyte); Lithium-metal sulfide; and Aluminum-air. A life-cycle energy analysis consists of evaluating the energy use of all phases of the battery's life, including the energy to build it, operate it, and any credits that may result from recycling of the materials in it. The analysis is based on the determination of three major energy components in the battery life cycle: Investment energy, i.e., The energy used to produce raw materials and to manufacture the battery; operational energy i.e., The energy consumed by the battery during its operational life. In the case of an electric vehicle battery, this energy is the energy required (as delivered to the vehicle's charging circuit) to power the vehicle for 100,000 miles; and recycling credit, i.e., The energy that could be saved from the recycling of battery materials into new raw materials. The value of the life-cycle analysis approach is that it includes the various penalties and credits associated with battery production and recycling, which enables a more accurate determination of the system's ability to reduce the consumption of scarce fuels. The analysis of the life-cycle energy requirements consists of identifying the materials from which each battery is made, evaluating the energy needed to produce these materials, evaluating the operational energy requirements, and evaluating the amount of materials that could be recycled and the energy that would be saved through recycling. Detailed descriptions of battery component materials, the energy requirements for battery production, and credits for recycling, and the operational energy for an electric vehicle, and the procedures used to determine it are discussed.

Sullivan, D; Morse, T; Patel, P; Patel, S; Bondar, J; Taylor, L

1980-12-01T23:59:59.000Z

175

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

176

Analysis of Automated Model against DDoS Attacks  

E-Print Network (OSTI)

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with the overall DDoS problem. With a new packet marking technique and agent design, our approach has many advanced features to minimize the DDoS attacks within a single ISP domain. In this paper we discuss different types of attacks that are possible on our model and propose techniques to counteract the identified attacks. We will also discuss security protocols for communication between different entities in our model.

Udaya Kiran Tupakula

2003-01-01T23:59:59.000Z

177

Hydrogen Attack in Creeping Polycrystals Due to Cavitation on ...  

Science Conference Proceedings (OSTI)

Sep 1, 1994 ... Hydrogen Attack (HA) is the development at elevated temperatures of grain boundary cavitation by internal methane gas, which is generated by ...

178

Precision air data support for chem/bio attack response .  

E-Print Network (OSTI)

??The defense response against chemical and biological (Chem/bio) weapons has gained a renewed focus in light of the 11 Sept 2001 terrorist attack. A successful… (more)

Tan, Kwang Liang

2003-01-01T23:59:59.000Z

179

Rapid cooling technology could aid surgery patients, heart attack...  

NLE Websites -- All DOE Office Websites (Extended Search)

cooling technology could aid surgery patients, heart attack victims Diagram shows how ice slurry cools blood INTERNAL COOLING - An ice slurry, delivered through an endotracheal...

180

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Thermal Barrier Coatings for Resistance Against Attack by Molten ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested ...

182

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... to disrupt the energy distribution of smart ... attacks against distributed energy routing in smart grid. ... on Cyber Technology in Automation, Control, and ...

2012-04-12T23:59:59.000Z

183

Environmental Life-cycle Assessment of Passenger Transportation An Energy, Greenhouse Gas, and Criteria Pollutant Inventory of Rail and Air Transportation  

E-Print Network (OSTI)

Selection in Life-Cycle Inventories Using Hybrid Approaches,and Criteria Pollutant Inventories of Automobiles, Buses,Criteria Pollutant Inventory of Rail and Air Transportation

Horvath, Arpad; Chester, Mikhail

2008-01-01T23:59:59.000Z

184

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution  

E-Print Network (OSTI)

packages online. If a cracker can figure out a generic attack against the copy-protection scheme usedOn the Global Content PMI: Improved Copy-Protected Internet Content Distribution Tadayoshi Kohno addresses a problem with copy-protecting a large collection of electronic content. The notion and severity

Kohno, Tadayoshi

185

Survey and Simulation on Malicious Data Attack on Power Market  

E-Print Network (OSTI)

It is expected that the next generation of power grid will be more intelligent in power distribution, grid data attack. A cyber-spy may inject malicious data to make power grid in danger. In this report the financial risk of data attack, a bunch of notions with respect to power grid are studies. Observability

Lavaei, Javad

186

Selective Attack of Welds by Flow-Accelerated Corrosion  

Science Conference Proceedings (OSTI)

Flow-accelerated corrosion (FAC), a degradation mechanism that attacks carbon steel material, has been a significant issue for nuclear plants for some time. Until recently, though, welds were thought to be largely immune to this mechanism. This work demonstrates that significant weld attacks have been occurring at a number of nuclear plants throughout the world.

2002-07-26T23:59:59.000Z

187

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

188

Attacking the IPsec Standards in Encryption-only Configurations  

Science Conference Proceedings (OSTI)

We describe new attacks which break any RFCcompliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted ...

Jean Paul Degabriele; Kenneth G. Paterson

2007-05-01T23:59:59.000Z

189

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

190

Heart Attack Survival Plan Information To Share With  

E-Print Network (OSTI)

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

191

Stochastic Life-cycle Analysis of Deteriorating Infrastructure Systems and an Application to Reinforced Concrete Bridges  

E-Print Network (OSTI)

Infrastructure systems are critical to a country’s prosperity. It is extremely important to manage the infrastructure systems efficiently in order to avoid wastage and to maximize benefits. Deterioration of infrastructure systems is one of the primary issues in civil engineering today. This problem has been widely acknowledged by engineering community in numerous studies. We need to evolve efficient strategies to tackle the problem of infrastructure deterioration and to efficiently operate infrastructure. In this research, we propose stochastic models to predict the process of deterioration in engineering systems and to perform life-cycle analysis (LCA) of deteriorating engineering systems. LCA has been recognized, over the years, as a highly informative tool for helping the decision making process in infrastructure management. In this research, we propose a stochastic model, SSA, to accurately predict the effect of deterioration processes in engineering systems. The SSA model addresses some of the important and ignored areas in the existing models such as the effect of deterioration on both capacity and demands of systems and accounting for different types of failures in assessing the life-span of a deteriorating system. Furthermore, this research proposes RTLCA, a renewal theory based LCA model, to predict the life-cycle performance of deteriorating systems taking into account not only the life-time reliability but also the costs associated with operating a system. In addition, this research investigates the effect of seismic degradation on the reliability of reinforced concrete (RC) bridges. For this purpose, we model the seismic degradation process in the RC bridge columns which are the primary lateral load resisting system in a bridge. Thereafter, the RTLCA model along with SSA model is used to study the life-cycle of an example RC bridge located in seismic regions accounting for seismic degradation. It is expected that the models proposed in this research will be helpful in better managing our infrastructure systems.

Ramesh Kumar, - 1982-

2012-12-01T23:59:59.000Z

192

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

193

Protective Relays: Numerical Protective Relays  

Science Conference Proceedings (OSTI)

Protective relays are decision-making elements in the protection scheme for electrical power systems. Numerical relays offer many advantages over the traditional electromechanical types of devices. This guide provides an overview of numerical relays and discusses maintenance and testing.

2004-12-22T23:59:59.000Z

194

Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications  

SciTech Connect

Buildings are at the locus of three trends driving China's increased energy use and emissions: urbanization, growing personal consumption, and surging heavy industrial production. Migration to cities and urban growth create demand for new building construction. Higher levels of per-capita income and consumption drive building operational energy use with demand for higher intensity lighting, thermal comfort, and plug-load power. Demand for new buildings, infrastructure, and electricity requires heavy industrial production. In order to quantify the implications of China's ongoing urbanization, rising personal consumption, and booming heavy industrial sector, this study presents a lifecycle assessment (LCA) of the energy use and carbon emissions related to residential and commercial buildings. The purpose of the LCA model is to quantify the impact of a given building and identify policy linkages to mitigate energy demand and emissions growth related to China's new building construction. As efficiency has become a higher priority with growing energy demand, policy and academic attention to buildings has focused primarily on operational energy use. Existing studies estimate that building operational energy consumption accounts for approximately 25% of total primary energy use in China. However, buildings also require energy for mining, extracting, processing, manufacturing, and transporting materials, as well as energy for construction, maintenance, and decommissioning. Building and supporting infrastructure construction is a major driver of industry consumption--in 2008 industry accounted for 72% of total Chinese energy use. The magnitude of new building construction is large in China--in 2007, for example, total built floor area reached 58 billion square meters. During the construction boom in 2007 and 2008, more than two billion m{sup 2} of building space were added annually; China's recent construction is estimated to account for half of global construction. Lawrence Berkeley National Laboratory (LBNL) developed an integrated LCA model to capture the energy and emissions implications of all aspects of new buildings from material mining through construction, operations, and decommissioning. Over the following four sections, this report describes related existing research, the LBNL building LCA model structure and results, policy linkages of this lifecycle assessment, and conclusions and recommendations for follow-on work. The LBNL model is a first-order approach to gathering local data and applying lifecycle assessment to buildings in the Beijing area--it represents one effort among a range of established, predominantly American and European, LCA models. This report identifies the benefits, limitations, and policy applications of lifecycle assessment modeling for quantifying the energy and emissions impacts of specific residential and commercial buildings.

Aden, Nathaniel; Qin, Yining; Fridley, David

2010-09-15T23:59:59.000Z

195

Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications  

SciTech Connect

Buildings are at the locus of three trends driving China's increased energy use and emissions: urbanization, growing personal consumption, and surging heavy industrial production. Migration to cities and urban growth create demand for new building construction. Higher levels of per-capita income and consumption drive building operational energy use with demand for higher intensity lighting, thermal comfort, and plug-load power. Demand for new buildings, infrastructure, and electricity requires heavy industrial production. In order to quantify the implications of China's ongoing urbanization, rising personal consumption, and booming heavy industrial sector, this study presents a lifecycle assessment (LCA) of the energy use and carbon emissions related to residential and commercial buildings. The purpose of the LCA model is to quantify the impact of a given building and identify policy linkages to mitigate energy demand and emissions growth related to China's new building construction. As efficiency has become a higher priority with growing energy demand, policy and academic attention to buildings has focused primarily on operational energy use. Existing studies estimate that building operational energy consumption accounts for approximately 25% of total primary energy use in China. However, buildings also require energy for mining, extracting, processing, manufacturing, and transporting materials, as well as energy for construction, maintenance, and decommissioning. Building and supporting infrastructure construction is a major driver of industry consumption--in 2008 industry accounted for 72% of total Chinese energy use. The magnitude of new building construction is large in China--in 2007, for example, total built floor area reached 58 billion square meters. During the construction boom in 2007 and 2008, more than two billion m{sup 2} of building space were added annually; China's recent construction is estimated to account for half of global construction. Lawrence Berkeley National Laboratory (LBNL) developed an integrated LCA model to capture the energy and emissions implications of all aspects of new buildings from material mining through construction, operations, and decommissioning. Over the following four sections, this report describes related existing research, the LBNL building LCA model structure and results, policy linkages of this lifecycle assessment, and conclusions and recommendations for follow-on work. The LBNL model is a first-order approach to gathering local data and applying lifecycle assessment to buildings in the Beijing area--it represents one effort among a range of established, predominantly American and European, LCA models. This report identifies the benefits, limitations, and policy applications of lifecycle assessment modeling for quantifying the energy and emissions impacts of specific residential and commercial buildings.

Aden, Nathaniel; Qin, Yining; Fridley, David

2010-09-15T23:59:59.000Z

196

Metrics for Assessment of Smart Grid Data Integrity Attacks  

Science Conference Proceedings (OSTI)

There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

197

Comparing Life-Cycle Costs of ESPCs and Appropriations-Funded Energy Projects: An Update to the 2002 Report  

SciTech Connect

A study was sponsored by FEMP in 2001 - 2002 to develop methods to compare life-cycle costs of federal energy conservation projects carried out through energy savings performance contracts (ESPCs) and projects that are directly funded by appropriations. The study described in this report follows up on the original work, taking advantage of new pricing data on equipment and on $500 million worth of Super ESPC projects awarded since the end of FY 2001. The methods developed to compare life-cycle costs of ESPCs and directly funded energy projects are based on the following tasks: (1) Verify the parity of equipment prices in ESPC vs. directly funded projects; (2) Develop a representative energy conservation project; (3) Determine representative cycle times for both ESPCs and appropriations-funded projects; (4) Model the representative energy project implemented through an ESPC and through appropriations funding; and (5) Calculate the life-cycle costs for each project.

Shonder, John A [ORNL; Hughes, Patrick [ORNL; Atkin, Erica [ORNL

2006-11-01T23:59:59.000Z

198

Comprehensive Lifecycle Planning and Management System For Addressing Water Issues Associated With Shale Gas Development In New York, Pennsylvania, And West Virginia  

Science Conference Proceedings (OSTI)

The objective of this project is to develop a modeling system to allow operators and regulators to plan all aspects of water management activities associated with shale gas development in the target project area of New York, Pennsylvania, and West Virginia (â??target areaâ?ť), including water supply, transport, storage, use, recycling, and disposal and which can be used for planning, managing, forecasting, permit tracking, and compliance monitoring. The proposed project is a breakthrough approach to represent the entire shale gas water lifecycle in one comprehensive system with the capability to analyze impacts and options for operational efficiency and regulatory tracking and compliance, and to plan for future water use and disposition. It will address all of the major water-related issues of concern associated with shale gas development in the target area, including water withdrawal, transport, storage, use, treatment, recycling, and disposal. It will analyze the costs, water use, and wastes associated with the available options, and incorporate constraints presented by permit requirements, agreements, local and state regulations, equipment and material availability, etc. By using the system to examine the water lifecycle from withdrawals through disposal, users will be able to perform scenario analysis to answer "what if" questions for various situations. The system will include regulatory requirements of the appropriate state and regional agencies and facilitate reporting and permit applications and tracking. These features will allow operators to plan for more cost effective resource production. Regulators will be able to analyze impacts of development over an entire area. Regulators can then make informed decisions about the protections and practices that should be required as development proceeds. This modeling system will have myriad benefits for industry, government, and the public. For industry, it will allow planning all water management operations for a project or an area as one entity to optimize water use and minimize costs subject to regulatory and other constraints. It will facilitate analysis of options and tradeoffs, and will also simplify permitting and reporting to regulatory agencies. The system will help regulators study cumulative impacts of development, conserve water resources, and manage disposal options across a region. It will also allow them to track permits and monitor compliance. The public will benefit from water conservation, improved environmental performance as better system wide decisions are made, and greater supply of natural gas, with attendant lower prices, as costs are reduced and development is assisted through better planning and scheduling. Altogether, better economics and fewer barriers will facilitate recovery of the more than 300 trillion cubic feet of estimated recoverable natural gas resource in the Marcellus Shale in a manner that protects the environment.

J. Daniel Arthur

2012-03-31T23:59:59.000Z

199

Insider protection  

SciTech Connect

The government community is broadly addressing the insider threat. The first section of this paper defines protection approaches and the latter sections present various applicable technology developments. The bulk of the paper discusses technology developments applied to (1) personnel and material tracking and inventory, (2) classified document protection, and (3) protecting security systems. The personnel and material tracking system uses a PC based-host to (1) collect information from proximity tags and material movement sensors, (2) apply rules to this input to assure that the ongoing activity meets the site selectable rules and, (3) forward the results to either an automated inventory system or an alarm system. The document protection system uses a PC network to efficiently and securely control classified material which is stored on write-once-read-mostly optical media. The protection of sensor to multiplexer communications in a security system is emphasized in the discussion of protecting security systems.

Waddoups, I.G.

1993-07-01T23:59:59.000Z

200

Performance metrics and life-cycle information management for building performance assurance  

SciTech Connect

Commercial buildings account for over $85 billion per year in energy costs, which is far more energy than technically necessary. One of the primary reasons buildings do not perform as well as intended is that critical information is lost, through ineffective documentation and communication, leading to building systems that are often improperly installed and operated. A life-cycle perspective on the management of building information provides a framework for improving commercial building energy performance. This paper describes a project to develop strategies and techniques to provide decision-makers with information needed to assure the desired building performance across the complete life cycle of a building project. A key element in this effort is the development of explicit performance metrics that quantitatively represent performance objectives of interest to various building stakeholders. The paper begins with a discussion of key problems identified in current building industry practice, and ongoing work to address these problems. The paper then focuses on the concept of performance metrics and their use in improving building performance during design, commissioning, and on-going operations. The design of a Building Life-cycle Information System (BLISS) is presented. BLISS is intended to provide an information infrastructure capable of integrating a variety of building information technologies that support performance assurance. The use of performance metrics in case study building projects is explored to illustrate current best practice. The application of integrated information technology for improving current practice is discussed.

Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

1998-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Design and life-cycle considerations for unconventional-reservoir wells  

Science Conference Proceedings (OSTI)

This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

Miskimins, J.L. [Colorado School of Mines, Golden, CO (United States)

2009-05-15T23:59:59.000Z

202

Modelling of environmental impacts of solid waste landfilling within the life-cycle analysis program EASEWASTE  

Science Conference Proceedings (OSTI)

A new computer-based life-cycle assessment model (EASEWASTE) has been developed to evaluate resource and environmental consequences of solid waste management systems. This paper describes the landfilling sub-model used in the life-cycle assessment program EASEWASTE, and examines some of the implications of this sub-model. All quantities and concentrations of leachate and landfill gas can be modified by the user in order to bring them in agreement with the actual landfill that is assessed by the model. All emissions, except the generation of landfill gas, are process specific. The landfill gas generation is calculated on the basis of organic matter in the landfilled waste. A landfill assessment example is provided. For this example, the normalised environmental effects of landfill gas on global warming and photochemical smog are much greater than the environmental effects for landfill leachate or for landfill construction. A sensitivity analysis for this example indicates that the overall environmental impact is sensitive to the gas collection efficiency and the use of the gas, but not to the amount of leachate generated, or the amount of soil or liner material used in construction. The landfill model can be used for evaluating different technologies with different liners, gas and leachate collection efficiencies, and to compare the environmental consequences of landfilling with alternative waste treatment options such as incineration or anaerobic digestion.

