National Library of Energy BETA

Sample records for lifecycle attack protection

  1. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  2. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  3. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  4. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  5. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  6. Lifecycle Model

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    This chapter describes the lifecycle model used for the Departmental software engineering methodology.

  7. CHALLENGES AND OPPORTUNITIES--INTEGRATED LIFE-CYCLE OPTIMIZATION INITIATIVES FOR THE HANFORD RIVER PROTECTION PROJECT--WASTE TREATMENT PLANT

    SciTech Connect (OSTI)

    Auclair, K. D.

    2002-02-25

    This paper describes the ongoing integrated life-cycle optimization efforts to achieve both design flexibility and design stability for activities associated with the Waste Treatment Plant at Hanford. Design flexibility is required to support the Department of Energy Office of River Protection Balance of Mission objectives, and design stability to meet the Waste Treatment Plant construction and commissioning requirements in order to produce first glass in 2007. The Waste Treatment Plant is a large complex project that is driven by both technology and contractual requirements. It is also part of a larger overall mission, as a component of the River Protection Project, which is driven by programmatic requirements and regulatory, legal, and fiscal constraints. These issues are further complicated by the fact that both of the major contractors involved have a different contract type with DOE, and neither has a contract with the other. This combination of technical and programmatic drivers, constraints, and requirements will continue to provide challenges and opportunities for improvement and optimization. The Bechtel National, Inc. team is under contract to engineer, procure, construct, commission and test the Waste Treatment Plant on or ahead of schedule, at or under cost, and with a throughput capacity equal to or better than specified. The Department of Energy is tasked with the long term mission of waste retrieval, treatment, and disposal. While each mission is a compliment and inextricably linked to one another, they are also at opposite ends of the spectrum, in terms of expectations of one another. These mission requirements, that are seemingly in opposition to one another, pose the single largest challenge and opportunity for optimization: one of balance. While it is recognized that design maturation and optimization are the normal responsibility of any engineering firm responsible for any given project, the aspects of integrating requirements and the management

  8. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  9. Hanford Lifecycle Reports - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hanford Lifecycle Reports Hanford Lifecycle Reports Hanford Lifecycle Reports Hanford Lifecycle Reports Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size 2016 Hanford Lifecycle Report 2015 Hanford Lifecycle Report 2014 Hanford Lifecycle Report 2013 Hanford Lifecycle Report 2012 Hanford Lifecycle Report 2011 Hanford Lifecycle Report Share on Last Updated 02/22/2016 2:54

  10. HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134

    SciTech Connect (OSTI)

    PIERSON KL; MEINERT FL

    2012-01-26

    Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

  11. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasil’nikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors – from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelial–mesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK – the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  12. Model of the Product Development Lifecycle.

    SciTech Connect (OSTI)

    He, Sunny L.; Roe, Natalie H.; Wood, Evan; Nachtigal, Noel M.; Helms, Jovana

    2015-10-01

    While the increased use of Commercial Off-The-Shelf information technology equipment has presented opportunities for improved cost effectiveness and flexibility, the corresponding loss of control over the product's development creates unique vulnerabilities and security concerns. Of particular interest is the possibility of a supply chain attack. A comprehensive model for the lifecycle of hardware and software products is proposed based on a survey of existing literature from academic, government, and industry sources. Seven major lifecycle stages are identified and defined: (1) Requirements, (2) Design, (3) Manufacturing for hardware and Development for software, (4) Testing, (5) Distribution, (6) Use and Maintenance, and (7) Disposal. The model is then applied to examine the risk of attacks at various stages of the lifecycle.

  13. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  14. Performance Measure Unit Lifecycle Total Estimate Pre-2016 Lifecycle...

    Office of Environmental Management (EM)

    Measure Unit Lifecycle Total Estimate Pre-2016 Lifecycle Values 2016 Target 2017 Target Pu packaged for long-term disposition Number of Containers 5,089 5,089 5,089 5,089 eU ...

  15. Lifecycle Analysis Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GREET TM Life-Cycle Analysis Model Advanced Water Splitting Materials Workshop Stanford University, Stanford CA April 14, 2016 Amgad Elgowainy Energy Systems Division Argonne National Laboratory The GREET (Greenhouse gases, Regulated Emissions, and Energy use in Transportation) Model GREET 1 model: Fuel-cycle (or well-to-wheels, WTW) modeling of vehicle/fuel systems Stochastic Simulation Tool Algae Process Description (APD) Carbon Calculator for Land Use Change from Biofuels (CCLUB) GREET 2

  16. Photovoltaics: Life-cycle Analyses

    SciTech Connect (OSTI)

    Fthenakis V. M.; Kim, H.C.

    2009-10-02

    Life-cycle analysis is an invaluable tool for investigating the environmental profile of a product or technology from cradle to grave. Such life-cycle analyses of energy technologies are essential, especially as material and energy flows are often interwoven, and divergent emissions into the environment may occur at different life-cycle-stages. This approach is well exemplified by our description of material and energy flows in four commercial PV technologies, i.e., mono-crystalline silicon, multi-crystalline silicon, ribbon-silicon, and cadmium telluride. The same life-cycle approach is applied to the balance of system that supports flat, fixed PV modules during operation. We also discuss the life-cycle environmental metrics for a concentration PV system with a tracker and lenses to capture more sunlight per cell area than the flat, fixed system but requires large auxiliary components. Select life-cycle risk indicators for PV, i.e., fatalities, injures, and maximum consequences are evaluated in a comparative context with other electricity-generation pathways.

  17. Background Information for Independent Review Team. Lifecycle...

    Office of Scientific and Technical Information (OSTI)

    Background Information for Independent Review Team. Lifecycle Plan and FY14 Quarterly ... Visit OSTI to utilize additional information resources in energy science and technology. A ...

  18. Roles and Lifecycle | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roles and Lifecycle Roles and Lifecycle Employee Property Responsibilities by Role Director, Office of Administration The Director, Office of Administration, has the following responsibilities: *Establish a personal property management program for DOE Headquarters, except for the Federal Energy Regulatory Commission (FERC); *Appoint an Organizational Property Management Officer (OPMO) who is responsible for the Headquarters personal property management program; and *Approve, conditionally

  19. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products PDF icon ...

  20. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...

    Office of Environmental Management (EM)

    Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy ...

  1. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  2. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Energy Savers [EERE]

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Part I: Review of the Life-Cycle Energy Consumption of Incandescent, Compact Fluorescent, and LED ...

  3. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A ...

  4. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Energy Savers [EERE]

    Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products This March 28, ...

  5. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne ...

  6. Life-Cycle Analysis of Geothermal Technologies | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cycle Analysis of Geothermal Technologies Life-Cycle Analysis of Geothermal Technologies The results and tools from this project will help GTP and stakeholders determine and communicate GT energy and GHG benefits and water impacts. The life-cycle analysis (LCA) approach is taken to address these effects. analysis_wang_lifecycle_analysis.pdf (878.83 KB) More Documents & Publications AAPG Low-Temperature Webinar GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems

  7. Life-cycle environmental analysis--A three dimensional view

    SciTech Connect (OSTI)

    Sutherlin, K.L.; Black, R.E. )

    1993-01-01

    Both the US Air Force and the US Army have recently increased their emphasis on life-cycles of weapons systems. Along with that emphasis, there has also been an increase in emphasis in life-cycle National Environmental Policy Act (NEPA) documentation. Conflicts and inefficiencies arise when a weapon system is fielded and prompts the need for a site-specific environmental analysis. In their research and experience, the authors found no real link between life-cycle environmental analysis and site-specific environmental analyses required at various points within the life-cycle of a weapon. This other look at the relation between life-cycle and site-specific environmental analyses has the potential to increase efficiency in NEPA compliance actions and save tax dollars in the process. The authors present a three-dimensional model that relates life-cycle analyses to site-specific analyses.

  8. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  9. Life-Cycle Assessment of Energy and Environmental Impacts of...

    Office of Scientific and Technical Information (OSTI)

    the Life-Cycle Energy Consumption of Incandescent, Compact ... upstream generation of electricity drives themore total ... However, a more detailed understanding of end-of-life ...

  10. Lifecycle of laser-produced air sparks

    SciTech Connect (OSTI)

    Harilal, S. S. Brumfield, B. E.; Phillips, M. C.