Kirkeby, Janus T.; Birgisdottir, Harpa [Environment and Resources, Technical University of Denmark, DTU, Building 113, DK-2800 Kgs. Lyngby (Denmark); Bhander, Gurbakash Singh; Hauschild, Michael [Department of Manufacturing Engineering and Management, Technical University of Denmark, Building 424, DK-2800 Lyngby (Denmark); Christensen, Thomas H. [Environment and Resources, Technical University of Denmark, DTU, Building 113, DK-2800 Kgs. Lyngby (Denmark)], E-mail: thc@er.dtu.dk

2007-07-01T23:59:59.000Z

203

TCPL: A Defense against wormhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

204

ADVANCED WORKER PROTECTION SYSTEM  

Science Conference Proceedings (OSTI)

From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify the design, OSS was able to develop and successfully test, in both the lab and in the field, a prototype AWPS. They clearly demonstrated that a system which provides cooling can significantly increase worker productivity by extending the time they can function in a protective garment. They were also able to develop mature outer garment and LCG designs that provide considerable benefits over current protective equipment, such as self donning and doffing, better visibility, and machine washable. A thorough discussion of the activities performed during Phase 1 and Phase 2 is presented in the AWPS Final Report. The report also describes the current system design, outlines the steps needed to certify the AWPS, discusses the technical and programmatic issues that prevented the system from being certified, and presents conclusions and recommendations based upon the seven year effort.

Judson Hedgehock

2001-03-16T23:59:59.000Z

205

Life-Cycle Water Impacts of U.S. Transportation Fuels  

E-Print Network (OSTI)

Berkeley, CA, 8/14/09 eGRID; U.S. Environmental ProtectionS. S. ; Bryson, J. , eGRID Emission Estimation Methods. Indocs/fy07osti/38617.pdf eGRID; U.S. Environmental Protection

Scown, Corinne Donahue

2010-01-01T23:59:59.000Z

206

Healing heart attack victims, one cell at a time  

NLE Websites -- All DOE Office Websites (Extended Search)

E-mail: stark8@llnl.gov FOR IMMEDIATE RELEASE April 2, 2009 NR-09-04-02 Healing heart attack victims, one cell at a time LIVERMORE, Calif. -- By using the amount of carbon...

207

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

208

Risk-Based models of attacker behavior in cybersecurity  

Science Conference Proceedings (OSTI)

Even as reliance on information and communication technology networks continues to grow, and their potential security vulnerabilities become a greater threat, very little is known about the humans who perpetrate cyber attacks--what are their strategies, ...

Si Li; Ryan Rickert; Amy Sliva

2013-04-01T23:59:59.000Z

209

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

210

Argonne applied mathematicians use INCITE awards to attack energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for...

211

Program on Technology Innovation: An Optimization Approach for Life-Cycle Management Applied to Large Power Transformers  

Science Conference Proceedings (OSTI)

This report presents results and insights from a study of the life-cycle management (LCM) of main transformers at Constellation Energy Nuclear Group's (CENG's) five nuclear power plants. The study used two asset management (AM) tools developed by Electricit de France (EDF).

2011-07-04T23:59:59.000Z

212

A cloud approach to unified lifecycle data management in architecture, engineering, construction and facilities management: Integrating BIMs and SNS  

Science Conference Proceedings (OSTI)

The problem of data integration throughout the lifecycle of a construction project among multiple collaborative enterprises remains unsolved due to the dynamics and fragmented nature of the construction industry. This study presents a novel cloud approach ... Keywords: Building information modeling, Business social networking services, Cloud computing, Life cycle data management, Self-organisation, Version control

Yi Jiao, Yinghui Wang, Shaohua Zhang, Yin Li, Baoming Yang, Lei Yuan

2013-04-01T23:59:59.000Z

213

TRANSPORTATION SYSTEMS AND THE BUILT ENVIRONMENT:1 A LIFE-CYCLE ENERGY CASE STUDY AND ANALYSIS2  

E-Print Network (OSTI)

models for petroleum use (from driving) and26 residential and commercial power and natural gas use infrastructure) made up 44 to 47% of the life-cycle energy demands34 tallied. Energy elasticity calculations across the neighborhoods suggest that increased population35 density and reduced residential unit size

Kockelman, Kara M.

214

Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation  

SciTech Connect

The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (United States). Civil and Environmental Engineering Department

2007-09-15T23:59:59.000Z

215

Will Model-based Definition replace engineering drawings throughout the product lifecycle? A global perspective from aerospace industry  

Science Conference Proceedings (OSTI)

The Model-based Definition (MBD) approach is gaining popularity in various industries. MBD represents a trend in Computer-aided Design (CAD) that promises reduced time-to-market and improved product quality. Its main goal is to improve and accelerate ... Keywords: CAD, Engineering drawing, MBD, Model-based Definition, Product lifecycle

Virgilio Quintana; Louis Rivest; Robert Pellerin; Frédérick Venne; Fawzi Kheddouci

2010-06-01T23:59:59.000Z

216

System Evaluation and Life-Cycle Cost Analysis of a Commercial-Scale High-Temperature Electrolysis Hydrogen Production Plant  

SciTech Connect

Results of a system evaluation and lifecycle cost analysis are presented for a commercial-scale high-temperature electrolysis (HTE) central hydrogen production plant. The plant design relies on grid electricity to power the electrolysis process and system components, and industrial natural gas to provide process heat. The HYSYS process analysis software was used to evaluate the reference central plant design capable of producing 50,000 kg/day of hydrogen. The HYSYS software performs mass and energy balances across all components to allow optimization of the design using a detailed process flow sheet and realistic operating conditions specified by the analyst. The lifecycle cost analysis was performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes Microsoft Excel spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. The results of the lifecycle analyses indicate that for a 10% internal rate of return, a large central commercial-scale hydrogen production plant can produce 50,000 kg/day of hydrogen at an average cost of $2.68/kg. When the cost of carbon sequestration is taken into account, the average cost of hydrogen production increases by $0.40/kg to $3.08/kg.

Edwin A. Harvego; James E. O' Brien; Michael G. McKellar

2012-11-01T23:59:59.000Z

217

FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2  

Science Conference Proceedings (OSTI)

For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters. The range is primarily due to uncertainties associated with the Tank Waste Remediation System (TWRS) program, including uncertainties regarding retrieval of long-length equipment, scheduling, and tank retrieval technologies.

Templeton, K.J.

1996-05-23T23:59:59.000Z

218

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network (OSTI)

The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through con- trolled switching sequence. Such switching is facilitated by cyber-attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to effectively model the cyber-physical aspects of a smart grid and determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the different power system test cases including the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system frame- work. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of co-ordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.

Liu, Shan

2013-05-01T23:59:59.000Z

219

Cattail Protection  

NLE Websites -- All DOE Office Websites (Extended Search)

Cattail Protection Cattail Protection Name: Julie Location: N/A Country: N/A Date: N/A Question: Is a piece of land protected by cattails protected? (Meaning you can not touch, cover up or build on.) Replies: Hi Julie, It's quite possible that a piece of land with cattails is protected as a wetland. There are some federal (and probably state) statutes on wetland protection, in general you have to file environmental impact statements and such. I've heard of cases where some large projects were allowed to encroach on wetlands when the builders signed contracts requiring they construct a wetland of equivalent size on another parcel of land. Donald Yee Ph.D. I assume you are referring to wetlands protections. Cattails are wetland plants, and there are regulations governing - but not necessarily preventing - the development of wetlands, but cattails are also aggressive and somewhat weedy, so I doubt the presence of cattails alone would be sufficient to call an area a wetland. This is a technical question which all too often lands in legal dispute. Check with the Corps of Engineers, the EPA, and other experts in wetlands delineation and regulation.

220

To Recycle or Not to Recycle: That Is the Question - Insights from Life-Cycle Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

MRS BULLETIN MRS BULLETIN * VOLUME 37 * APRIL 2012 * www.mrs.org/bulletin © 2012 Materials Research Society MANUFACTURING * RECYCLING Why recycle? The most commonly stated reason for recycling is to reduce burdens associated with the disposal of our never-ending stream of wastes. Waste disposal potentially causes air and water pollution and is costly; moreover, landfi lls compete with other land uses. In addition, recycling can extend our supply of materials to alleviate scarcity and to moderate rising prices of raw materials. Furthermore, recycling is often more environmentally benign than using virgin raw materials and can reduce energy use and emissions of greenhouse gases and other pollutants. Life-cycle analysis Despite these positive attributes, not all recycling processes

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Step 8: Work with the building owner to complete the ENERGY STAR lifecycle  

NLE Websites -- All DOE Office Websites (Extended Search)

8: Work with the building owner to complete the ENERGY STAR 8: Work with the building owner to complete the ENERGY STAR lifecycle Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Why you should design to earn the ENERGY STAR Follow EPA's step-by-step process Step 1: Assemble a team Step 2: Set an energy performance target Step 3: Evaluate your target using ENERGY STAR tools Step 4: Design to be energy efficient

222

Reduction of Electric Vehicle Life-Cycle Impacts through Battery Recycling  

NLE Websites -- All DOE Office Websites (Extended Search)

Reduction of Electric Vehicle Life-Cycle Impacts through Battery Recycling 29 th International Battery Seminar and Exhibit Ft. Lauderdale, FL March 15, 2012 The submitted manuscript has been created by UChicago Argonne, LLC, Operator of Argonne National Laboratory ("Argonne"). Argonne, a U.S. Department of Energy Office of Science laboratory, is operated under Contract No. DE-AC02-06CH11357. The U.S. Government retains for itself, and others acting on its behalf, a paid-up nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government. Why think about recycling?  Material scarcity alleviated

223

System Evaluations and Life-Cycle Cost Analyses for High-Temperature Electrolysis Hydrogen Production Facilities  

DOE Green Energy (OSTI)

This report presents results of system evaluations and lifecycle cost analyses performed for several different commercial-scale high-temperature electrolysis (HTE) hydrogen production concepts. The concepts presented in this report rely on grid electricity and non-nuclear high-temperature process heat sources for the required energy inputs. The HYSYS process analysis software was used to evaluate both central plant designs for large-scale hydrogen production (50,000 kg/day or larger) and forecourt plant designs for distributed production and delivery at about 1,500 kg/day. The HYSYS software inherently ensures mass and energy balances across all components and it includes thermodynamic data for all chemical species. The optimized designs described in this report are based on analyses of process flow diagrams that included realistic representations of fluid conditions and component efficiencies and operating parameters for each of the HTE hydrogen production configurations analyzed. As with previous HTE system analyses performed at the INL, a custom electrolyzer model was incorporated into the overall process flow sheet. This electrolyzer model allows for the determination of the average Nernst potential, cell operating voltage, gas outlet temperatures, and electrolyzer efficiency for any specified inlet steam, hydrogen, and sweep-gas flow rates, current density, cell active area, and external heat loss or gain. The lifecycle cost analyses were performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. There are standard default sets of assumptions that the methodology uses to ensure consistency when comparing the cost of different production or plant design options. However, these assumptions may also be varied within the spreadsheets when better information is available or to allow the performance of sensitivity studies. The selected reference plant design for this study was a 1500 kg/day forecourt hydrogen production plant operating in the thermal-neutral mode. The plant utilized industrial natural gas-fired heaters to provide process heat, and grid electricity to supply power to the electrolyzer modules and system components. Modifications to the reference design included replacing the gas-fired heaters with electric resistance heaters, changing the operating mode of the electrolyzer (to operate below the thermal-neutral voltage), and considering a larger 50,000 kg/day central hydrogen production plant design. Total H2A-calculated hydrogen production costs for the reference 1,500 kg/day forecourt hydrogen production plant were $3.42/kg. The all-electric plant design using electric resistance heaters for process heat, and the reference design operating below the thermal-neutral voltage had calculated lifecycle hydrogen productions costs of $3.55/kg and $5.29/kg, respectively. Because of its larger size and associated economies of scale, the 50,000 kg/day central hydrogen production plant was able to produce hydrogen at a cost of only $2.89/kg.

Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

2012-05-01T23:59:59.000Z

224

Survey of life-cycle costs of glass-paper HEPA filters  

SciTech Connect

We have conducted a survey of the major users of glass-paper HEPA filters in the DOE complex to ascertain the life cycle costs of these filters. Purchase price of the filters is only a minor portion of the costs; the major expenditures are incurred during the removal and disposal of contaminated filters. Through personal interviews, site visits and completion of questionnaires, we have determined the costs associated with the use of HEPA filters in the DOE complex. The total approximate life-cycle cost for a standard (2 in. {times} 2 in. {times} 1 in.) glass-paper HEPA filter is $3,000 for one considered low-level waste (LLW), $11,780 for transuranic (TRU) and $15,000 for high-level waste (HLW). The weighted-average cost for a standard HEPA filter in the complex is $4,753.

Moore, P.; Bergman, W. [Lawrence Livermore National Lab., CA (United States); Gilbert, H. [Gilbert (Humphrey), McLean, VA (United States)

1992-08-01T23:59:59.000Z

225

Life-cycle cost and payback period analysis for commercial unitary air conditioners  

SciTech Connect

This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results show how the savings vary among customers facing different electricity prices and other conditions. At 11.5 EER, at least 80% of the users achieve a positive LCC savings. At 12.0 EER, the maximum efficiency analyzed, mean LCC savings are lower but still positive. For the {ge} $65,000 Btu/h to <135,000 Btu/h equipment class, 59% of users achieve a positive LCC savings. For the $135,000 Btu/h to <240,000 Btu/h equipment class, 91% of users achieve a positive LCC savings.

Rosenquist, Greg; Coughlin, Katie; Dale, Larry; McMahon, James; Meyers, Steve

2004-03-31T23:59:59.000Z

226

Life-cycle cost analysis of energy efficiency design options for residential furnaces and boilers  

SciTech Connect

In 2001, the U.S. Department of Energy (DOE) initiated a rulemaking process to consider whether to amend the existing energy efficiency standards for furnaces and boilers. A key factor in DOE's consideration of new standards is the economic impacts on consumers of possible revisions to energy-efficiency standards. Determining cost-effectiveness requires an appropriate comparison of the additional first cost of energy efficiency design options with the savings in operating costs. DOE's preferred approach involves comparing the total life-cycle cost (LCC) of owning and operating a more efficient appliance with the LCC for a baseline design. This study describes the method used to conduct the LCC analysis and presents the estimated change in LCC associated with more energy-efficient equipment. The results indicate that efficiency improvement relative to the baseline design can reduce the LCC in each of the product classes considered.

Lutz, James; Lekov, Alex; Whitehead, Camilla Dunham; Chan, Peter; Meyers,Steve; McMahon, James

2004-01-20T23:59:59.000Z

227

FY 1996 solid waste integrated life-cycle forecast volume summary - Volume 1 and Volume 2  

Science Conference Proceedings (OSTI)

Solid waste forecast volumes to be generated or received ;at Westinghouse Hanford Company`s Solid Waste program over the life cycle of the site are described in this report. Previous forecast summary reports have covered only a 30-year period; however, the life-cycle approach was adopted for this FY 1996 report to ensure consistency with waste volumes reported in the 1996 Multi-Year Program Plans (MYPP). The volume data were collected on a life-cycle basis from onsite and offsite waste generators who currently ship or plan to ship solid waste to the Solid Waste program. The volumes described in detail are low-level mixed waste (LLMW) and transuranic/transuranic-mixed (TRU(M)) waste. The volumes reported in this document represent the external volume of the containers selected to ship the waste. Summary level information pertaining to low-level waste (LLW) is described in Appendix B. Hazardous waste volumes are also provided in Appendices E and F but are not described in detail since they will be managed by a commercial facility. Emphasis is placed on LLMW and TRU(M) waste because it will require processing and storage at Hanford Solid Waste`s Central Waste Complex (CORK) prior to final disposal. The LLW will generally be sent directly to disposal. The total baselines volume of LLMW and TRU(M) waste forecast to be received by the Solid Waste program (until 2070) is approximately 100,900 cubic meters. This total waste volume is composed of the following waste categories: 077,080 cubic meters of LLMW; 23,180 cubic meters of TRU(M); 640 cubic meters of greater-than-class III LLMW. This total is about 40% of the total volume reported last year (FY 1995).

Valero, O.J.

1996-02-22T23:59:59.000Z

228

Life-cycle analysis results of geothermal systems in comparison to other power systems.  

DOE Green Energy (OSTI)

A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET model shows that fossil thermal plants have fossil energy use and GHG emissions per kWh of electricity output about one order of magnitude higher than renewable power systems, including geothermal power.

Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

2010-10-11T23:59:59.000Z

229

Life-cycle assessment of corn-based butanol as a potential transportation fuel.  

Science Conference Proceedings (OSTI)

Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

2007-12-31T23:59:59.000Z

230

Molecular assemblies as protective barriers and adhesion promotion interlayer  

DOE Patents (OSTI)

A protective diffusion barrier having adhesive qualifies for metalized surfaces is provided by a passivating agent having the formula HS--(CH.sub.2).sub.11 --COOH Which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces.

King, David E. (Lakewood, CO); Czanderna, Alvin W. (Denver, CO); Kennedy, Cheryl E. (Lafayette, CO)

1996-01-01T23:59:59.000Z

231

A random M-ary method based countermeasure against side channel attacks  

Science Conference Proceedings (OSTI)

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ... Keywords: DPA, SPA, elliptic curve cryptosystems, power analysis attacks, random m-ary recoding algorithm, side channel attacks

MahnKi Ahn; JaeCheol Ha; HoonJae Lee; SangJae Moon

2003-05-01T23:59:59.000Z

232

Fire Protection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1066-2012 December 2012 _______________ Supersedes DOE-STD-1066-99 DOE STANDARD FIRE PROTECTION U.S. Department of Energy AREA FIRP Washington, DC 20585 DISTRIBUTION STATEMENT. Approved for public release; distribution is unlimited. This document is available on the Department of Energy Technical Standards Program Web page at http://www.hss.doe.gov/nuclearsafety/ns/techstds/ DOE-STD-1066-2012 FOREWORD This Department of Energy (DOE) Standard (STD) supersedes DOE-STD-1066-99 1 and is approved for use by DOE and its contractors. The following fire protection standard is canceled with the issuance of this Standard and appropriate technical content was incorporated into this Standard: ď‚· DOE-STD-1088-95, Fire Protection for Relocatable Structures

233

Environmental Life-cycle Assessment of Passenger Transportation An Energy, Greenhouse Gas, and Criteria Pollutant Inventory of Rail and Air Transportation  

E-Print Network (OSTI)

The Social Costs of Intercity Passenger Transportation: AEffects and Social Costs of Road Transport, Transportationtransportation vehicles at specific stages in the lifecycle (Table 1). These studies tend to quantify social costs

Horvath, Arpad; Chester, Mikhail

2008-01-01T23:59:59.000Z

234

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

235

Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth  

E-Print Network (OSTI)

of implementation is suitable for a system running on event­driven foundation classes, such as MFC and JFC. 3 Aspect that increments the in and out counters defined in the cluster. Let B be a Boolean expression (called a guard procedure within the monitor. One condition vari­ able is declared for each guard B in an await statement

Corliss, Marc

236

Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining  

Science Conference Proceedings (OSTI)

Data-mining techniques can be used not only to study collective behavior about customers, but also to discover private information about individuals. In this study, we demonstrate that decision trees, a popular classification technique for data mining, ... Keywords: computers, data mining, databases/artificial intelligence, decision trees, entropy, privacy, probability, pruning, public sector, relative entropy, society

Xiao-Bai Li; Sumit Sarkar

2009-11-01T23:59:59.000Z

237

MARVEL: A PC-based interactive software package for life-cycle evaluations of hybrid/electric vehicles  

SciTech Connect

As a life-cycle analysis tool, MARVEL has been developed for the evaluation of hybrid/electric vehicle systems. It can identify the optimal combination of battery and heat engine characteristics for different vehicle types and performance requirements, on the basis of either life-cycle cost or fuel efficiency. Battery models that allow trade-offs between specific power and specific energy, between cycle life and depth of discharge, between peak power and depth of discharge, and between other parameters, are included in the software. A parallel hybrid configuration, using an internal combustion engine and a battery as the power sources, can be simulated with a user-specified energy management strategy. The PC-based software package can also be used for cost or fuel efficiency comparisons among conventional, electric, and hybrid vehicles.

Marr, W.W.; He, J.

1995-07-01T23:59:59.000Z

238

Life-Cycle Energy Use and Greenhouse Gas Emission Implicaitons of Brazilian Sugarcane Ethanol Simulated with the GREET Model  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Life-Cycle Energy Use and Greenhouse Gas Emission Implications of Life-Cycle Energy Use and Greenhouse Gas Emission Implications of Brazilian Sugarcane Ethanol Simulated with the GREET Model Michael Wang*, May Wu, Hong Huo and Jiahong Liu Center for Transportation Research, Argonne National Laboratory, 9700 South Cass Avenue, Argonne, IL 60439, USA. *Contact author: Tel: +1 (630) 252 2819 Fax: +1 (630) 252 3443 Email: mqwang@anl.gov In International Sugar Journal 2008, Vol. 110, No. 1317 ABSTRACT By using data available in the open literature, we expanded the Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model developed by Argonne National Laboratory to include Brazilian-grown sugarcane ethanol. With the expanded GREET model, we examined the well-to-wheels (WTW) energy use and

239

CO2 Footprint Life-Cycle Analyses: EPRI CoalFleet Study Cases and State of Knowledge Assessment  

Science Conference Proceedings (OSTI)

Life-cycle analyses of the global warming potential of greenhouse gas (GHG) emissions, sometimes known as a carbon footprint and expressed in CO2-equivalent emissions, have been used to compare the environmental impacts of technologies with different energy conversion characteristics and upstream and downstream uses of energy and materials. Historically, such analyses have been conducted to assess the benefits of electricity production and delivery from renewable energy sources and alternative fuel trans...

2010-12-31T23:59:59.000Z

240

Levelized life-cycle costs for four residue-collection systems and four gas-production systems  

DOE Green Energy (OSTI)

Technology characterizations and life-cycle costs were obtained for four residue-collection systems and four gas-production systems. All costs are in constant 1981 dollars. The residue-collection systems were cornstover collection, wheat-straw collection, soybean-residue collection, and wood chips from forest residue. The life-cycle costs ranged from $19/ton for cornstover collection to $56/ton for wood chips from forest residues. The gas-production systems were low-Btu gas from a farm-size gasifier, solar flash pyrolysis of biomass, methane from seaweed farms, and hydrogen production from bacteria. Life-cycle costs ranged from $3.3/10/sup 6/ Btu for solar flash pyrolysis of biomass to $9.6/10/sup 6/ Btu for hydrogen from bacteria. Sensitivity studies were also performed for each system. The sensitivity studies indicated that fertilizer replacement costs were the dominate costs for the farm-residue collection, while residue yield was most important for the wood residue. Feedstock costs were most important for the flash pyrolysis. Yields and capital costs are most important for the seaweed farm and the hydrogen from bacteria system.

Thayer, G.R.; Rood, P.L.; Williamson, K.D. Jr.; Rollett, H.

1983-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Interest group lifecycles and recreational fishing: an exploratory study in the evolution of two sport fishing groups  

E-Print Network (OSTI)

This research is a comparative, exploratory case study of the evolution of the Sport Fishing Institute and the Coastal Conservation Association. The study details the life histories of these two recreational fishing interest groups in order that it may be seen how interest groups change and why they do so. Initial propositions suggest there are three developmental stages in the lifecycle of an interest group. Additionally, there are eight variables of change that are characteristic of each stage. These variables may be used to classify the interest group according to its developmental stage. Finally, it is suggested that these changes are part of a general and predictable pattern in the interest group's lifecycle. Data for the study was obtained over a two year period through document search and extensive interviews with key informants, both inside and outside the organizations. Findings of the study indicate that there are three stages of development in these interest group's lifecycles. The stages are; nascent, developing, and mature. Data indicates that the Sport Fishing Institute has evolved to the mature stage, while the Coastal Conservation Association is in the developing stage. Characteristics of each stage are defined, as are the circumstances necessary for movement from one stage to another and the common problems faced by most interest groups.

Faulkner, Kelly Patrice

1993-01-01T23:59:59.000Z

242

Kipnis-shamir attack on unbalanced oil-vinegar scheme  

Science Conference Proceedings (OSTI)

The public key of the Oil-Vinegar scheme consists of a set of m quadratic equations in m+n variables over a finite field Fq. Kipnis and Shamir broke the balanced Oil-Vinegar scheme where d = n-m = 0 by finding equivalent ... Keywords: Kipnis-Shamir attack, Oil-Vinegar scheme, multivariate public key cryptosystem, signature scheme

Weiwei Cao; Lei Hu; Jintai Ding; Zhijun Yin

2011-05-01T23:59:59.000Z

243

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields  

E-Print Network (OSTI)

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields Electrical Engineering that the challenges software optimizers and microarchitects face every day boil down to a single problem: bottleneck cache miss or window stall. Tasks such as tuning processors for energy efficiency and finding the right

Hill, Mark D.

244

MULTOPS: a data-structure for bandwidth attack detection  

Science Conference Proceedings (OSTI)

A denial-of-service bandwidth attack is an attempt to disrupt an online service by generating a traffic overload that clogs links or causes routers near the victim to crash. We propose a heuristic and a data-structure that network devices (such as routers) ...

Thomer M. Gil; Massimiliano Poletto

2001-08-01T23:59:59.000Z

245

The Lifecycle of Bayesian Network Models Developed for Multi-Source Signature Assessment of Nuclear Programs  

Science Conference Proceedings (OSTI)

The Multi-Source Signatures for Nuclear Programs project, part of Pacific Northwest National Laboratory’s (PNNL) Signature Discovery Initiative, seeks to computationally capture expert assessment of multi-type information such as text, sensor output, imagery, or audio/video files, to assess nuclear activities through a series of Bayesian network (BN) models. These models incorporate knowledge from a diverse range of information sources in order to help assess a country’s nuclear activities. The models span engineering topic areas, state-level indicators, and facility-specific characteristics. To illustrate the development, calibration, and use of BN models for multi-source assessment, we present a model that predicts a country’s likelihood to participate in the international nuclear nonproliferation regime. We validate this model by examining the extent to which the model assists non-experts arrive at conclusions similar to those provided by nuclear proliferation experts. We also describe the PNNL-developed software used throughout the lifecycle of the Bayesian network model development.

Gastelum, Zoe N.; White, Amanda M.; Whitney, Paul D.; Gosink, Luke J.; Sego, Landon H.

2013-06-04T23:59:59.000Z

246

Life-cycle energy savings potential from aluminum-intensive vehicles  

DOE Green Energy (OSTI)

The life-cycle energy and fuel-use impacts of US-produced aluminum-intensive passenger cars and passenger trucks are assessed. The energy analysis includes vehicle fuel consumption, material production energy, and recycling energy. A model that stimulates market dynamics was used to project aluminum-intensive vehicle market shares and national energy savings potential for the period between 2005 and 2030. We conclude that there is a net energy savings with the use of aluminum-intensive vehicles. Manufacturing costs must be reduced to achieve significant market penetration of aluminum-intensive vehicles. The petroleum energy saved from improved fuel efficiency offsets the additional energy needed to manufacture aluminum compared to steel. The energy needed to make aluminum can be reduced further if wrought aluminum is recycled back to wrought aluminum. We find that oil use is displaced by additional use of natural gas and nonfossil energy, but use of coal is lower. Many of the results are not necessarily applicable to vehicles built outside of the United States, but others could be used with caution.

Stodolsky, F.; Vyas, A.; Cuenca, R.; Gaines, L.

1995-07-01T23:59:59.000Z

247

A building life-cycle information system for tracking building performance metrics  

SciTech Connect

Buildings often do not perform as well in practice as expected during pre-design planning, nor as intended at the design stage. While this statement is generally considered to be true, it is difficult to quantify the impacts and long-term economic implications of a building in which performance does not meet expectations. This leads to a building process that is devoid of quantitative feedback that could be used to detect and correct problems both in an individual building and in the building process itself. One key element in this situation is the lack of a standardized method for documenting and communicating information about the intended performance of a building. This paper describes the Building Life-cycle Information System (BLISS); designed to manage a wide range of building related information across the life cycle of a building project. BLISS is based on the Industry Foundation Classes (IFC) developed by the International Alliance for Interoperability. A BLISS extension to th e IFC that adds classes for building performance metrics is described. Metracker, a prototype tool for tracking performance metrics across the building life cycle, is presented.

Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

1999-04-01T23:59:59.000Z

248

Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.  

DOE Green Energy (OSTI)

A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M. (Energy Systems)

2012-02-08T23:59:59.000Z

249

Interoperable, life-cycle tools for assuring building performance: An overview of a commercial building initiative  

SciTech Connect

A key impediment to improving the energy efficiency and reducing the environmental impact of buildings is the complexity and cost of managing information over the life cycle of a building. A surprisingly large fraction of the total cost of buildings is embodied in the decision making and information management process due to the structure of the building industry, the numerous people and companies involved in the process, the current nature of the building acquisition process, and the long time periods over which buildings operate once design and construction are completed. The authors suggest that new interoperable software tools could greatly facilitate and rationalize this complex process, thereby reducing time and cost, and greatly improving the habitability and environmental impact of these buildings. They describe a series of projects in which they are building and testing several prototype toolkits as part of a building life-cycle information system that will allow interoperable software tools to function more effectively throughout the design, construction, commissioning, and operations phases.

Selkowitz, S.; Piette, M.A.; Papamichael, K.; Sartor, D.; Hitchcock, R.; Olken, F.

1996-11-01T23:59:59.000Z

250

Cathodic protection in simulated geothermal environments  

DOE Green Energy (OSTI)

The results of cathodic protection of carbon steel and AISI Type 316 stainless steel in simulated geothermal brines are described. Impressed current tests on carbon steel and stainless steel were conducted under controlled potential, and cathodic protection of carbon steel using zinc sacrificial anodes was studied by monitoring the galvanic current and potential of the couple with a zero-resistance ammeter. Weight-loss measurements and photomicrographs of test coupons were taken whenever necessary to determine the nature of attack and degree of protection. Tests were generally conducted at 90/sup 0/C. However, some tests on carbon steel were conducted up to 150/sup 0/C in a titanium autoclave. Results show that the weight loss of carbon steel can be reduced significantly and the pitting corrosion of the stainless steel can be prevented by shifting the potentials of the metals 60 to 80 mV cathodic to their respective open-circuit potentials.

Bandy, R.; van Rooyen, D.

1983-01-01T23:59:59.000Z

251

A proposal of extension of FMS-Based mechanism to find attack paths  

Science Conference Proceedings (OSTI)

With the increase of internet service providers(companies) for the rapidly growing numbers of internet users in recent years, malicious attackers has been growing too. Due to these attacks, corporate image can be impaired significantly by such damages ...

Byung-Ryong Kim; Ki-Chang Kim

2006-05-01T23:59:59.000Z

252

Ice slurry technology can save heart attack victims, surgery patients  

NLE Websites -- All DOE Office Websites (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

253

Argonne applied mathematicians use INCITE awards to attack energy problems  

NLE Websites -- All DOE Office Websites (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

254

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

255

Documenting performance metrics in a building life-cycle information system  

SciTech Connect

In order to produce a new generation of green buildings, it will be necessary to clearly identify their performance requirements, and to assure that these requirements are met. A long-term goal is to provide building decision-makers with the information and tools needed to cost-effectively assure the desired performance of buildings, as specified by stakeholders, across the complete life cycle of a building project. A key element required in achieving this goal is a method for explicitly documenting the building performance objectives that are of importance to stakeholders. Such a method should clearly define each objective (e.g., cost, energy use, and comfort) and its desired level of performance. This information is intended to provide quantitative benchmarks useful in evaluating alternative design solutions, commissioning the newly constructed building, and tracking and maintaining the actual performance of the occupied building over time. These quantitative benchmarks are referred to as performance metrics, and they are a principal element of information captured in the Building Life-cycle Information System (BLISS). An initial implementation of BLISS is based on the International Alliance for Interoperability`s (IAI) Industry Foundation Classes (IFC), an evolving data model under development by a variety of architectural, engineering, and construction (AEC) industry firms and organizations. Within BLISS, the IFC data model has been extended to include performance metrics and a structure for archiving changing versions of the building information over time. This paper defines performance metrics, discusses the manner in which BLISS is envisioned to support a variety of activities related to assuring the desired performance of a building across its life cycle, and describes a performance metric tracking tool, called Metracker, that is based on BLISS.

Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

1998-08-01T23:59:59.000Z

256

Glass Composition Constraint Recommendations for Use in Life-Cycle Mission Modeling  

Science Conference Proceedings (OSTI)

The component concentration limits that most influence the predicted Hanford life-cycle HLW glass volume by HTWOS were re-evaluated. It was assumed that additional research and development work in glass formulation and melter testing would be performed to improve the understanding of component effects on the processability and product quality of these HLW glasses. Recommendations were made to better estimate the potential component concentration limits that could be applied today while technology development is underway to best estimate the volume of HLW glass that will eventually be produced at Hanford. The limits for concentrations of P2O5, Bi2O3, and SO3 were evaluated along with the constraint used to avoid nepheline formation in glass. Recommended concentration limits were made based on the current HLW glass property models being used by HTWOS (Vienna et al. 2009). These revised limits are: 1) The current ND should be augmented by the OB limit of OB ? 0.575 so that either the normalized silica (NSi) is less that the 62% limit or the OB is below the 0.575 limit. 2) The mass fraction of P2O5 limit should be revised to allow for up to 4.5 wt%, depending on CaO concentrations. 3) A Bi2O3 concentration limit of 7 wt% should be used. 4) The salt accumulation limit of 0.5 wt% SO3 may be increased to 0.6 wt%. Again, these revised limits do not obviate the need for further testing, but make it possible to more accurately predict the impact of that testing on ultimate HLW glass volumes.

McCloy, John S.; Vienna, John D.

2010-05-03T23:59:59.000Z

257

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

258

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

259

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

260

DDoS attack detection method based on linear prediction model  

Science Conference Proceedings (OSTI)

Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. The IP Flow feature value (FFV) algorithm is proposed based on the essential features of DDoS attacks, such as the abrupt traffic change, flow dissymmetry, ... Keywords: ARMA model, attack features, distributed denial of service, linear prediction, network security

Jieren Cheng; Jianping Yin; Chengkun Wu; Boyun Zhang; Yun Liu

2009-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks  

Science Conference Proceedings (OSTI)

SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, ... Keywords: SQL injection attacks, dynamic monitoring, retrofitting code, symbolic evaluation

Prithvi Bisht; P. Madhusudan; V. N. Venkatakrishnan

2010-02-01T23:59:59.000Z

262

Countermeasures against fault attacks on software implemented AES: effectiveness and cost  

Science Conference Proceedings (OSTI)

In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm and analyze the efficiency of these countermeasures. We propose ... Keywords: countermeasures, fault attacks, side-channel attacks

Alessandro Barenghi; Luca Breveglieri; Israel Koren; Gerardo Pelosi; Francesco Regazzoni

2010-10-01T23:59:59.000Z

263

Life-Cycle Water Impacts of U.S. Transportation Fuels  

E-Print Network (OSTI)

Protection in Primary Crude Oil Refining Units. ChemistryCO2 Emissions for Selected Crude Oils in the U.S. RefiningWater from Production of Crude Oil, Natural Gas, and Coal

Scown, Corinne Donahue

2010-01-01T23:59:59.000Z

264

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

265

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

266

Denial-of-service attacks on battery-powered mobile computers  

E-Print Network (OSTI)

Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures. 1.