    2015-06-15

    We investigated the lifecycle of laser-generated air sparks or plasmas using multiple plasma diagnostic tools. The sparks were generated by focusing the fundamental radiation from an Nd:YAG laser in air, and studies included early and late time spark dynamics, decoupling of the shock wave from the plasma core, emission from the spark kernel, cold gas excitation by UV radiation, shock waves produced by the air spark, and the spark's final decay and turbulence formation. The shadowgraphic and self-emission images showed similar spark morphology at earlier and late times of its lifecycle; however, significant differences are seen in the midlife images. Spectroscopic studies in the visible region showed intense blackbody-type radiation at early times followed by clearly resolved ionic, atomic, and molecular emission. The detected spectrum at late times clearly contained emission from both CN and N{sub 2}{sup +}. Additional spectral features have been identified at late times due to emission from O and N atoms, indicating some degree of molecular dissociation and excitation. Detailed spatially and temporally resolved emission analysis provides insight about various physical mechanisms leading to molecular and atomic emission by air sparks, including spark plasma excitation, heating of cold air by UV radiation emitted by the spark, and shock-heating.

  11. Product Lifecycle Management Architecture: A Model Based Systems Engineering Analysis.

    SciTech Connect (OSTI)

    Noonan, Nicholas James

    2015-07-01

    This report is an analysis of the Product Lifecycle Management (PLM) program. The analysis is centered on a need statement generated by a Nuclear Weapons (NW) customer. The need statement captured in this report creates an opportunity for the PLM to provide a robust service as a solution. Lifecycles for both the NW and PLM are analyzed using Model Based System Engineering (MBSE).

  12. Building Life-Cycle Cost (BLCC) Program | Open Energy Information

    Open Energy Info (EERE)

    useful for evaluating the costs and benefits of energy and water conservation and renewable energy projects. The life-cycle cost (LCC) of two or more alternative designs are...

  13. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  14. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electrical Energy Storage | Department of Energy Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage This report presents the results of an analysis evaluating the economic viability of hydrogen for medium- to large-scale electrical energy storage applications compared with three other storage technologies: batteries, pumped hydro, and compressed air energy

  15. New Tool Yields Custom Environmental Data for Lifecycle Analysis |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Tool Yields Custom Environmental Data for Lifecycle Analysis New Tool Yields Custom Environmental Data for Lifecycle Analysis September 10, 2012 - 1:00pm Addthis Washington, DC - A new, free online tool developed by a Department of Energy (DOE) laboratory allows users to customize and analyze the environmental impact of various fuels before they are used to create power. Information from the Excel™-based Upstream Dashboard - developed by the Office of Fossil Energy's

  16. Beyond pollution prevention: Managing life-cycle costs

    SciTech Connect (OSTI)

    Cohan, D.; Gess, D. )

    1993-01-01

    Companies that purchases and use chemicals and materials in their everyday operation are finding that disposing of these products is becoming increasingly expensive. These disposal and liability costs have been the motivating factor behind recent efforts at pollution prevention. This paper suggests an alternative approach: considering the full life-cycle costs of chemicals and materials at the time purchase decisions are made. Life-cycle cost is the sum of all the costs that a product is expected to incur from the time of its purchase, during its use, until the disposal of any wastes or by-products and beyond as long as liabilities may remain. It represents the product's real cost to the company, and as such is a better basis for making cost-effective decisions. By using life-cycle costs to make decisions, companies can prevent uneconomical decisions on potentially hazardous materials and more effectively minimize overall costs. Life-cycle cost management can also help in the formulation of pollution prevention plans by identifying cost-effective waste-reduction alternatives. Although the concepts of life-cycle cost management are straightforward and intuitive, applying these concepts to real decisions may be challenging. This paper presents an overview of life-cycle cost management, discusses some of the challenges companies face applying this approach to real decisions, and provides solutions that meet these challenges.

  17. Lifecycle-analysis for heavy vehicles.

    SciTech Connect (OSTI)

    Gaines, L.

    1998-04-16

    Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

  18. Commissioning tools for life-cycle building performance assurance

    SciTech Connect (OSTI)

    Piette, M.A.