Thomas Martin; Michael Hsiao; Dong Ha; Jayan Krishnaswami

2004-01-01T23:59:59.000Z

267

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network (OSTI)

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

268

Life-Cycle Assessment of Energy Use and Greenhouse Gas Emissions of Soybean-Derived Biodiesel and Renewable Fuels  

DOE Green Energy (OSTI)

In this study, we used Argonne National Laboratory's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model to assess the life-cycle energy and greenhouse gas (GHG) emission impacts of four soybean-derived fuels: biodiesel fuel produced via transesterification, two renewable diesel fuels (I and II) produced from different hydrogenation processes, and renewable gasoline produced from catalytic cracking. Five approaches were employed to allocate the coproducts: a displacement approach; two allocation approaches, one based on the energy value and the other based on the market value; and two hybrid approaches that integrated the displacement and allocation methods. The relative rankings of soybean-based fuels in terms of energy and environmental impacts were different under the different approaches, and the reasons were analyzed. Results from the five allocation approaches showed that although the production and combustion of soybean-based fuels might increase total energy use, they could have significant benefits in reducing fossil energy use (>52%), petroleum use (>88%), and GHG emissions (>57%) relative to petroleum fuels. This study emphasized the importance of the methods used to deal with coproduct issues and provided a comprehensive solution for conducting a life-cycle assessment of fuel pathways with multiple coproducts.

Huo, H.; Wang, M.; Bloyd, C.; Putsche, V.

2009-01-01T23:59:59.000Z

269

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

270

Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products, Part 3: LED Environmental Testing  

SciTech Connect

This report covers the third part of a larger U.S. Department of Energy (DOE) project to assess the life-cycle environmental and resource impacts in the manufacturing, transport, use, and disposal of light-emitting diode (LED) lighting products in relation to incumbent lighting technologies. All three reports are available on the DOE website (www.ssl.energy.gov/tech_reports.html). • Part 1: Review of the Life-Cycle Energy Consumption of Incandescent, Compact Fluorescent and LED Lamps; • Part 2: LED Manufacturing and Performance; • Part 3: LED Environmental Testing. Parts 1 and 2 were published in February and June 2012, respectively. The Part 1 report included a summary of the life-cycle assessment (LCA) process and methodology, provided a literature review of more than 25 existing LCA studies of various lamp types, and performed a meta-analysis comparing LED lamps with incandescent and compact fluorescent lamps (CFLs). Drawing from the Part 1 findings, Part 2 performed a more detailed assessment of the LED manufacturing process and used these findings to provide a comparative LCA taking into consideration a wider range of environmental impacts. Both reports concluded that the life-cycle environmental impact of a given lamp is dominated by the energy used during lamp operation—the upstream generation of electricity drives the total environmental footprint of the product. However, a more detailed understanding of end-of-life disposal considerations for LED products has become increasingly important as their installation base has grown. The Part 3 study (reported herein) was undertaken to augment the LCA findings with chemical analysis of a variety of LED, CFL, and incandescent lamps using standard testing procedures. A total of 22 samples, representing 11 different models, were tested to determine whether any of 17 elements were present at levels exceeding California or Federal regulatory thresholds for hazardous waste. Key findings include: • The selected models were generally found to be below thresholds for Federally regulated elements; • All CFLs and LED lamps and most incandescent lamps exceeded California thresholds for Copper; • Most CFL samples exceeded California thresholds for Antimony and Nickel, and half of the LED samples exceeded California thresholds for Zinc; • The greatest contributors were the screw bases, drivers, ballasts, and wires or filaments; • Overall concentrations in LED lamps were comparable to cell phones and other types of electronic devices, and were generally attributable to components other than the internal LED light sources; • Although the life-cycle environmental impact of the LED lamps is favorable when compared to CFLs and incandescent lamps, recycling will likely gain importance as consumer adoption increases. This study was exploratory in nature and was not intended to provide a definitive indication of regulatory compliance for any specific lamp model or technology. Further study would be needed to more broadly characterize the various light source technologies; to more accurately and precisely characterize a specific model; or to determine whether product redesign would be appropriate.

Tuenge, Jason R.; Hollomon, Brad; Dillon, Heather E.; Snowden-Swan, Lesley J.

2013-03-01T23:59:59.000Z

271

More on graph theoretic software watermarks: Implementation, analysis, and attacks  

Science Conference Proceedings (OSTI)

This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, ... Keywords: Software piracy protection, Software protection, Software watermarking, Surreptitious software

Christian Collberg; Andrew Huntwork; Edward Carter; Gregg Townsend; Michael Stepp

2009-01-01T23:59:59.000Z

272

Iran's Response to a U.S. Attack  

E-Print Network (OSTI)

Click to skip to the comments section. Editor's Note: Readers, you can click the PDF button on the menu above to make this article into a PDF suitable for printing or e-reading. Michael Rienzi lays out a detailed analysis of Iran's potential reactions to a strike and finds the following thesis to be likely. Iran’s reaction to an attack by the US would be to use all means at its disposal including their large arsenal of missiles, asymmetric warfare, regular forces, and economic/political disruption methods that would cause large amounts of devastation, casualties, economic disruption, and fear; in the hopes that the enemy would lose the support of its citizens and allies, thus forcing them to end the confrontation; Iran would use all means at its disposal to accomplish this goal rather quickly as they would try to avoid an extended conflict. “Iran would not hesitate to retaliate if attacked. If enemies intend to endanger our welfare and security, we will adopt measures which will make them regret their actions."Islamic Revolutionary Guards Corps

V. Rienzi; Brig Gen; Mohammad Hejazi

2012-01-01T23:59:59.000Z

273

An Electricity-focused Economic Input-output Model: Life-cycle Assessment and Policy Implications of Future Electricity Generation Scenarios  

E-Print Network (OSTI)

chains and emission factors for the generation, transmission and distribution portions of the electricityAn Electricity-focused Economic Input-output Model: Life-cycle Assessment and Policy Implications of Future Electricity Generation Scenarios Joe Marriott Submitted in Partial Fulfillment of the Requirements

274

Molasses for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol  

E-Print Network (OSTI)

greenhouse gas analysis of sugarcane ethanol This article has been downloaded from IOPscience. Please scroll for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis (from: greenhouse gas, regulated emissions and energy use in transportation) model, which is the LCA

Kammen, Daniel M.

275

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

276

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network (OSTI)

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

277

DOE Advanced Protection Project  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Task 3 - Advanced Protection - Evaluate measures - 2009 - Design, model Irvine Smart Grid Demo protection system - 2010 6 Copyright 2010, Southern California Edison Task 1 -...

278

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

279

Real-time wind estimation and display for chem/bio attack response using UAV data .  

E-Print Network (OSTI)

??The defense response to a Chemical and Biological attack would be importantly based on predicting the dispersion of a toxic cloud. Considering that an Unmanned… (more)

Sir, CristiaĚ

2003-01-01T23:59:59.000Z

280

Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in Integrated Gas Combined Cycle Turbine Engines. Author(s), Andrew D.

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network (OSTI)

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

282

A simple and low cost platform to perform Power Analysis Attacks.  

E-Print Network (OSTI)

??Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it… (more)

Carmona, Manuel

2012-01-01T23:59:59.000Z

283

Life-cycle assessment of municipal solid waste management alternatives with consideration of uncertainty: SIWMS development and application  

Science Conference Proceedings (OSTI)

This paper describes the development and application of the Stochastic Integrated Waste Management Simulator (SIWMS) model. SIWMS provides a detailed view of the environmental impacts and associated costs of municipal solid waste (MSW) management alternatives under conditions of uncertainty. The model follows a life-cycle inventory approach extended with compensatory systems to provide more equitable bases for comparing different alternatives. Economic performance is measured by the net present value. The model is verified against four publicly available models under deterministic conditions and then used to study the impact of uncertainty on Sydney's MSW management 'best practices'. Uncertainty has a significant effect on all impact categories. The greatest effect is observed in the global warming category where a reversal of impact direction is predicted. The reliability of the system is most sensitive to uncertainties in the waste processing and disposal. The results highlight the importance of incorporating uncertainty at all stages to better understand the behaviour of the MSW system.

El Hanandeh, Ali, E-mail: alel5804@uni.sydney.edu.a [School of Civil Engineering, Building J05, University of Sydney NSW 2006 (Australia); El-Zein, Abbas [School of Civil Engineering, Building J05, University of Sydney NSW 2006 (Australia)

2010-05-15T23:59:59.000Z

284

Modern generator protection systems  

SciTech Connect

The special problems of the protection of generating stations with large machines connected to large integrated networks are presented. The coordination between the protective relays and tripping functions and the reliability of the protection scheme are important considerations in modern plants. Primary and backup protective functions, the applications, and their divisions into fault detection and ''fault prevention'' categories are considered. Testing and maintenance of the generator protection system including automatic calibration testing equipment is also discussed. The concept of the generator protection as a completely coordinated system and its realization with solid state protective relays is also presented. 9 refs.

Pencinger, C.J.

1981-01-01T23:59:59.000Z

285

Low-Latency Cryptographic Protection for SCADA Communications  

E-Print Network (OSTI)

Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of commands and responses that are typically transmitted over serial lines at speeds from 300 to 19200 bits per second, while introducing minimal additional latency into the real-time SCADA traffic. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding encryption mode which, for a b-bit block cipher, ensures that any unauthentic message an adversary can construct (i) includes at least b randomly chosen bits, and therefore, by a new result proved for error detection by systematic shortened cyclic codes, (ii) contains a correct h-bit CRC with probability 2 ?h. The low speed of the communications channel limits the rate at which an adversary can make trials, enabling detection of potential attacks before enough trials can be made to achieve any significant likelihood of success. The protocol avoids the need for a decrypting link protection module to buffer decrypted data until an end-of-message integrity check is verified, which would otherwise add significant latency. 1

Andrew K. Wright; John A. Kinast; Joe Mccarty

2004-01-01T23:59:59.000Z

286

Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention  

Science Conference Proceedings (OSTI)

A chlorine tank truck attack could cause thousands of fatalities. As a means of preventing chlorine truck attacks, I consider the on-site generation of chlorine or hypochlorite at all U.S. facilities currently receiving chlorine by truck. I develop and ... Keywords: applications, cost-effectiveness, public policy, risk analysis, terrorism, uncertainty

Anthony M. Barrett

2010-12-01T23:59:59.000Z

287

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

288

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

289

A defence scheme against Identity Theft Attack based on multiple social networks  

Science Conference Proceedings (OSTI)

Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind ... Keywords: Identity Theft Attack, Multi-dimensional social network, Social networks

Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun

2014-04-01T23:59:59.000Z

290

Power and EM Attacks on Passive $13.56\\,\\textrm{MHz}$ RFID Devices  

Science Conference Proceedings (OSTI)

During the last years, more and more security applications have been developed that are based on passive 13.56 MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the ... Keywords: AES, DEMA, DPA, EM Attacks, Power Analysis, RFID, Side-Channel Attacks

Michael Hutter; Stefan Mangard; Martin Feldhofer

2007-09-01T23:59:59.000Z

291

Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks  

Science Conference Proceedings (OSTI)

This paper proposes a novel approach for cryptanalysis of keystream generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis ... Keywords: LFSRs, algebraic attacks, decimation, fast correlation attack, nonlinear combination keystream generator, state transition matrix, stream ciphers

Miodrag J. Mihaljevi?; Marc P. C. Fossorier; Hideki Imai

2005-12-01T23:59:59.000Z

292

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

293

Program on Technology Innovation: Chloride Attack-Induced Aging of Concrete Structures in the Energy Industry  

Science Conference Proceedings (OSTI)

Corrosion of embedded steel elements (reinforcement, liner, pre- or post-tensioning device) is a major cause of structure dysfunction resulting in large maintenance and repair costs worldwide. This report focuses on chloride attack–induced aging of concrete structures in the energy industry. Chloride attack is a common aging issue caused by marine environment, the extensive ...

2012-11-30T23:59:59.000Z

294

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

295

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

296

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

297

Free energies for acid attack reactions of lithium cobaltate.  

Science Conference Proceedings (OSTI)

The attack of lithium-ion battery cathodes by stray aqueous HF, with resultant dissolution, protonation, and possibly other unintended reactions, can be a significant source of capacity fade. We explore the calculation of reaction free energies of lithium cobaltate in acid by a 'hybrid' method, in which solid-phase free energies are calculated from first principles at the generalized gradient approximation + intrasite coulomb interaction (GGA+U) level and tabulated values of ionization potentials and hydration energies are employed for the aqueous species. Analysis of the dissolution of the binary oxides Li{sub 2}O and CoO suggests that the atomic energies for Co and Li should be shifted from values calculated by first principles to yield accurate reaction free energies within the hybrid method. With the shifted atomic energies, the hybrid method was applied to analyze proton-promoted dissolution and protonation reactions of LiCoO{sub 2} in aqueous acid. Reaction free energies for the dissolution reaction, the reaction to form Co{sub 3}O{sub 4} spinel, and the proton-for-lithium exchange reaction are obtained and compared to empirical values. An extension of the present treatment to consider partial reactions is proposed, with a view to investigating interfacial and environmental effects on the dissolution reaction.

Benedek, R.; van de Walle, A.; Chemical Sciences and Engineering Division; California Inst. of Tech.

2008-01-01T23:59:59.000Z

298

Program Record 13006 (Offices of Vehicle Technologies and Fuel Cell Technologies: Life-Cycle Costs of Mid-Size Light-Duty Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Record (Offices of Vehicle Technologies & Fuel Cell Program Record (Offices of Vehicle Technologies & Fuel Cell Technologies) Record #: 13006 Date: April 24, 2013 Title: Life-cycle Costs of Mid-Size Light-Duty Vehicles Originator: Tien Nguyen & Jake Ward Approved by: Sunita Satyapal Pat Davis Date: April 25, 2013 Items: DOE is pursuing a portfolio of technologies with the potential to significantly reduce greenhouse gases (GHG) emissions and petroleum consumption while being cost-effective. This record documents the assumptions and results of analyses conducted to estimate the life-cycle costs resulting from several fuel/vehicle pathways, for a future mid-size car. The results are summarized graphically in the following figure. Costs of Operation for Future Mid-Size Car

299

Department of Energy Launches Initiative with Industry to Better Protect  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

300

Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks  

SciTech Connect

This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

2009-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

302

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network (OSTI)

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses LRU cache filtering to capture the high bandwidth flows followed by computation of wavelet variance on the aggregate miss traffic. The introduction of attack traffic in the network would elicit changes in the wavelet variance. This is combined with thresholding methods to enable attack detection. Sampling techniques can be used to tailor the cost of our detection mechanism. The mechanism we suggest is independent of routing information, thereby making attack detection immune to IP address spoofing. Using simulations and quantitative measures, we find that our mechanism works successfully on several kinds of attacks. We also use statistical methods to validate the results obtained.

Ramanathan, Anu

2002-01-01T23:59:59.000Z

303

Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.  

Science Conference Proceedings (OSTI)

The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

2008-03-28T23:59:59.000Z

304

Corium protection assembly  

DOE Patents (OSTI)

A corium protection assembly includes a perforated base grid disposed below a pressure vessel containing a nuclear reactor core and spaced vertically above a containment vessel floor to define a sump therebetween. A plurality of layers of protective blocks are disposed on the grid for protecting the containment vessel floor from the corium.

Gou, Perng-Fei (Saratoga, CA); Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Sirtori, IT)

1994-01-01T23:59:59.000Z

305

ORISE: Human Subjects Protection Resource Protection Book  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Subjects Protection Resource Book Human Subjects Protection Resource Book The Human Subjects Protection Resource Book synthesizes information currently available on the protection of human subjects in research, the continuing application of such information to new areas of endeavor, and ever-changing rules, regulations, and guidance. This resource, to which the Oak Ridge Institute for Science and Education (ORISE) contributed, is for investigators, institutional review boards, research organizations, research subjects and others. The book contains chapters that provide background information on the history and development of federal regulations; chapters that discuss procedural and substantive issues regarding the review and conduct of human subjects research; and chapters that are specific to one type of research

306

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

307

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

308

Fire Protection Program Manual  

Science Conference Proceedings (OSTI)

This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

Sharry, J A

2012-05-18T23:59:59.000Z

309

Los Alamos Lab: Radiation Protection  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisor Paul Hoover Special Assistant and Issues Management Coordinator Elinor Gwynn Radiation Protection Radiation Protection The Radiation Protection Division supports the...

310

Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study  

Science Conference Proceedings (OSTI)

In recent years the monitoring and control devices in charge of supervising the critical processes of Critical Infrastructures have been victims of cyber attacks. To face such threat, organizations providing critical services are increasingly focusing ... Keywords: OSSIM, SIEM, critical infrastructure protection, dam

Luigi Coppolino; Salvatore D'Antonio; Valerio Formicola; Luigi Romano

2011-09-01T23:59:59.000Z

311

IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES  

SciTech Connect

The project started on September 1, 2001. During last 4 months, one post-doctor has been hired for this project. We have received TBC samples (YSZ/CoNiCrAlY/ Inconel 601) from Tohoku University, Japan, while processing of the TBC samples was delayed in GE Corp. Research and Development. The TBC preparation in Japan was based on our technical requirement by plasma spray. Bond coat CoNiCrAlY and the YSZ was produced by low-pressure plasma spray and air plasma spray respectively. The morphology of the surface and the microstructure of cross-section of the sample was observed and analyzed by SEM and EDX. XRD was also used to detect the phases in the YSZ. Currently we are processing the overlay Al{sub 2}O{sub 3} on the TBC samples by EB-PVD and high velocity oxy-fuel (HVOF) spray techniques in collaboration with Penn State University and State University of New York at Stony Brook. We will finish comparing the hot corrosion behavior of the Al{sub 2}O{sub 3}/YSZ/CoNiCrAlY/superalloy system with the YSZ/CoNiCrAlY/superalloy system. The mechanism of hot corrosion will be investigated. The processing-structure-properties relationship of the overlays will be determined.

Scott X. Mao

2002-01-31T23:59:59.000Z

312

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

313

A study on visual attack to BPCS-Steganography and countermeasure  

Science Conference Proceedings (OSTI)

This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS replaces noisy blocks with the binary patterns mapped from secret data. The logical operation called conjugate ...

Michiharu Niimi; Hideki Noda; Bruce Segee

2005-09-01T23:59:59.000Z

314

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

315

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

316

National Infrastructure Protection Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

317

ORISE: Protecting Human Subjects  

NLE Websites -- All DOE Office Websites (Extended Search)

Subjects Protecting Human Subjects The U.S. Department of Energy (DOE) Human Subjects Research Program exists to ensure that all research conducted at DOE institutions, whether...

318

PROTECTIVE CLOTHING STANDARDS  

SciTech Connect

Hanford Atomic Production Operation specification guides for protective clothing are presented. Details of this manual are given in TID-4100(Suppl.). (N.W.R.)

1963-01-01T23:59:59.000Z

319

Radiation Protection Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

320

Generator backup overcurrent protection  

Science Conference Proceedings (OSTI)

A concern that the characteristics and correct application of the generator backup relay are misunderstood is addressed in this report to the Power Systems Protection Committee. It is inherently a secure device, and rarely has the opportunity to operate in its intended capacity. So the question was asked, ''Do generator backup overcurrent relays really protect anything.'' In response a description of the function and operating characteristics of the backup relays, a discussion of generator fault current behavior, examples of relay settings for a typical application, and methods and criteria for determining that the relay both protects the generator and operates selectively with other protective devices are included.

Baker, D.S.

1982-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Surge Protection Anthology  

Science Conference Proceedings (OSTI)

... Three annexes include unpublished contributions to working groups, US patents front pages, and ... Lightning protection of roof-mounted solar cells ...

2013-05-17T23:59:59.000Z

322

Fire Protection Program Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidelines Principal Orders Related Orders Technical Standards Guidance Current fire protection requirements of the Department reside in: DOE O 420.1C, "Facility Safety", 10 CFR...

323

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

324

Environmental Protection Implementation Plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. The Environmental Protection Implementation Plan serves as an aid to management and staff to implement new environmental programs in a timely manner.

Brekke, D.D.

1994-01-01T23:59:59.000Z

325

Notices ENVIRONMENTAL PROTECTION AGENCY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25 Federal Register 25 Federal Register / Vol. 76, No. 209 / Friday, October 28, 2011 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9484-2] Children's Health Protection Advisory Committee (CHPAC); Notice of Charter Renewal AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Charter Renewal. Notice is hereby given that the Environmental Protection Agency (EPA) has determined that, in accordance with the provisions of the Federal Advisory Committee Act (FACA), 5 U.S.C. App.2. The Children's Health Protection Advisory Committee (CHPAC) is a necessary committee which is in the public interest. Accordingly, CHPAC will be renewed for an additional two- year period. The purpose of CHPAC is to provide advice and recommendations to the Administrator of EPA on issues

326

ORISE: Human Subjects Protection  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Subjects Protection Human Subjects Protection The Oak Ridge Institute for Science and Education (ORISE) performs technical assessments to assist U.S. Department of Energy (DOE) laboratories involved in human subjects research projects. Under DOE Order and Policy 443.1A, Protection of Human Subjects, and 10 CFR 745, DOE employees and contractors are expected to protect the rights and welfare of human research subjects. In support of the DOE Office of Science and the Human Subjects Protection Program (HSPP), ORISE has most recently assisted with the development and distribution of tools to address classified research and to track potential human social cultural behavior systems (HSCB) research conducted by DOE laboratories. Examples of products that ORISE has developed in support of the HSPP

327

Nuclear Power Plant Risk Analysis and Management for Critical Asset Protection (RAMCAP) Trial Applications Summary Report  

Science Conference Proceedings (OSTI)

The nuclear power plant risk analysis and management for critical asset protection (NPP RAMCAP ) methodology provides a common, high-level framework for evaluating NPP risk from terrorist attacks that plant owners/operators can use. Development of this method has been coordinated with other U.S. Department of Homeland Security (DHS) efforts in order to enable a consistent risk characterization among all critical infrastructure sectors. This effort culminated in a generic RAMCAP methodology potentially ap...

2005-12-22T23:59:59.000Z

328

Silicon nitride protective coatings for silvered glass mirrors  

DOE Patents (OSTI)

A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate prior to metal deposition thereon to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

Tracy, C.E.; Benson, D.K.

1984-07-20T23:59:59.000Z

329

Office of River Protection (ORP) and Washingotn River Protection Solutions,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of River Protection (ORP) and Washingotn River Protection Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project The Mission of the Office of River Protection is to safely retrieve and treat Hanford's tank waste and close the Tank Farms to protect the Columbia River. Office of River Protection (ORP) and Washingotn River Protection Solutions, LLC (WRPS) Partnering Agreement for the DOE-EM Tank Operations Project More Documents & Publications 2011 Annual Workforce Analysis and Staffing Plan Report - Office of River Protection Consent Order, Washington River Protection Solutions, LLC - NCO-2011-01

330

Coordinating overcurrent protection devices  

Science Conference Proceedings (OSTI)

Distribution, substation, and plant engineers can benefit from using an overcurrent protection program in commercial, industrial, and utility applications to aid in clearing temporary faults and isolating permanent faults. In the time it normally takes to check one coordination scheme manually, dozens of alternatives can be evaluated using a graphics-oriented program, because the engineer receives immediate feedback for quick decision-making. It is well known that accurately coordinating overcurrent protection devices can minimize or prevent equipment damage, and electrical power service to customers can be greatly improved. In addition to assisting experienced engineers, an overcurrent protection program is an excellent training tool for new engineers.

St. John, M.; Borgnino, A.

1996-07-01T23:59:59.000Z

331

Fire Protection Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Program Fire Protection Overview The Department of Energy (DOE) Fire Protection Program is multi-faceted. It includes published fire safety directives (Orders, standards, and guidance documents), a range of oversight activities, an annual fire protection program summary, and a directory of fire safety professionals. DOE also sponsors fire safety conferences, various training initiatives, and a spectrum of technical assistance activities. This Home Page is intended to bring together in one location as much of the Program's resources as possible to facilitate greater understanding, communication, and efficiency of operations. Guidelines -- NFPA Codes and standards, CFRs, and DOE Directives (policy statements, Orders, Standards, and Guidance Documents)

332

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

333

Bird Protection in Illinois  

NLE Websites -- All DOE Office Websites (Extended Search)

Protection in Illinois Protection in Illinois Nature Bulletin No. 550-A January 18, 1975 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BIRD PROTECTION IN ILLINOIS Very few people are indifferent about birds. Almost every bird is the feathered friend of somebody or some organization ready to do battle in its behalf. At present, in Illinois, songbirds and most other wild birds, together with their nests and eggs, are completely protected by law at all times. A few kinds, called game birds, may be shot by hunters -- pheasants and quail, also migratory ducks, geese, coots, jacksnipes, woodcocks, and doves. Such hunting must be done with shotguns in certain places in certain open seasons with many other detailed restrictions. Now, even crow hunters are licensed. The only unprotected birds are those three immigrants or exotics: the English sparrow, the European starling and the "domestic " pigeon. These, too, have their friends .

334

Potline Open Circuit Protection  

Science Conference Proceedings (OSTI)

It results in a high power arc, which feeds oneself as the DC current is not cut. ... To reduce the risk, the potline and the substation must be protected against the ...

335

Mondriaan memory protection  

E-Print Network (OSTI)

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

336

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

337

Environmental protection Implementation Plan  

SciTech Connect

This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

R. C. Holland

1999-12-01T23:59:59.000Z

338

Fish Protection Technology Manual  

Science Conference Proceedings (OSTI)

This report provides an updated review of the state of knowledge on fish protection technologies for use at power plant cooling water intake structures (CWISs) to meet requirements of §316(b) of the Clean Water Act (CWA). While it is not possible to know with certainty how the §316(b) Final Rule will look (it is scheduled to be issued on or before June 27, 2013), it is anticipated that power generating facilities will have some flexibility in selecting fish protection technologies. The ...

2013-02-12T23:59:59.000Z

339

Methods of dealing with co-products of biofuels in life-cycle analysis and consequent results within the U.S. context.  

Science Conference Proceedings (OSTI)

Products other than biofuels are produced in biofuel plants. For example, corn ethanol plants produce distillers grains and solubles. Soybean crushing plants produce soy meal and soy oil, which is used for biodiesel production. Electricity is generated in sugarcane ethanol plants both for internal consumption and export to the electric grid. Future cellulosic ethanol plants could be designed to co-produce electricity with ethanol. It is important to take co-products into account in the life-cycle analysis of biofuels and several methods are available to do so. Although the International Standard Organization's ISO 14040 advocates the system boundary expansion method (also known as the 'displacement method' or the 'substitution method') for life-cycle analyses, application of the method has been limited because of the difficulty in identifying and quantifying potential products to be displaced by biofuel co-products. As a result, some LCA studies and policy-making processes have considered alternative methods. In this paper, we examine the available methods to deal with biofuel co-products, explore the strengths and weaknesses of each method, and present biofuel LCA results with different co-product methods within the U.S. context.

Wang, M.; Huo, H.; Arora, S. (Energy Systems)

2011-01-01T23:59:59.000Z

340

Microbially derived crop protection products  

E-Print Network (OSTI)

of the Project: Microbially derived crop protection productstransferred into major crop plants. Following greenhouseMicrobial Diversity-Based Novel Crop Protection Products " A

Torok, Tamas

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances  

Science Conference Proceedings (OSTI)

In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

2006-08-01T23:59:59.000Z

342

If you have heart disease, or think you do, there's a lot you can do to protect your heart health. This fact sheet  

E-Print Network (OSTI)

If you have heart disease, or think you do, there's a lot you can do to protect your heart health. This fact sheet gives you the key steps to control the disease, including how to survive a heart attack and prevent serious dam- age to heart muscle. Caring for your heart is worth the effort. Use the information

Bandettini, Peter A.

343

BNL | Cloud Lifecycle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

344

BNL | Aerosol Lifecycle IOP  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Program Aerosol Life Cycle IOP The primary objectives that make up the Aerosol Life Cycle IOP can be broken down into three categories: Scientific; Logistical; and GVAX preparation. Scientific Objectives The science goals are to conduct intensive aerosol observations in a region exposed to anthropogenic, biogenic, and marine emissions with atmospheric processing times depending on air mass trajectories and time of day. Take advantage of new instruments in the MAOS (e.g., SP2, HR-PTRMS, ACSM, Trace Gas Suite, PASS-3, Aethelometer, UHSAS). Within this broad umbrella are embedded three main foci: Aerosol light absorption: How does the aerosol mass absorption coefficient (absorption per unit mass of BC) vary with atmospheric processing? Do observations agree with a shell-core model?

345

BNL | Cloud Lifecycle Research  

NLE Websites -- All DOE Office Websites (Extended Search)

to be one of the major sources of uncertainty in numerical simulations of climate and weather. Improvement of the representation of clouds in numerical models requires fundamental...

346

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

as Feedstock for a Bioenergy and Bioproducts Industry: Theof Biobased Polymers and Bioenergy,” Journal of IndustrialTransport: Analysis of Bioenergy Transport Chains Using

Delucchi, Mark

2006-01-01T23:59:59.000Z

347

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

sulfur) ICEV, natural gas (CNG) ICEV, LPG (P95/BU5) ICEV,Methanol Ethanol Methane (CNG, LNG) Propane (LPG) Hydrogen (M85 (wood) Natural gas CNG (wood) Note: percentage changes

Delucchi, Mark

2006-01-01T23:59:59.000Z

348

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

States. 2000 and 2012 Ethanol from corn. USDA United States.year 2000. Ethanol from corn. Pimentel & Patzek (PP) UnitedRoughly 2000. Ethanol from corn, switchgrass, and wood;

Delucchi, Mark

2006-01-01T23:59:59.000Z

349

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

cellulosic biomass, such as switch grass or wood, the fermentable sugars must be extracted from the feedstock (

Delucchi, Mark

2006-01-01T23:59:59.000Z

350

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

HDDV) Baseline: Diesel (crude oil) (g/mi) Biodiesel (SD100 (a primary resource, such as crude oil or coal, to a finishedexample, the transport of crude oil from the wellhead to a

Delucchi, Mark

2006-01-01T23:59:59.000Z

351

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

2001 Net Energy Balance of Corn-Ethanol, U. S. Department ofg/mi) Ethanol (E90 (corn)) Ethanol (E90 (grass)) Methanol (Ethanol (E100 (corn)) Ethanol (E100 (grass)) Methanol (

Delucchi, Mark

2006-01-01T23:59:59.000Z

352

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

Motors Corporation and Argonne National Laboratory, May (ifeu.pdf. General Motors, Argonne National Lab, et al. ,volumes, published by Argonne National Laboratory, June (

Delucchi, Mark

2006-01-01T23:59:59.000Z

353

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

from soybeans; methanol, SNG and hydrogen from wood. GREETgrass, and wheat; methanol and SNG from wood; biodiesel fromwood; hydrogen, methanol, and SNG from wood; biodiesel from

Delucchi, Mark

2006-01-01T23:59:59.000Z

354

Life-Cycle Analysis  

Science Conference Proceedings (OSTI)

...and environmental consequences of materials usage, recycling, and energy consumed in manufacture, use, and disposal ( Ref

355

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

Shapouri, “Supply and Social Cost Estimates for Biomass fromBiomass as Feedstock for a Bioenergy and Bioproducts Industry: The Technical Feasibility of a Billion-Ton Annual Supply,

Delucchi, Mark

2006-01-01T23:59:59.000Z

356

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

into a synthesis gas (syngas) consisting of CO, H 2 , CO 2 ,DRAFT WORKING MANUSCRIPT The syngas exiting the gasifier isdownstream catalysts. The syngas then undergoes a series of

Delucchi, Mark

2006-01-01T23:59:59.000Z

357

BNL | Aerosol Lifecycle Research  

NLE Websites -- All DOE Office Websites (Extended Search)

identified strategic process-science foci: aerosol nucleation and growth and aerosol aging and mixing state. BNL is the lead laboratory responsible for the design and...

358

Lifecycle Analyses of Biofuels  

E-Print Network (OSTI)

The syngas exiting the gasifier is cooled and then quenchedThe equipment downstream of the gasifier for conversion to

Delucchi, Mark

2006-01-01T23:59:59.000Z

359

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

360

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network (OSTI)

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

362

False data injection attacks against state estimation in electric power grids  

Science Conference Proceedings (OSTI)

A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, ... Keywords: Power grids, attack, state estimation

Yao Liu; Peng Ning; Michael K. Reiter

2011-05-01T23:59:59.000Z

363

Not-a-Bot: improving service availability in the face of botnet attacks  

Science Conference Proceedings (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic ...

Ramakrishna Gummadi; Hari Balakrishnan; Petros Maniatis; Sylvia Ratnasamy

2009-04-01T23:59:59.000Z

364

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

365

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Chien, Andrew A.

366

[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches  

Science Conference Proceedings (OSTI)

In this paper, we suggest handling security in embedded systems by introducing a small architectural change. We propose the use of a non-deterministic branch instruction to generate non-determinism in the execution of encryption algorithms. Non-determinism ... Keywords: embedded system security, side-channel attacks, hiding countermeasure

Pedro Malagon, Juan-Mariano de Goyeneche, Marina Zapater, Jose M. Moya

2010-01-01T23:59:59.000Z

367

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid is a new type of energy-based cyber physical system (CPS) that will provide reliable, secure, and efficient energy transmission and distribution. The way to secure the distributed energy routing process that efficiently utilizes the distributed ... Keywords: Smart grid, Distributed energy routing, False data injection attacks, Energy distribution

Jie Lin; Wei Yu; Xinyu Yang; Guobin Xu; Wei Zhao

2012-04-01T23:59:59.000Z

368

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

369

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain  

E-Print Network (OSTI)

In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and flow measure. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time. NS-2 network simulator on Linux platform is used as simulation testbed. Simulation results show that our proposed solution gives a drastic improvement in terms of detection rate and false positive rate. However, the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads as far as monitoring and analysis of traffic at single point connecting victim is concerned. To address this problem, a distributed...

Gupta, B B; Misra, Manoj; 10.1145/1523103.1523203

2012-01-01T23:59:59.000Z

370

The Small and Silent Force Multiplier: A Swarm UAV--Electronic Attack  

Science Conference Proceedings (OSTI)

At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) ... Keywords: Electronic attack, Electronic warfare, Swarm UAV, UAS, UAV, Unmanned Aircraft Systems, Unmanned aerial vehicle

Polat Cevik; Ibrahim Kocaman; Abdullah S. Akgul; Barbaros Akca

2013-04-01T23:59:59.000Z

371

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation  

E-Print Network (OSTI)

Frequency and intensity of Internet attacks are rising with an alarming pace. Several technologies and concepts were proposed for fighting distributed denial of service (DDoS) attacks: traceback, pushback, i3, SOS and Mayday. This paper shows that in the case of DDoS reflector attacks they are either ineffective or even counterproductive. We then propose a novel concept and system that extends the control over network traffic by network users to the Internet using adaptive traffic processing devices. We safely delegate partial network management capabilities from network operators to network users. All network packets with a source or destination address owned by a network user can now also be controlled within the Internet instead of only at the network user's Internet uplink. By limiting the traffic control features and by restricting the realm of control to the "owner" of the traffic, we can rule out misuse of this system. Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, new ways of collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.

Thomas Dübendorfer; Matthias Bossardt; Bernhard Plattner

2005-01-01T23:59:59.000Z

372

Contactless electromagnetic active attack on ring oscillator based true random number generator  

Science Conference Proceedings (OSTI)

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some ... Keywords: EM injections, IEMI, TRNGs, active attacks, ring oscillators

Pierre Bayon; Lilian Bossuet; Alain Aubert; Viktor Fischer; François Poucheret; Bruno Robisson; Philippe Maurine

2012-05-01T23:59:59.000Z

373

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

374

Regulating Greenhouse Gas 'Leakage': How California Can Evade the Impending Constitutional Attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation. (author)

Potts, Brian H.