    1996-05-01

    This paper discusses information systems for building life-cycle performance analysis and the use of computer-based commissioning tools within this context. There are many reasons why buildings do not perform in practice as well as intended at the design stage. One reason is the lack of commissioning. A second reason is that design intent is not well documented, and performance targets for building components and systems are not well specified. Thus, criteria for defining verification and functional tests is unclear. A third reason is that critical information is often lost throughout the building life-cycle, which causes problems such as misunderstanding of operational characteristics and sequences and reduced overall performance. The life-cycle building performance analysis tools project discussed in this paper are focused on chillers and cooling systems.

  19. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, ...

  1. Guidance on Life-Cycle Cost Analysis Required by Executive Order...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Cost Analysis Required by Executive Order 13123 Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guide describes the clarification of how agencies ...

  2. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual ...

  3. 2016 Lifecycle Estimate for Los Alamos National Laboratory's Environmental Legacy Cleanup Responsibilities

    Broader source: Energy.gov [DOE]

    At the July 27, 2016 meeting: Doug Hintze, DOE EM-LA, Presented on the Environmental Management Lifecycle Baseline

  4. Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the clarification of how agencies determine the life-cycle cost for investments required by Executive Order 13123.

  5. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  6. Integrating a life-cycle assessment with NEPA: Does it make sense?

    SciTech Connect (OSTI)

    ECCLESTON, C.H.

    1998-09-03

    The National Environmental Policy Act (NEPA) of 1969 provides the basic national charter for protection of the environment in the US. Today NEPA has provided an environmental policy model which has been emulated by nations around the world. Recently, questions have been raised regarding the appropriateness and under what conditions it makes sense to combine the preparation of a NEPA analysis with the International Organization for Stnadardization (ISO) - 14000 Standards for Life-Cycle Assessment (LCA). This paper advantages a decision making tool consisting of six discrete criteria which can be employed by a user in reaching a decision regarding the integration of NEPA analysis and LCA. Properly applied, this tool should reduce the risk that a LCA may be inappropriately prepared and integrated with a NEPA analysis.

  7. Life-cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Peer Review Report | Department of Energy cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology Program Peer Review Report Life-cycle Analysis of Geothermal Technologies; 2010 Geothermal Technology Program Peer Review Report DOE 2010 Geothermal Technologies Program Peer Review adse_005_wang.pdf (192.84 KB) More Documents & Publications Detecting Fractures Using Technology at High Temperatures and Depths - Geothermal Ultrasonic Fracture Imager (GUFI); 2010

  8. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  9. Life-Cycle Assessment of Pyrolysis Bio-Oil Production*

    SciTech Connect (OSTI)

    Steele, Philip; Puettmann, Maureen E.; Penmetsa, Venkata Kanthi; Cooper, Jerome E.

    2012-07-01

    As part ofthe Consortium for Research on Renewable Industrial Materials' Phase I life-cycle assessments ofbiofuels, lifecycle inventory burdens from the production of bio-oil were developed and compared with measures for residual fuel oil. Bio-oil feedstock was produced using whole southern pine (Pinus taeda) trees, chipped, and converted into bio-oil by fast pyrolysis. Input parameters and mass and energy balances were derived with Aspen. Mass and energy balances were input to SimaPro to determine the environmental performance of bio-oil compared with residual fuel oil as a heating fuel. Equivalent functional units of 1 MJ were used for demonstrating environmental preference in impact categories, such as fossil fuel use and global warming potential. Results showed near carbon neutrality of the bio-oil. Substituting bio-oil for residual fuel oil, based on the relative carbon emissions of the two fuels, estimated a reduction in CO2 emissions by 0.075 kg CO2 per MJ of fuel combustion or a 70 percent reduction in emission over residual fuel oil. The bio-oil production life-cycle stage consumed 92 percent of the total cradle-to-grave energy requirements, while feedstock collection, preparation, and transportation consumed 4 percent each. This model provides a framework to better understand the major factors affecting greenhouse gas emissions related to bio-oil production and conversion to boiler fuel during fast pyrolysis.

  10. Life-cycle analysis of shale gas and natural gas.

    SciTech Connect (OSTI)

    Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M.