2006-06-15T23:59:59.000Z

375

Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

Brian H. Potts

2006-06-15T23:59:59.000Z

376

Rack Protection Monitor  

DOE Patents (OSTI)

A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

Orr, Stanley G.

1998-10-21T23:59:59.000Z

377

Rack protection monitor  

DOE Patents (OSTI)

A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

Orr, Stanley G. (Wheaton, IL)

2000-01-01T23:59:59.000Z

378

The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure  

SciTech Connect

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

2006-08-28T23:59:59.000Z

379

Notices ENVIRONMENTAL PROTECTION AGENCY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

076 Federal Register 076 Federal Register / Vol. 77, No. 250 / Monday, December 31, 2012 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9006-8] Notice of Intent: Designation of an Expanded Ocean Dredged Material Disposal Site (ODMDS) off Charleston, South Carolina AGENCY: U.S. Environmental Protection Agency (EPA) Region 4. ACTION: Notice of Intent to prepare an Environmental Assessment (EA) for the designation of an expanded ODMDS off Charleston, South Carolina. Purpose: EPA has the authority to designate ODMDSs under Section 102 of the Marine Protection, Research and Sanctuaries Act of 1972 (33 U.S.C. 1401 et seq.). It is EPA's policy to prepare a National Environmental Policy Document for all ODMDS designations (63 FR 58045, October 1998). FOR FURTHER INFORMATION, TO

380

Notices ENVIRONMENTAL PROTECTION AGENCY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22 Federal Register 22 Federal Register / Vol. 75, No. 103 / Friday, May 28, 2010 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9156-1] Office of Research and Development; Ambient Air Monitoring Reference and Equivalent Methods: Designation of One New Equivalent Method AGENCY: Environmental Protection Agency. ACTION: Notice of the designation of one new equivalent method for monitoring ambient air quality. SUMMARY: Notice is hereby given that the Environmental Protection Agency (EPA) has designated, in accordance with 40 CFR Part 53, one new equivalent method for measuring concentrations of lead (Pb) in total suspended particulate matter (TSP) in the ambient air. FOR FURTHER INFORMATION CONTACT: Surender Kaushik, Human Exposure and Atmospheric Sciences Division (MD-D205-03), National Exposure

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

River Protection.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

cc: cc: DOE/IG-0506 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS I N S P E C T I O N O F SELECTED ASPECTS OF THE OFFICE OF RIVER PROTECTION PERFORMANCE-BASED INCENTIVE PROGRAM JUNE 2001 U.S. DEPARTMENT OF ENERGY Washington, DC 20585 June 14, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Selected Aspects of the Office of River Protection Performance-Based Incentive Program" BACKGROUND The Office of River Protection (ORP), which reports to the Office of Environmental Management, is responsible for remediation of the radioactive waste stored in tanks at the Hanford Site in the State of Washington. For Fiscal Year (FY) 2000, ORP established 26 performance-based contract

382

Microscope collision protection apparatus  

DOE Patents (OSTI)

A microscope collision protection apparatus for a remote control microscope which protects the optical and associated components from damage in the event of an uncontrolled collision with a specimen, regardless of the specimen size or shape. In a preferred embodiment, the apparatus includes a counterbalanced slide for mounting the microscope's optical components. This slide replaces the rigid mounts on conventional upright microscopes with a precision ball bearing slide. As the specimen contacts an optical component, the contacting force will move the slide and the optical components mounted thereon. This movement will protect the optical and associated components from damage as the movement causes a limit switch to be actuated, thereby stopping all motors responsible for the collision.

DeNure, Charles R. (Pocatello, ID)

2001-10-23T23:59:59.000Z

383

Critical Foundations: Protecting America's Infrastructures  

Science Conference Proceedings (OSTI)

Page 1. CRITICAL FOUNDATIONS PROTECTING AMERICA'S INFRASTRUCTURES The Report of the President's Commission ...

384

Environmental Protection Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Details Site Details EPD Home Staff List (pdf) Org Chart (pdf) Compliance / Permits Programs Other Information Land Use & Institutional Controls Mapping Site Environmental Reports Environmental Monitoring Plan (EMP) Spill Response BNL Site Index Can't View PDFs? Developing Environmental Products and Services for Brookhaven Stakeholders The Environmental Protection Division (EPD) develops and delivers environmental products and services for all Brookhaven stakeholders. We manage environmental programs such as pollution prevention, groundwater protection, and natural resource management; provide technical assistance on environmental requirements; maintain the Laboratory's IS0 14001-registered Environmental Management System; prepare environmental permit applications; conduct environmental monitoring; manage data

385

Environmental Protection Implementation Plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. This report focuses on the following: notification of environmental occurrences; general planning and reporting; special programs and plans; environmental monitoring program; and quality assurance and data verification.

Brekke, D.D.

1995-11-01T23:59:59.000Z

386

Environmental protection implementation plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

Holland, R.C.

1998-03-01T23:59:59.000Z

387

Surface Protection for Enhanced Materials Performance: Science ...  

Science Conference Proceedings (OSTI)

Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested by Gas- Turbine ...

388

Armored garment for protecting  

SciTech Connect

A lightweight, armored protective garment for protecting an arm or leg from blast superheated gases, blast overpressure shock, shrapnel, and spall from a explosive device, such as a Rocket Propelled Grenade (RPG) or a roadside Improvised Explosive Device (IED). The garment has a ballistic sleeve made of a ballistic fabric, such as an aramid fiber (e.g., KEVLAR.RTM.) cloth, that prevents thermal burns from the blast superheated gases, while providing some protection from fragments. Additionally, the garment has two or more rigid armor inserts that cover the upper and lower arm and protect against high-velocity projectiles, shrapnel and spall. The rigid inserts can be made of multiple plies of a carbon/epoxy composite laminate. The combination of 6 layers of KEVLAR.RTM. fabric and 28 plies of carbon/epoxy laminate inserts (with the inserts being sandwiched in-between the KEVLAR.RTM. layers), can meet the level IIIA fragmentation minimum V.sub.50 requirements for the US Interceptor Outer Tactical Vest.

Purvis, James W. (Albuquerque, NM); Jones, II, Jack F. (Albuquerque, NM); Whinery, Larry D. (Albuquerque, NM); Brazfield, Richard (Albuquerque, NM); Lawrie, Catherine (Tijeras, NM); Lawrie, David (Tijeras, NM); Preece, Dale S. (Watkins, CO)

2009-08-11T23:59:59.000Z

389

National Infrastructure Protection Plan  

E-Print Network (OSTI)

this context, our critical infrastructure and key resources (CIKR) may be directly exposed to the event themselves or indirectly exposed as a result of the dependencies and interde- pendencies among CIKR. Within the CIKR protection mission area, national priorities must include preventing catastrophic loss of life

Sen, Pradeep

390

Fish passage and protection  

DOE Green Energy (OSTI)

This report consists of reprints on fish passage and protection topics from: American Fisheries Society; American Society of Civil Engineers; Harza Engineering Company; Hydro Review Magazine; Idaho National Engineering Laboratory; Independent Energy Magazine; National Hydropower Association; Northwest Hydroelectric Association; United States Army Corps of Engineers; United States Committee on large dams; and the United States Department of the Interior.

Rinehart, B.N.

1993-11-01T23:59:59.000Z

391

A Surface Protective System  

SciTech Connect

Part of the design and development work connected with the erection of the chemistry "cave" in the "GP" Building entailed an investigation of various protective measures for materials of construction. This work was based on the observations and recommendations of personnel engaged in work at a similar installation at Argonne National Laboratory.

Brown, W. T.

1950-11-01T23:59:59.000Z

392

Thermal protection apparatus  

DOE Patents (OSTI)

An apparatus which thermally protects sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components to a heat sink such as ice.

Bennett, Gloria A. (Los Alamos, NM); Elder, Michael G. (Los Alamos, NM); Kemme, Joseph E. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

393

Thermal protection apparatus  

DOE Patents (OSTI)

The disclosure is directed to an apparatus for thermally protecting sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components such as electronics to a heat sink such as ice.

Bennett, G.A.; Elder, M.G.; Kemme, J.E.

1984-03-20T23:59:59.000Z

394

An Analysis of the Economic and Financial Life-Cycle Costs of Reverse-Osmosis Desalination in South Texas: A Case Study of the Southmost Facility  

E-Print Network (OSTI)

Desalination provides a supply alternative for potable water for many communities, along with possible defenses against security threats potentially affecting clean water supplies. The economic and financial life-cycle costs associated with building and operating the Southmost desalination facility (near Brownsville, TX) in South Texas are investigated using the spreadsheet model DESAL ECONOMICS©. Primary data key to this analysis include actual initial construction costs, annual continued costs (i.e., for source-water acquisition and transport, pretreatment, purification, and delivery), capital replacement expenses, and desalination-process parameters. The input data used reflect the unique location and quality of source water, process-flow design, asset selection and configuration, management structure, local cost rates, and employed operational methods unique to the Southmost facility. Thus, the specific results are only applicable to the Southmost facility for a specific time, but do provide useful information and insight into life-cycle costs for public and commercial desalination facilities in a more general sense. Annuity equivalent costs are reported (on both a $/acre-foot (ac-ft) and $/1,000 gallons of finished water basis, f.o.b. (free on board) municipal delivery point) for seven individual operational/expense areas, as well as for the entire desalination facility. Results are also presented across different cost types, categories, and items. The baseline results are deterministic, but are expanded to include sensitivity analyses of useful life, initial construction costs, annual energy costs, and production efficiency rate, amongst others. The current estimated total annual life-cycle costs (in 2006 dollars) to produce and deliver desalinated water to a point in the municipal delivery-system infrastructure for the Southmost facility are $769.62/ac-ft {$2.3619/1,000 gal.}. These baseline estimates apply to the Southmost facility and are sensitive to changes in the production efficiency level, and costs incurred for energy, chemicals, initial construction, etc. Also, results indicate significant outlays, beyond those of Initial Construction, are involved with desalination. For the Southmost facility, when a commitment was made to build a facility for $26.2 million, an implicit commitment for another $39.1 million (basis 2006 dollars) was also made for Continued and Capital Replacement costs. Investigation into life-cycle costs during the design and planning stages of a desalination facility can assist with determining the least-cost asset configuration to adopt and operational methods to employ. Also included are modifications to certain key data-input parameters that provide ‘modified results’ which facilitate a more fair basis of comparing facilities and/or technologies. The modified results, which are considered appropriate to use when comparing to similarlycalculated values (for other facilities or technologies), are $615.01/ac-ft/yr {$1.8874/1,000 gal./yr} (basis 2006 dollars).

Sturdivant, A.; Rister, M.; Rogers, C.; Lacewell, R.; Norris, J.; Leal, J.; Garza, J.; Adams, J.

2009-09-01T23:59:59.000Z

395

Consumer life-cycle cost impacts of energy-efficiency standards for residential-type central air conditioners and heat pumps  

SciTech Connect

In support of the federal government's efforts to raise the minimum energy-efficiency standards for residential-type central air conditioners and heat pumps, a consumer life-cycle cost (LCC) analysis was conducted to demonstrate the economic impacts on individual consumers from revisions to the standards. LCC is the consumer's cost of purchasing and installing an air conditioner or heat pump and operating the unit over its lifetime. The LCC analysis is conducted on a nationally representative sample of air conditioner and heat pump consumers resulting in a distribution of LCC impacts showing the percentage of consumers that are either benefiting or being burdened by increased standards. Relative to the existing minimum efficiency standard of 10 SEER, the results show that a majority of split system air conditioner and heat pump consumers will either benefit or be insignificantly impacted by increased efficiency standards of up to 13 SEER.

Rosenquist, Gregory; Chan, Peter; Lekov, Alex; McMahon, James; Van Buskirk, Robert

2001-10-10T23:59:59.000Z

396

Protection Against Ionizing Radiation in Extreme Radiation ...  

Science Conference Proceedings (OSTI)

Protection Against Ionizing Radiation in Extreme Radiation-resistant Microorganisms. ... Elucidated radiation protection by intracellular halides. ...

2013-05-01T23:59:59.000Z

397

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks  

E-Print Network (OSTI)

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Padmavathi, Dr G

2009-01-01T23:59:59.000Z

398

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)  

E-Print Network (OSTI)

Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

CERN. Geneva

2012-01-01T23:59:59.000Z

399

Superconducting coil protection  

SciTech Connect

The protection system is based on a two-phase construction program. Phase I is the development of a reliable hardwired relay control system with a digital loop utilizing firmware and a microprocessor controller. Phase II is an expansion of the digital loop to include many heretofore unmonitored coil variables. These new monitored variables will be utilized to establish early quench detection and to formulate confirmation techniques of the quench detection mechanism. Established quench detection methods are discussed and a new approach to quench detection is presented. The new circuit is insensitive to external pulsed magnetic fields and the associated induced voltages. Reliability aspects of the coil protection system are discussed with respect to shutdowns of superconducting coil systems. Redundance and digital system methods are presented as related topics. (auth)

Woods, E.L.

1975-01-01T23:59:59.000Z

400

Protective Coatings Assessment  

Science Conference Proceedings (OSTI)

It is well known that fireside corrosion of waterwall panels in coal-fired boilers increased with the introduction of low NOx combustion systems since the early 1980s. This report describes ongoing work to evaluate protective coating solutions used to mitigate the wastage due to corrosion, and to determine which provide the greatest resistance to the circumferential cracking phenomena. It includes recent laboratory corrosion assisted thermal fatigue tests and analyses of field-exposed samples of ...

2012-12-17T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Radiation protection at CERN  

E-Print Network (OSTI)

This paper gives a brief overview of the general principles of radiation protection legislation; explains radiological quantities and units, including some basic facts about radioactivity and the biological effects of radiation; and gives an overview of the classification of radiological areas at CERN, radiation fields at high-energy accelerators, and the radiation monitoring system used at CERN. A short section addresses the ALARA approach used at CERN.

Forkel-Wirth, Doris; Silari, Marco; Streit-Bianchi, Marilena; Theis, Christian; Vincke, Heinz; Vincke, Helmut

2013-01-01T23:59:59.000Z

402

Protective Coatings Assessment  

Science Conference Proceedings (OSTI)

This report describes assessments of ceramic and thermal spray coatings that have advanced significantly or recently been marketed for use in the utility boiler industry to reduce slagging, mitigate fireside corrosion and potentially, circumferential cracking due to cyclic temperature variations. These innovations promise to enhance coating quality as well as reduce time and labor required to protect large areas of the boiler waterwalls. Coatings may also enable plants to improve production rates; thereb...

2011-12-22T23:59:59.000Z

403

Fire Protection Program: Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary Since May 1950, an Annual Fire Protection Program Summary has been submitted by DOE's fire protection community. Currently, this report is required by section 5a.(8) of DOE Order 231.1. "Environment, Safety and Health Reporting." In 1999, an automation initiative was undertaken to streamline data collection and provide a more through review of DOE Reporting Element activities. This action resulted in the delayed publications of the CY 1999 and 2000 reports until 2002. It is now possible however to view all Annual Summary Reporting Element responses since 1991 at the Site, Operations, Lead Program Secretarial Office and Headquarters levels. Additionally, a build-in reference to other DOE reporting activities (CAIRS and ORPS) is available that allows Reporting Elements and managers the opportunity to review all fire protection events along previously mentioned categories. Reports listed below were generated from this application. To obtain a copy of the Annual Summary Application please contact Jim Bisker in the Office of Nuclear and Facility Safety Policy (EH-53) at (301)903-6542 or Jim Bisker.

404

Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.  

SciTech Connect

ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ă?Â?Ă?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

D.R. Coyle; D.C. Booth: M.S. Wallace

2005-12-01T23:59:59.000Z

405

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

406

The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis  

SciTech Connect

This paper develops a bottom-up approach that focuses on behavioral responses in estimating the total economic impacts of the September 11, 2001, World Trade Center (WTC) attacks. The estimation includes several new features. First, is the collection of data on the relocation of firms displaced by the attack, the major source of resilience in muting the direct impacts of the event. Second, is a new estimate of the major source of impacts off-site -- the ensuing decline of air travel and related tourism in the U.S. due to the social amplification of the fear of terrorism. Third, the estimation is performed for the first time using Computable General Equilibrium (CGE) analysis, including a new approach to reflecting the direct effects of external shocks. This modeling framework has many advantages in this application, such as the ability to include behavioral responses of individual businesses and households, to incorporate features of inherent and adaptive resilience at the level of the individual decision maker and the market, and to gauge quantity and price interaction effects across sectors of the regional and national economies. We find that the total business interruption losses from the WTC attacks on the U.S. economy were only slightly over $100 billion, or less than 1.0% of Gross Domestic Product. The impacts were only a loss of $14 billion of Gross Regional Product for the New York Metropolitan Area.

Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois; Asay, Gary [University of Southern California

2009-01-01T23:59:59.000Z

407

Network protection with service guarantees  

E-Print Network (OSTI)

With the increasing importance of communication networks comes an increasing need to protect against network failures. Traditional network protection has been an "all-or-nothing" approach: after any failure, all network ...

Kuperman, Gregory

2013-01-01T23:59:59.000Z

408

Managed Programs, Environmental Protection Division  

NLE Websites -- All DOE Office Websites (Extended Search)

training and supporting subject matter expertise. Environmental Information Management System: storing, managing, verifying, protecting, retrieving and archiving BNL's...

409

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network (OSTI)

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

410

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune,  

E-Print Network (OSTI)

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune 55455 {pwang,tyra,dchantin,malchow,foo,hopper,kyd}@cs.umn.edu ABSTRACT The Kad network

Kim, Dae-Shik

411

Laundered protective clothing survey  

SciTech Connect

It is considered appropriate occasionally to make independent checks on the effectiveness of the plant laundry in removing radioactive contamination from plant-issue protective clothing. Previous surveys have offered constructive criticism resulting in improved handling of high level and soft beta contaminated clothing and incorporation in new designs of ventilating and air sampling recommendations. Recurrently the adequacy of laundry reject limits is questioned, and only recently an accurate, special study resulted in relaxed limits for Metal Preparation area clothing. A current question concerns the advisability of determining the reject level on the beta-gamma monitor more frequently than once a day. 2 tabs.

Clukey, H.V.

1952-10-15T23:59:59.000Z

412

Protective measures for personnel  

SciTech Connect

This document addresses radiation protection concerns for workers in the experimental laboratories and production plants where nuclear fission piles are being used. A broad in-depth discussion is provided based with the experiences gained in the Manhattan Project and being applied to contemporary activities. Discussion is thorough and encompasses control of external irradiations including alpha, beta, gamma, and neutron radiations; and control of radioactivity within the body by control of inhalation, ingestion, and entrance through skin or wounds. General measures for the control of radiation hazards is addressed by provision of clothing and waste disposal. An Appendix 1 is entitled General Rules and Procedures Concerning Activity Hazards.

Nickson, J.J.

1946-12-13T23:59:59.000Z

413

Hearing protection for miners  

Science Conference Proceedings (OSTI)

A NIOSH analysis showed that at age 50 approximately 90% of coal miners have a hearing impairment, yet noise included hearing loss is 100% preventable. The article discusses requirements of the MSHA regulations, 30 CFR Part 62 - occupational noise exposure (2000) and a 2008-MSHA document describing technologically achievable and promising controls for several types of mining machinery. Hearing protection is still required for exposure to greater than 90 dBA. These are now commercially available ways to determine how much attenuation an individual gets from a given hearing protector, known as 'fit testing'. 3 refs., 1 fig., 1 tab., 1 photo.

Schulz, T. [Sperian Hearing Protection (United States)

2008-10-15T23:59:59.000Z

414

Aquatic Habitat Protection Permit (Saskatchewan, Canada) | Open...  

Open Energy Info (EERE)

aID5044&FilenameAquatic+Habitat+Protection+Permit+Application.pdf&lEnglish Summary The Environmental Management and Protection Act, 2002 (EMPA) provides for the protection of...

415

Using GIS technology to manage information following a bio-terrorism attack.  

Science Conference Proceedings (OSTI)

The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

2005-05-01T23:59:59.000Z

416

Notices ENVIRONMENTAL PROTECTION AGENCY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94 Federal Register 94 Federal Register / Vol. 74, No. 209 / Friday, October 30, 2009 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-8798-8] Environmental Impact Statements and Regulations; Availability of EPA Comments Availability of EPA comments prepared pursuant to the Environmental Review Process (ERP), under section 309 of the Clean Air Act and Section 102(2)(c) of the National Environmental Policy Act as amended. Requests for copies of EPA comments can be directed to the Office of Federal Activities at 202-564-7146 or http://www.epa.gov/ compliance/nepa/. An explanation of the ratings assigned to draft environmental impact statements (EISs) was published in FR dated July 17, 2009 (74 FR 34754). Draft EISs EIS No. 20090290, ERP No. D-FTA- F54014-WI, Kenosha-Racine-Milwaukee

417

Thermal protection apparatus  

DOE Patents (OSTI)

An apparatus for thermally protecting heat sensitive components of tools. The apparatus comprises a Dewar holding the heat sensitive components. The Dewar has spaced-apart inside walls, an open top end and a bottom end. A plug is located in the top end. The inside wall has portions defining an inside wall aperture located at the bottom of the Dewar and the outside wall has portions defining an outside wall aperture located at the bottom of the Dewar. A bottom connector has inside and outside components. The inside component sealably engages the inside wall aperture and the outside component sealably engages the outside wall aperture. The inside component is operatively connected to the heat sensitive components and to the outside component. The connections can be made with optical fibers or with electrically conducting wires.

Bennett, G.A.; Moore, T.K.

1986-08-20T23:59:59.000Z

418

Environmental Protection Agency  

Office of Legacy Management (LM)

Protection Agency Protection Agency . . Book, 4 Project Rulison Off-Site Surveillance Operation for the Flaring Period - October 26 - November 3, 1970 DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available original document. P r e l i m i n a r y Report March 1 0 , 1 9 7 1 PROJECT RULISON OFF-SITE ' SURVEILLANCE FOR THE E'LARING OPERATION OF OCTOBER 26 - November 3, 1970 S o u t h w e s t e r n R a d i o l o g i c a l H e a l t h Laboratqry ~ u g i n g . . . t h e p e r i o d of O c t o b e r 26' through November 3 , ,1970, n a t u r a l g a s f r o m -.._. -- . . t h e P r o j e c t R u l i s o n t e s t w e l l was f l a r e d f o r t h e h i g h - r a t e p r o d u c t i o n f l a r i n g t e s t . . The' f l a r i n g o p e r a t i o n was s t a r t e d , a t 1430 M!5T on October 2 6 , 1970. The g a s flow r a t e w a s i n c r e a s e d o v e r a six-hour p

419

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

420

Cavern Protection (Texas) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administration Other Agencies You are here Home Savings Cavern Protection (Texas) Cavern Protection (Texas) Eligibility Utility Fed. Government Commercial...

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Office of Environmental Protection, Sustainability Support &...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Protection, Sustainability Support & Corporate Safety Analysis Office of Environmental Protection, Sustainability Support & Corporate Safety Analysis Organizational...

422

Canadian Environmental Protection Act 2012 (Canada) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Canadian Environmental Protection Act 2012 (Canada) Canadian Environmental Protection Act 2012 (Canada) Eligibility Agricultural Commercial Construction Developer Fed. Government...

423

Protected Planet | Open Energy Information  

Open Energy Info (EERE)

Protected Planet Protected Planet Jump to: navigation, search Tool Summary Name: Protected Planet Agency/Company /Organization: United Nations Environment Programme (UNEP), International Union for Conservation of Nature Sector: Energy, Land Topics: Co-benefits assessment, - Environmental and Biodiversity Resource Type: Dataset, Maps, Software/modeling tools User Interface: Website Website: protectedplanet.net/about Cost: Free Protected Planet Screenshot References: Protected Planet[1] "Be inspired by the most beautiful places on the planet. Explore the worlds national parks, wilderness areas and world heritage sites. Help us find and improve information on every protected area in the world. Protectedplanet.net lets you discover these incredible places through elegant mapping and intuitive searching. Protectedplanet.net wants you to

424

Comparative analysis of the production costs and life-cycle GHG emissions of FT liquid fuels from coal and natural gas  

SciTech Connect

Liquid transportation fuels derived from coal and natural gas could help the United States reduce its dependence on petroleum. The fuels could be produced domestically or imported from fossil fuel-rich countries. The goal of this paper is to determine the life-cycle GHG emissions of coal- and natural gas-based Fischer-Tropsch (FT) liquids, as well as to compare production costs. The results show that the use of coal- or natural gas-based FT liquids will likely lead to significant increases in greenhouse gas (GHG) emissions compared to petroleum-based fuels. In a best-case scenario, coal- or natural gas-based FT-liquids have emissions only comparable to petroleum-based fuels. In addition, the economic advantages of gas-to-liquid (GTL) fuels are not obvious: there is a narrow range of petroleum and natural gas prices at which GTL fuels would be competitive with petroleum-based fuels. CTL fuels are generally cheaper than petroleum-based fuels. However, recent reports suggest there is uncertainty about the availability of economically viable coal resources in the United States. If the U.S. has a goal of increasing its energy security, and at the same time significantly reducing its GHG emissions, neither CTL nor GTL consumption seem a reasonable path to follow. 28 refs., 2 figs., 4 tabs.

Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (USA). Civil and Environmental Engineering Department

2008-10-15T23:59:59.000Z

425

Comparisons of four categories of waste recycling in China's paper industry based on physical input-output life-cycle assessment model  

SciTech Connect

Highlights: Black-Right-Pointing-Pointer Using crop straws and wood wastes for paper production should be promoted. Black-Right-Pointing-Pointer Bagasse and textile waste recycling should be properly limited. Black-Right-Pointing-Pointer Imports of scrap paper should be encouraged. Black-Right-Pointing-Pointer Sensitivity analysis, uncertainties and policy implications are discussed. - Abstract: Waste recycling for paper production is an important component of waste management. This study constructs a physical input-output life-cycle assessment (PIO-LCA) model. The PIO-LCA model is used to investigate environmental impacts of four categories of waste recycling in China's paper industry: crop straws, bagasse, textile wastes and scrap paper. Crop straw recycling and wood utilization for paper production have small total intensity of environmental impacts. Moreover, environmental impacts reduction of crop straw recycling and wood utilization benefits the most from technology development. Thus, using crop straws and wood (including wood wastes) for paper production should be promoted. Technology development has small effects on environmental impacts reduction of bagasse recycling, textile waste recycling and scrap paper recycling. In addition, bagasse recycling and textile waste recycling have big total intensity of environmental impacts. Thus, the development of bagasse recycling and textile waste recycling should be properly limited. Other pathways for reusing bagasse and textile wastes should be explored and evaluated. Moreover, imports of scrap paper should be encouraged to reduce large indirect impacts of scrap paper recycling on domestic environment.

Liang Sai [School of Environment, State Key Joint Laboratory of Environment Simulation and Pollution Control, Tsinghua University, Beijing 100084 (China); Zhang, Tianzhu, E-mail: zhangtz@mail.tsinghua.edu.cn [School of Environment, State Key Joint Laboratory of Environment Simulation and Pollution Control, Tsinghua University, Beijing 100084 (China); Xu Yijian [School of Environment, State Key Joint Laboratory of Environment Simulation and Pollution Control, Tsinghua University, Beijing 100084 (China); China Academy of Urban Planning and Design, Beijing 100037 (China)

2012-03-15T23:59:59.000Z

426

Life-cycle cost comparisons of advanced storage batteries and fuel cells for utility, stand-alone, and electric vehicle applications  

DOE Green Energy (OSTI)

This report presents a comparison of battery and fuel cell economics for ten different technologies. To develop an equitable economic comparison, the technologies were evaluated on a life-cycle cost (LCC) basis. The LCC comparison involved normalizing source estimates to a standard set of assumptions and preparing a lifetime cost scenario for each technology, including the initial capital cost, replacement costs, operating and maintenance (O M) costs, auxiliary energy costs, costs due to system inefficiencies, the cost of energy stored, and salvage costs or credits. By considering all the costs associated with each technology over its respective lifetime, the technology that is most economical to operate over any given period of time can be determined. An analysis of this type indicates whether paying a high initial capital cost for a technology with low O M costs is more or less economical on a lifetime basis than purchasing a technology with a low initial capital cost and high O M costs. It is important to realize that while minimizing cost is important, the customer will not always purchase the least expensive technology. The customer may identify benefits associated with a more expensive option that make it the more attractive over all (e.g., reduced construction lead times, modularity, environmental benefits, spinning reserve, etc.). The LCC estimates presented in this report represent three end-use applications: utility load-leveling, stand-alone power systems, and electric vehicles.

Humphreys, K.K.; Brown, D.R.

1990-01-01T23:59:59.000Z

427

Protective Force Firearms Qualification Courses  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PROTECTIVE FORCE PROTECTIVE FORCE FIREARMS QUALIFICATION COURSES U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security AVAILABLE ONLINE AT: INITIATED BY: http://www.hss.energy.gov Office of Health, Safety and Security Protective Force Firearms Qualification Courses July 2011 i TABLE OF CONTENTS SECTION A - APPROVED FIREARMS QUALIFICATION COURSES .......................... I-1 CHAPTER I . INTRODUCTION ................................................................................... I-1 1. Scope .................................................................................................................. I-1 2. Content ............................................................................................................... I-1

428

Trust Anchor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adrian R Chavez Adrian R Chavez Sandia National Laboratories Protecting PCS against Lifecycle Attacks Using Trust Anchors Summary Slide: Trust Anchors / Code Seal  Outcomes: Trust Anchor technology enables new security strategies addressing lifecycle attacks for which there are currently no relevant defenses  Roadmap Challenge: Develop and Integrate Protective Measures  Major Successes: Implemented and improved performance of trust anchor algorithms and implementation  Schedule: Implement Trust Anchors 3/10; Performance Testing/Prototype 8/10; Scenario Development 1/11; Vulnerability Assessment 3/11  Level of Effort: $400K  Funds Remaining: $257K  Performers: SNL  Partners: Exploring industry opportunities to commercialize technology CodeSeal CodeSeal

429

Florida Radiation Protection Act (Florida)  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Public Health is responsible for administering a statewide radiation protection program. The program is designed to permit development and utilization of sources of radiation for...

430

Fire Protection Program: Related Sites  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Science Brookhaven National Laboratory Hanford Fire Department CPSC OSHA NRC EPA FEMA National Fire Academy Fire Protection Association Australia National Fire...

431

NIST Issues Guidelines to Protect First Responders Exposed ...  

Science Conference Proceedings (OSTI)

... Commerce Department's National Institute of Standards and Technology (NIST) is ... to a chemical, biological, radiological or nuclear—CBRN—attack ...

2012-12-13T23:59:59.000Z

432

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

SciTech Connect

This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

2009-11-15T23:59:59.000Z

433

Protecting FWP Participant Personally Identifiable Information/Protected  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting FWP Participant Personally Identifiable Protecting FWP Participant Personally Identifiable Information/Protected Health Information Protecting FWP Participant Personally Identifiable Information/Protected Health Information The confidentiality and privacy rights of former workers are not only a legal requirement, they are crucial to establishing and maintaining credibility with the former worker community. All medical information that is collected as part of this program is treated as confidential and is used only as allowed by the Privacy Act of 1974. All FWP activities are conducted with the approval of the Institutional Review Boards, or Human Subjects Committees, of DOE and involved universities. All individuals sign an informed consent and Health Insurance Portability and Accountability Act

434

Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments  

DOE Green Energy (OSTI)

Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

1993-09-01T23:59:59.000Z

435

Adaptive protection algorithm and system  

Science Conference Proceedings (OSTI)

An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

Hedrick, Paul (Pittsburgh, PA); Toms, Helen L. (Irwin, PA); Miller, Roger M. (Mars, PA)

2009-04-28T23:59:59.000Z

436

Corrosion protection for silver reflectors  

DOE Patents (OSTI)

A method of protecting silver reflectors from damage caused by contact with gaseous substances which are often present in the atmosphere and a silver reflector which is so protected. The inventive method comprises at least partially coating a reflector with a metal oxide such as aluminum oxide to a thickness of 15 {angstrom} or less. 6 figs.

Arendt, P.N., Scott, M.L.

1989-10-04T23:59:59.000Z

437

Corrosion protection for silver reflectors  

SciTech Connect

A method of protecting silver reflectors from damage caused by contact with gaseous substances which are often present in the atmosphere and a silver reflector which is so protected. The inventive method comprises at least partially coating a reflector with a metal oxide such as aluminum oxide to a thickness of 15 .ANG. or less.

Arendt, Paul N. (Los Alamos, NM); Scott, Marion L. (Los Alamos, NM)

1991-12-31T23:59:59.000Z

438

Data Protection Office October 2010  

E-Print Network (OSTI)

Data Protection Office October 2010 AUTHORISATION FORM FOR DATA PROCESSING BY STUDENTS This form should be completed where students are processing personal data for research or study purposes. In order to meet the requirements of the Data Protection Act 1998 and ensure the personal data is being processed

Mottram, Nigel

439

Substation control and protection project  

SciTech Connect

This report describes the results of EPRI-sponsored Project RP1359-7, dealing with digital protection and control of transmission class substations. Earlier work involved a study of the feasibility of an integrated protection and control system, specification of functional requirements and selection of the optimum architecture for the system. An integrated system including line, bus and transformer protection was designed, built and laboratory tested. It was subsequently installed at the Deans substation of Public Service Electric and Gas (New Jersey). A standalone, digital transmission line system was built and installed at the Branchburg substation of PSE G, for coordinated line protection with the integrated system. The system is called WESPAC, an acronym for Westinghouse Substation Protection and Control. 52 refs., 174 figs.

Cassel, R.L.; Deliyannides, J.S.; Dzieduszko, J.W.; Harvey, J.H.; Hertz, L.H.; Klancher, F.; Mays, L.M.; McGarry, M.J.; Pettis, L.G.; Pistolese, L.F.; Reuther, J.F.; Sackin, M.; Szarmach, D.J.; Udren, E.A. (Westinghouse ABB Power T and D Co., Coral Springs, FL (USA). Relay and Telecommunications Div.)

1990-04-01T23:59:59.000Z

440

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

NLE Websites -- All DOE Office Websites (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

442

Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism  

E-Print Network (OSTI)

A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

443

On wormhole attacks in underwater sensor networks: A two-tier localization approach  

E-Print Network (OSTI)

Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper we show that underwater denial-of-service attack imposes great threats to any UWSN. Without proper countermeasures, underwater sensor networking is a mission impossible. We propose a localization based approach to answer the challenge. In our design, DUB and DDB, a pair of efficient single-round distance measuring schemes, are critical building blocks to realize our approach inspite of constrained node capability and floating node mobility. In addition, to cope with low/medium node mobiltiy, we propose a two-tier localization scheme to identify short-range wormholes instantly, and long-haul wormholes within a limited latency. Our simulation and implementation confirm the effectiveness of our design. I.