    2012-01-27

    The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

  11. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  12. GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Questions | Department of Energy GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions November 23, 2015 - 2:57pm Addthis GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis Research Questions The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model allows researchers and analysts to fully evaluate the energy and emission

  13. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2015 | Department of Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual supplements to the NIST Handbook 135 and NBS Special Publication 709. Download the handbook. (564.47 KB) More Documents & Publications Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Vehicle Technologies Office Merit Review 2015: Fuel-Neutral Studies of

  14. Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Power Systems | Department of Energy Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  15. Hanford Advisory Board Budgets and Contracts Committee Meeting 2011 Hanford Lifecycle Scope, Schedule and Cost Report

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 Lifecycle Scope, Schedule and Cost Report Stephen Korenkiewicz, Project Manager US Department of Energy - Richland Operations Office June 6, 2013 1 2 Tri-Party Project Managers The U.S. Department of Energy (DOE), Richland Operations Office (RL) Project Integration and Control (PIC) organization is responsible for Tri-Party Agreement (TPA) Milestone M-036-01C, 2013 Hanford Lifecycle Scope, Schedule and Cost Report (Lifecycle Report) * Stephen Korenkiewicz is the RL Project Manager * David

  16. An Assessment of Lifecycle Cost in the U.S. over Time

    SciTech Connect (OSTI)

    Previsic, Mirko

    2011-10-06

    Presentation from the 2011 Water Peer Review in which principal investigator discussed project progress to assess Lifecycle cost of Wave, Tidal, River, and Ocean Current Technologies

  17. Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products" webcast, held March 28, 2013.

  18. GREET Model Expanded to Better Address Biofuel Life-Cycle Analysis...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    modules; an update of combustion equipment emission factors; and new data on land management change effects on stover-derived biofuel life-cycle greenhouse gas emissions. ...

  19. TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.

    SciTech Connect (OSTI)

    Willenbring, James M.; Bartlett, Roscoe Ainsworth; Heroux, Michael Allen

    2012-01-01

    Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

  20. T-693: Symantec Endpoint Protection Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site...

  1. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and In-Stream Hydrokinetic Power | Department of Energy Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power 16_life_revision_previsic_update.ppt (2.64 MB) More Documents & Publications 2014 Water Power Program Peer Review

  2. National Infrastructure Protection Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural,

  3. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  4. Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL...

  5. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-11-01

    This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

  6. Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems

    Office of Energy Efficiency and Renewable Energy (EERE)

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  7. A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conventional Fuels in the Transportation Sector | Department of Energy A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with Conventional Fuels in the Transportation Sector A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with Conventional Fuels in the Transportation Sector 2004 Diesel Engine Emissions Reduction (DEER) Conference Presentation: ConocoPhillips and Nexant Corporatin 2004_deer_abbott.pdf (160.87 KB) More Documents & Publications Shell Gas to Liquids

  8. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  11. Life-Cycle Analysis of Alternative Aviation Fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S.

    2012-06-01

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1_2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or(2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55–85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources — such as natural gas and coal — could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet

  12. Life-cycle analysis of alternative aviation fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S.

    2012-07-23

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet

  13. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  14. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  15. GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems | Department of Energy GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems GREET Development and Applications for Life-Cycle Analysis of Vehicle/Fuel Systems 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting van002_wang_2013_o.pdf (1.64 MB) More Documents & Publications Fuel-Cycle Energy and Emissions Analysis with the GREET Model Vehicle Technologies Office Merit Review 2015:

  16. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  17. A Review of Battery Life-Cycle Analysis. State of Knowledge and Critical Needs

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.

    2010-10-01

    This report examines battery life-cycle assessments with a focus on cradle-to-gate (CTG) energy and greenhouse gas (GHG) and criteria emissions. This includes battery manufacturing and as the production of materials that make up batteries. The report covers both what is known about battery life cycles, as well as what needs to be established for better environmental evaluations.

  18. A review of battery life-cycle analysis : state of knowledge and critical needs.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.; Energy Systems

    2010-12-22

    A literature review and evaluation has been conducted on cradle-to-gate life-cycle inventory studies of lead-acid, nickel-cadmium, nickel-metal hydride, sodium-sulfur, and lithium-ion battery technologies. Data were sought that represent the production of battery constituent materials and battery manufacture and assembly. Life-cycle production data for many battery materials are available and usable, though some need updating. For the remaining battery materials, lifecycle data either are nonexistent or, in some cases, in need of updating. Although battery manufacturing processes have occasionally been well described, detailed quantitative information on energy and material flows is missing. For all but the lithium-ion batteries, enough constituent material production energy data are available to approximate material production energies for the batteries, though improved input data for some materials are needed. Due to the potential benefit of battery recycling and a scarcity of associated data, there is a critical need for life-cycle data on battery material recycling. Either on a per kilogram or per watt-hour capacity basis, lead-acid batteries have the lowest production energy, carbon dioxide emissions, and criteria pollutant emissions. Some process-related emissions are also reviewed in this report.