Jiejun Kong; Zhengrong Ji; Weichao Wang; Mario Gerla; Rajive Bagrodia

2004-01-01T23:59:59.000Z

444

Life-Cycle Cost and Risk Analysis of Alternative Configurations for Shipping Low-Level Radioactive Waste to the Nevada Test Site  

SciTech Connect

The Nevada Test Site (NTS) is a major receiver of low-level radioactive waste (LLW) for disposal. Currently, all LLW received at NTS is shipped by truck. The trucks use highway routes to NTS that pass through the Las Vegas Valley and over Hoover Dam, which is a concern of local stakeholder groups in the State of Nevada. Rail service offers the opportunity to reduce transportation risks and costs, according to the Waste Management Programmatic Environmental Impact Statement (WM-PEIS). However, NTS and some DOE LLW generator sites are not served with direct rail service so intermodal transport is under consideration. Intermodal transport involves transport via two modes, in this case truck and rail, from the generator sites to NTS. LLW shipping containers would be transferred between trucks and railcars at intermodal transfer points near the LLW generator sites, NTS, or both. An Environmental Assessment (EA)for Intermodal Transportation of Low-Level Radioactive Waste to the Nevada Test Site (referred to as the NTSIntermodal -M) has been prepared to determine whether there are environmental impacts to alterations to the current truck routing or use of intermodal facilities within the State of Nevada. However, an analysis of the potential impacts outside the State of Nevada are not addressed in the NTS Intermodal EA. This study examines the rest of the transportation network between LLW generator sites and the NTS and evaluates the costs, risks, and feasibility of integrating intermodal shipments into the LLW transportation system. This study evaluates alternative transportation system configurations for NTS approved and potential generators based on complex-wide LLW load information. Technical judgments relative to the availability of DOE LLW generators to ship from their sites by rail were developed. Public and worker risk and life-cycle cost components are quantified. The study identifies and evaluates alternative scenarios that increase the use of rail (intermodal where needed) to transport LLW from generator sites to NTS.

PM Daling; SB Ross; BM Biwer

1999-12-17T23:59:59.000Z

445

Fire Protection Account Request Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fire Protection System Account Request Form Fire Protection System Account Request Form To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to hssUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your

446

Physical protection of power reactors  

SciTech Connect

Sandia Laboratories has applied a systematic approach to designing physical protection systems for nuclear facilities to commercial light-water reactor power plants. A number of candidate physical protection systems were developed and evaluated. Focus is placed on the design of access control subsystems at each of three plant layers: the protected area perimeter, building surfaces, and vital areas. Access control refers to barriers, detectors, and entry control devices and procedures used to keep unauthorized personnel and contraband out of the plant, and to control authorized entry into vital areas within the plant.

Darby, J.L.

1979-01-01T23:59:59.000Z

447

FAQS Reference Guide –Radiation Protection  

Energy.gov (U.S. Department of Energy (DOE))

This reference guide has been developed to address the competency statements in the December 2003 edition of DOE-STD-1174-2003, Radiation Protection Functional Area Qualification Standard.

448

Vintage Capital and Creditor Protection  

E-Print Network (OSTI)

We provide novel evidence linking the level of creditor protection provided by law to the degree of usage of technologically older, vintage capital in the airline industry. Using a panel of aircraft-level data around the ...

Benmelech, Efraim

449

LBNL/ Adopt Fall Protection Program  

NLE Websites -- All DOE Office Websites (Extended Search)

is the Company Letter Certification Template to address if your company has decided to work under LBNL fall protection program. See attached Chapter 30 of our program of PUB...

450

The costs of environmental protection  

E-Print Network (OSTI)

Recently, some have argued that tougher environmental policies can create jobs, stimulate innovation, and enhance competitiveness. On this view, economic side effects make environmental protection a sort of green free ...

Schmalensee, Richard

1993-01-01T23:59:59.000Z

451

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

452

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

Science Conference Proceedings (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

453

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

454

Energy Department and Environmental Protection Agency Release...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Protection Agency Release Fuel Economy Tool for Used Vehicles Energy Department and Environmental Protection Agency Release Fuel Economy Tool for Used Vehicles...

455

Changes related to "Environmentally Protective Power Generation...  

Open Energy Info (EERE)

page on Facebook icon Twitter icon Changes related to "Environmentally Protective Power Generation EPPG" Environmentally Protective Power Generation EPPG Jump to:...

456

10 CFR 835- Occupational Radiation Protection  

Energy.gov (U.S. Department of Energy (DOE))

The rules in this part establish radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of DOE activities.

457

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

458

Code of Federal Regulations OCCUPATIONAL RADIATION PROTECTION  

Energy.gov (U.S. Department of Energy (DOE))

The rules in this part establish radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of DOE activities.

459

Environmental Management and Protection Act, 2010 (Saskatchewan)  

Energy.gov (U.S. Department of Energy (DOE))

The Environmental Management and Protection Act of 2010 protects air, land, water resources and ecosystems of the province by managing and regulating potentially harmful activities and substances....

460

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

Standards for Critical Infrastructure Protection. Docket RMStandards for Critical Infrastructure Protection. Docket RM2- 13; GAO. ?Critical Infrastructure Protection: Multiple

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998,  

E-Print Network (OSTI)

Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998, which is based on the European Data Protection Directive. The 1998 Act applies to both manual for privacy and access by individuals. Information on how to make a request for access to personal data under

Priestley, Hilary

462

Fire initiation and spread in urban areas due to nuclear attack  

SciTech Connect

Calculation of fire development in urban areas is a critical step in estimating the global effects of nuclear warfare with regard to smoke production and transport. As part of the first phase of a program to improve our ability to calculate fire starts and spread in urban areas, we have performed a parameter sensitivity analysis using the three codes originally developed for civil defense planning by the IIT Research Institute. We have added graphics and made slight improvements to the codes and applied them to the representation of the San Jose urban area used in the Five-City Study of the late 1960s. For a chosen reference attack scenario, we have varied parameters and compared the results to those of a representative baseline case. The parameters varied included: atmospheric visibility, lowest of the various critical ignition energies of window coverings, shading of windows by trees and awnings, extent of blast extinguishment of fires, secondary ignitions, window glass transmittance, specific firebrand generation rate, firebrand distribution range, windspeed, building densities, specific fuel loadings, and window sizes. 13 references, 10 figures, 5 tables.

Reitter, T.A.; Takata, A.N.; Kang, S.W.

1984-09-01T23:59:59.000Z

463

Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks  

Science Conference Proceedings (OSTI)

This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

2010-01-14T23:59:59.000Z

464

Connecting to the Internet Securely; Protecting Home Networks CIAC-2324  

SciTech Connect

With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

Orvis, W J; Krystosek, P; Smith, J

2002-11-27T23:59:59.000Z

465

Surface Protection for Enhanced Materials Performance: Science ...  

Science Conference Proceedings (OSTI)

About this Symposium. Meeting, Materials Science & Technology 2013. Symposium, Surface Protection for Enhanced Materials Performance: Science, ...

466

Protecting users of the cyber commons  

Science Conference Proceedings (OSTI)

Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.

Stephen J. Lukasik

2011-09-01T23:59:59.000Z

467

1993 Radiation Protection Workshop: Proceedings  

SciTech Connect

The 1993 DOE Radiation Protection Workshop was conducted from April 13 through 15, 1993 in Las Vegas, Nevada. Over 400 Department of Energy Headquarters and Field personnel and contractors from the DOE radiological protection community attended the Workshop. Forty-nine papers were presented in eleven separate sessions: Radiological Control Manual Implementation, New Approaches to Instrumentation and Calibration, Radiological Training Programs and Initiatives, External Dosimetry, Internal Dosimetry, Radiation Exposure Reporting and Recordkeeping, Air Sampling and Monitoring Issues, Decontamination and Decommissioning of Sites, Contamination Monitoring and Control, ALARA/Radiological Engineering, and Current and Future Health Physics Research. Individual papers are indexed separately on the database.

Not Available

1993-12-31T23:59:59.000Z

468

Independent Activity Report, Washington River Protection Solutions -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Washington River Protection Solutions Washington River Protection Solutions - September 2010 Independent Activity Report, Washington River Protection Solutions - September 2010 September 2010 Participation in the Washington River Protection Solutions, LLC Integrated Safety Management System Annual Review The U.S. Department of Energy, Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), participated in the review of the Washington River Protection Solutions, LLC Integrated Safety Management System Annual Review for 2010. The review was conducted during the period of August 23 to September 2, 2010, and focused on six functional areas: corrective action management, work planning and control, radiological protection, environmental protection, emergency preparedness, and

469

Federal Energy Management Program: Environmental Protection Agency -  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Environmental Protection Agency - Edison, New Jersey to someone by E-mail Share Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Facebook Tweet about Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Twitter Bookmark Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Google Bookmark Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Delicious Rank Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Digg Find More places to share Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on AddThis.com... Energy-Efficient Products

470

Transforming Parks and Protected Areas  

E-Print Network (OSTI)

areas Lisa M. Campbell, Noella J. Gray; and Zoe A. Meletis In many countries, parks and protected areas construction of nature, conservation and development narratives, and alternative consumption - and what World' or 'developing' countries. One feature of political ecology has been an overriding emphasis

Bolch, Tobias

471

Cathodic protection diagnostic expert system  

Science Conference Proceedings (OSTI)

A knowledge-based diagnostic system has been developed for troubleshooting cathodic protection systems. The expert system is designed to work in conjunction with a database that stores inventory and field measurement information and flags problem areas. The system is described, and examples of troubleshooting using the system are presented.

Van Blaricum, V.L.; Kumar, A. (Army Construction Engineering Research Labs., Champaign, IL (United States)); Park, Y.T. (Soong Sil Univ., Seoul (Korea, Republic of). Dept. of Computer Science)

1994-12-01T23:59:59.000Z

472

Protect Your Heart Against Diabetes  

E-Print Network (OSTI)

Protect Your Heart Against Diabetes Healthy Hearts, Healthy Homes #12;Read other booklets in the Healthy Hearts, Healthy Homes series: Are You at Risk for Heart Disease? Do You Need To Lose Weight? Do Free Web site: www.nhlbi.nih.gov/health/public/heart/other/sp_package.htm For More Information

Bandettini, Peter A.

473

Coordinated Cyber-Physical Attacks, High-Impact Low-Frequency (HILF) Events, and Risk Management in the Electric Sector  

Science Conference Proceedings (OSTI)

Although the North American electricity grid is one of the most reliable power systems in the world, the high-impact low-frequency (HILF) class of rare but potentially catastrophically damaging events is of growing concern in the industry. This white paper summarizes key activities under two EPRI initiatives that address a HILF cyber-physical attack as well as risk assessment approaches and management tools relevant to a HILF event.EPRI’s Cyber Security and Privacy Program ...

2012-12-12T23:59:59.000Z

474

Summary of Analytical Electron Microscopy Observation of Intergranular Attack and Stress Corrosion Cracks in Alloy 600 Steam Generator Tubing  

Science Conference Proceedings (OSTI)

High-resolution analytical transmission electron microscopy (ATEM) can identify structures and compositions of corrosion products in attacked boundaries, cracks, and crack tips to help assess impurities that promote intergranular degradation. ATEM analyses has recently been performed on samples from Watts Bar 1 and Diablo Canyon 2 steam generator (SG) tubing and has revealed that lead (Pb) was involved in intergranular stress corrosion cracking (IGSCC). These new results in combination with previous resu...

2005-04-29T23:59:59.000Z

475

PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY  

Science Conference Proceedings (OSTI)

Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

Flach, G.

2009-12-11T23:59:59.000Z

476

Facility Targeting, Protection and Mission Decision Making Using the VISAC Code  

Science Conference Proceedings (OSTI)

The Visual Interactive Site Analysis Code (VISAC) is a Java-based graphical expert system developed by ORNL for the Defense Threat Reduction Agency, Nuclear Regulatory Commission (NRC) and other sponsors to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terroist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. used in conunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.

Morris, Robert Howard [ORNL; Sulfredge, Charles David [ORNL

2011-01-01T23:59:59.000Z

477

Shore Protection Act (Georgia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Shore Protection Act (Georgia) Shore Protection Act (Georgia) Shore Protection Act (Georgia) < Back Eligibility Commercial Construction Developer Industrial Investor-Owned Utility Transportation Utility Savings Category Water Buying & Making Electricity Program Info State Georgia Program Type Environmental Regulations Siting and Permitting Provider Georgia Department of Natural Resources The Shore Protection Act is the primary legal authority for protection and management of Georgia's shoreline features including sand dunes, beaches, sandbars, and shoals, collectively known as the sand-sharing system. The value of the sand-sharing system is recognized as vitally important in protecting the coastal marshes and uplands from Atlantic storm activity, as well as providing valuable recreational opportunities.

478

Groundwater Protection, Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Groundwater Groundwater placeholder DOE, BNL, elected officials, and community leaders mark the opening of the first off-site groundwater treatment system. From the outset, the Department of Energy (DOE) and the Brookhaven National Laboratory (BNL) considered the protection of human health to be the most important goal of the cleanup program. Because exposure to groundwater contamination had the greatest potential to impact human health, the focus was to ensure that local drinking water supplies were clean and safe. Early efforts concentrated on determining the locations of the contamination, installing treatment systems to clean up the groundwater, and remediating sources of contamination like landfills and underground tanks. DOE and the Lab are committed to protecting Long Island's sole-source aquifer, a vital natural resource.

479

Flash drying protects standby plants  

Science Conference Proceedings (OSTI)

This article describes how special fast-drying technique provides effective corrosion protection for units that will be in standby for a short time. The Jacksonville Electric Authority (JEA) has developed a technique for rapidly drying out its boilers as an effective corrosion prevention measure, even for units which will be out of service for a short time. The JEA has several steam generating units that are not in continual service. These units, whether on standby or in extended cold storage, must be maintained if they are to operate reliably when they are needed. JEA uses dehumidification as the primary method to reduce corrosion in these standby units. Engineers at JEA believe it is better to reduce the amount of water retained in standby boilers than to add inhibiting chemicals to retained water for corrosion protection.

Mallard, R.E.

1996-08-01T23:59:59.000Z

480

EO 11990: Protection Of Wetlands  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

90-Protection Of Wetlands 90-Protection Of Wetlands SOURCE: The provisions of Executive Order 11990 of May 24, 1977, appear at 42 FR 26961, 3 CFR, 1977 Comp., p. 121, unless otherwise noted. By virtue of the authority vested in me by the Constitution and statutes of the United States of America, and as President of the United States of America, in furtherance of the National Environmental Policy Act of 1969, as amended (42 U.S.C. 4321 et s eq.), in order to avoid to the extent possible the long and short term adverse impacts associated with the destruction or modification of wetlands and to avoid direct or indirect support of new construction in wetlands wherever there is a practicable alternative, it is hereby ordered as follows: SECTION 1. (a) Each agency shall provide leadership and shall take action to minimize the

Note: This page contains sample records for the topic "lifecycle attack protection" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Cathodic Protection of Offshore Structures  

Science Conference Proceedings (OSTI)

Table 4   Design criteria for cathodic protection systems...Africa 20â??30 5â??21 Low Low 130 (12) 90 (8) 90 (8) Indonesia 19 24 Moderate Moderate 110 (10) 75 (7) 75 (7) South China Sea 18 30 Low Low 100 (9) 35 (3) 35 (3) Sea mud 100 Same as water N/A N/A 21.5 (2) 10.8 (1) 10.8 (1) (a) Typical values and ratings

482

Fire Protection Engineering Qualification Standard Reference Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fire Protection Fire Protection Engineering Qualification Standard Reference Guide SEPTEMBER 2009 This page is intentionally blank. Table of Contents i ACRONYMS ................................................................................................................................. ii PURPOSE.......................................................................................................................................1 SCOPE ............................................................................................................................................1 PREFACE.......................................................................................................................................1 TECHNICAL COMPETENCIES................................................................................................3

483

Registration, Force Protection Equipment Demonstration - May 2009 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Registration, Force Protection Equipment Demonstration - May 2009 Registration, Force Protection Equipment Demonstration - May 2009 Registration, Force Protection Equipment Demonstration - May 2009 May 2009 Demonstrating commercially availale physical security/force protection soultions around the world The bombing of Khobar Towers in Saudi Arabia on 25 June 1996 revealed the need for continal vigilance and protection againist terrorist forces intent on harming US personnel and interests. The Chairman if the Joint Chiefs of Staff directed the Services to investigate COTS equipments solutions for physical security/force protection needs. The Office of the Under Secretary of Defense for Acquistion, Technology, and Logistics (OUSD {at&l}) tasked the Office of the US Army Product Manager, force Protection Systems (PM-FPS), to coordiante and facilitate a Force Protection Equipment

484

Help:Protected pages | Open Energy Information  

Open Energy Info (EERE)

Protected pages Protected pages Jump to: navigation, search A protected page is a page where normal users are prevented from editing and/or moving at all. Only a user with sysop permissions can edit or move a protected page. Likewise only sysop users can protect a page in the first place, or unprotect the page to lift the restriction. There are several reasons why a particular page might be protected: On public wikis, pages may be protected because they have been repeatedly targeted with vandalism or moved to bad titles, or where it is believed that vandalism or page moves would have a unusually severe impact. On corporate wikis, pages may be protected when they contain statements which have been approved by management, and policy dictates that those statements can't be changed without following a certain approval

485

IEDWorking Paper 1 Environmental Protection, Energy Policy  

E-Print Network (OSTI)

IEDWorking Paper 1 April 2007 Environmental Protection, Energy Policy and Poverty Reduction Protection, Energy Policy and Poverty Reduction ­ Synergies of an Integrated Approach Renate Schubert, Julia.................................................................................................................4 3 Reducing poverty through climate and energy policy

Fischlin, Andreas

486

Secure application partitioning for intellectual property protection  

E-Print Network (OSTI)

Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...

O'Donnell, Charles W., S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

487

Optimization of radiation protection: a bibliography  

Science Conference Proceedings (OSTI)

This document provides a bibliography of radiation protection optimization documents. Abstracts, an author index, and a subject index are provided.

Tang, G.R.; Khan, T.A.; Sullivan, S.G.

1996-10-01T23:59:59.000Z

488

Google Earth Tour: Waters LANL Protects  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Grand Challenges Vision & Mission Contacts | Information Environment at LANL Clean the Past Introduction Tour: Environmental Cleanup Protections: Cleanup ...

489

Alkali metal protective garment and composite material  

DOE Patents (OSTI)

A protective garment and composite material providing satisfactory heat resistance and physical protection for articles and personnel exposed to hot molten alkali metals, such as sodium. Physical protection is provided by a continuous layer of nickel foil. Heat resistance is provided by an underlying backing layer of thermal insulation. Overlying outer layers of fireproof woven ceramic fibers are used to protect the foil during storage and handling.

Ballif, III, John L. (Salt Lake City, UT); Yuan, Wei W. (Seattle, WA)

1980-01-01T23:59:59.000Z

490