  19. Emergency Operating Records Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-10-23

    To establish the policy, responsibilities, and requirements for a Departmental Emergency Operating Records Protection Program to safeguard that core or records deemed necessary to assure continuity of essential Governmental activities during and following disaster and attack-related emergency conditions. Cancels DOE 5500.7A. Chanceled by DOE O 151.1 of 9-25-1995.

  20. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  1. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  2. Product Life-Cycle Management: The future of product and packaging design

    SciTech Connect (OSTI)

    Jung, L.B. )

    1993-01-01

    Product Life-Cycle Management (PLCM) is the control of environmental impacts associated with all the life phases of a product, from design through manufacture, packaging and disposal. PLCM dictates that products be manufactured using less harmful chemicals and fewer resources. Product packaging must be minimal and made of renewable and recyclable resources. Both the product and the package must contain recycled material. Packaging and products must also be collected for recycle at the end of their intended use, requiring infrastructure to collect, transport and process these materials. European legislation now requires the return and recycle of packaging materials by the end of 1993. Requirements are also being imposed on manufacturers of automobile related products; automotive batteries, tires and even automobiles themselves must now be accepted back and recycled. Increasing public concerns and awareness of environmental impacts plus the decreasing availability of natural resources will continue to push product life-cycle legislation forward.

  3. Waste-To-Energy Techno-Economic Analysis and Life-Cycle Analysis Presentation for BETO 2015 Project Peer Review

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Waste-To-Energy Techno-Economic Analysis and Life-Cycle Analysis March 24, 2015 Conversion Ling Tao†, Jeongwoo Han* †National Renewable Energy Laboratory *Argonne National Laboratory DOE Bioenergy Technologies Office (BETO) 2015 Project Peer Review 2 | Bioenergy Technologies Office Goal Statement * Conduct the techno-economic analysis (TEA) and life-cycle analysis (LCA) of Waste-To-Energy (WTE) pathways to evaluate their economic viability and environmental sustainability - Strategic

  4. Using life-cycle cost management to cut costs and reduce waste

    SciTech Connect (OSTI)

    Gess, D.; Cohan, D.; McLearn, M.

    1995-12-01

    Increasing competition is forcing electric utility companies to reduce costs and improve efficiency. At the same time, increasing costs for waste disposal and emissions control and growing environmental regulatory pressure are providing powerful incentives for firms in virtually every industry to investigate opportunities to reduce or even eliminate the adverse environmental impacts associated with their operations. companies are also striving toward environmental stewardship to realize the potential benefits to the firms`s public image, employees, an shareholders. Motivated by these cost and environmental concerns, the Electric Power Research Institute (EPRI), Decision Focus Inc. (DFI), and a consortium of electric utility companies have developed techniques and tools to help electric utility companies to make purchase and operating decisions based on their full life-cycle costs, which explicitly include environmental, health, and safety costs. The process, called Life-Cycle Cost Management (LCCM), helps utilities to efficiently assemble the appropriate life-cycle information and bring it to bear on their business decisions. To date, several utilities have used LCCM to evaluate a range of product substitution and process improvement decisions and to implement cost-savings actions. This paper summarizes some of these applications.

  5. Life-Cycle Evaluation of Concrete Building Construction as a Strategy for Sustainable Cities

    SciTech Connect (OSTI)

    Stadel, Alexander; Gursel, Petek; Masanet, Eric

    2012-01-18

    Structural materials in commercial buildings in the United States account for a significant fraction of national energy use, resource consumption, and greenhouse gas (GHG) emissions. Robust decisions for balancing and minimizing these various environmental effects require that structural materials selections follow a life-cycle, systems modeling approach. This report provides a concise overview of the development and use of a new life-cycle assessment (LCA) model for structural materials in U.S. commercial buildings-the Berkeley Lab Building Materials Pathways (B-PATH) model. B-PATH aims to enhance environmental decision-making in the commercial building LCA, design, and planning communities through the following key features: (1) Modeling of discrete technology options in the production, transportation, construction, and end of life processes associated U.S. structural building materials; (2) Modeling of energy supply options for electricity provision and directly combusted fuels across the building life cycle; (3) Comprehensiveness of relevant building mass and energy flows and environmental indicators; (4) Ability to estimate modeling uncertainties through easy creation of different life-cycle technology and energy supply pathways for structural materials; and (5) Encapsulation of the above features in a transparent public use model. The report summarizes literature review findings, methods development, model use, and recommendations for future work in the area of LCA for commercial buildings.

  6. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  7. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  8. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  9. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  10. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  11. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Revised) (Fact Sheet), Hydrogen and Fuel Cell Technical Highlights (HFCTH)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power Systems | Department of Energy Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's GREET model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies.

  12. Development and Validation of a Lifecycle-based Prognostics Architecture with Test Bed Validation

    SciTech Connect (OSTI)

    Hines, J. Wesley; Upadhyaya, Belle; Sharp, Michael; Ramuhalli, Pradeep; Jeffries, Brien; Nam, Alan; Strong, Eric; Tong, Matthew; Welz, Zachary; Barbieri, Federico; Langford, Seth; Meinweiser, Gregory; Weeks, Matthew

    2014-11-06

    On-line monitoring and tracking of nuclear plant system and component degradation is being investigated as a method for improving the safety, reliability, and maintainability of aging nuclear power plants. Accurate prediction of the current degradation state of system components and structures is important for accurate estimates of their remaining useful life (RUL). The correct quantification and propagation of both the measurement uncertainty and model uncertainty is necessary for quantifying the uncertainty of the RUL prediction. This research project developed and validated methods to perform RUL estimation throughout the lifecycle of plant components. Prognostic methods should seamlessly operate from beginning of component life (BOL) to end of component life (EOL). We term this "Lifecycle Prognostics." When a component is put into use, the only information available may be past failure times of similar components used in similar conditions, and the predicted failure distribution can be estimated with reliability methods such as Weibull Analysis (Type I Prognostics). As the component operates, it begins to degrade and consume its available life. This life consumption may be a function of system stresses, and the failure distribution should be updated to account for the system operational stress levels (Type II Prognostics). When degradation becomes apparent, this information can be used to again improve the RUL estimate (Type III Prognostics). This research focused on developing prognostics algorithms for the three types of prognostics, developing uncertainty quantification methods for each of the algorithms, and, most importantly, developing a framework using Bayesian methods to transition between prognostic model types and update failure distribution estimates as new information becomes available. The developed methods were then validated on a range of accelerated degradation test beds. The ultimate goal of prognostics is to provide an accurate assessment for

  13. Life-cycle cost and impacts: alternatives for managing KE basin sludge

    SciTech Connect (OSTI)

    Alderman, C.J.

    1997-06-27

    This document presents the results of a life-cycle cost and impacts evaluation of alternatives for managing sludge that will be removed from the K Basins. The two basins are located in the 100-K Area of the Hanford Site. This evaluation was conducted by Fluor Daniel Hanford, Inc. (FDH) and its subcontractors to support decisions regarding the ultimate disposition of the sludge. The long-range plan for the Hanford Site calls for spent nuclear fuel (SNF), sludge, debris, and water to be removed from the K East (KE) and K West (KW) Basins. This activity will be conducted as a removal action under the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA). The scope of the CERCLA action will be limited to removing the SNF, sludge, debris, and water from the basins and transferring them to authorized facilities for interim storage and/or treatment and disposal. The scope includes treating the sludge and water in the 100-K Area prior to the transfer. Alternatives for the removal action are evaluated in a CERCLA engineering evaluation/cost analysis (EE/CA) and include different methods for managing sludge from the KE Basins. The scope of the removal action does not include storing, treating, or disposing of the sludge once it is transferred to the receiving facility and the EE/CA does not evaluate those downstream activities. This life-cycle evaluation goes beyond the EE/CA and considers the full life-cycle costs and impacts of dispositioning sludge.

  14. Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications

    SciTech Connect (OSTI)

    Aden, Nathaniel; Qin, Yining; Fridley, David

    2010-09-15

    Buildings are at the locus of three trends driving China's increased energy use and emissions: urbanization, growing personal consumption, and surging heavy industrial production. Migration to cities and urban growth create demand for new building construction. Higher levels of per-capita income and consumption drive building operational energy use with demand for higher intensity lighting, thermal comfort, and plug-load power. Demand for new buildings, infrastructure, and electricity requires heavy industrial production. In order to quantify the implications of China's ongoing urbanization, rising personal consumption, and booming heavy industrial sector, this study presents a lifecycle assessment (LCA) of the energy use and carbon emissions related to residential and commercial buildings. The purpose of the LCA model is to quantify the impact of a given building and identify policy linkages to mitigate energy demand and emissions growth related to China's new building construction. As efficiency has become a higher priority with growing energy demand, policy and academic attention to buildings has focused primarily on operational energy use. Existing studies estimate that building operational energy consumption accounts for approximately 25% of total primary energy use in China. However, buildings also require energy for mining, extracting, processing, manufacturing, and transporting materials, as well as energy for construction, maintenance, and decommissioning. Building and supporting infrastructure construction is a major driver of industry consumption--in 2008 industry accounted for 72% of total Chinese energy use. The magnitude of new building construction is large in China--in 2007, for example, total built floor area reached 58 billion square meters. During the construction boom in 2007 and 2008, more than two billion m{sup 2} of building space were added annually; China's recent construction is estimated to account for half of global construction

  15. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6719 November 2009 Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage D. Steward, G. Saur, M. Penev, and T. Ramsden National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report

  16. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  17. Design and life-cycle considerations for unconventional-reservoir wells

    SciTech Connect (OSTI)

    Miskimins, J.L.

    2009-05-15

    This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

  18. Life-Cycle Cost Analysis for Utility Combinations (LCCA) (for microcomputers). Software

    SciTech Connect (OSTI)

    Corin, N.

    1989-09-01

    The Life-Cycle Cost Analysis for Utility Combinations (LCCA) system evaluates housing project utility systems. The system determines the cost-effectiveness and aids in the selection of the utility combination with the lowest life-cycle cost. Because of the large number of possible combinations of fuels, purchasing methods, types of installations and utility rates, a systematic analysis of costs must be made. The choice of utilities may substantially influence construction cost. LCCA calculates initial and monthly costs of both individual dwelling units and project totals. Therefore, the LCCA system calculates costs for four combinations of fuel/energy. LCCA analyzes the following four utility combinations: Combination 1--Electricity; Combination 2--Electricity and Gas; Combination 3--Electricity and Oil; and Combination 4--Electricity, Gas and Oil. Software Description: The software is written in the Lotus 1-2-3 programming language for implementation on an IBM PC microcomputer using Lotus 1-2-3. Software requires 160K of disk storage, with a hard disk and one floppy or two floppy disk drives.

  19. Performance metrics and life-cycle information management for building performance assurance

    SciTech Connect (OSTI)

    Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

    1998-06-01

    Commercial buildings account for over $85 billion per year in energy costs, which is far more energy than technically necessary. One of the primary reasons buildings do not perform as well as intended is that critical information is lost, through ineffective documentation and communication, leading to building systems that are often improperly installed and operated. A life-cycle perspective on the management of building information provides a framework for improving commercial building energy performance. This paper describes a project to develop strategies and techniques to provide decision-makers with information needed to assure the desired building performance across the complete life cycle of a building project. A key element in this effort is the development of explicit performance metrics that quantitatively represent performance objectives of interest to various building stakeholders. The paper begins with a discussion of key problems identified in current building industry practice, and ongoing work to address these problems. The paper then focuses on the concept of performance metrics and their use in improving building performance during design, commissioning, and on-going operations. The design of a Building Life-cycle Information System (BLISS) is presented. BLISS is intended to provide an information infrastructure capable of integrating a variety of building information technologies that support performance assurance. The use of performance metrics in case study building projects is explored to illustrate current best practice. The application of integrated information technology for improving current practice is discussed.

  20. Updated Life-Cycle Assessment of Aluminum Production and Semi-fabrication for the GREET Model

    SciTech Connect (OSTI)

    Dai, Qiang; Kelly, Jarod C.; Burnham, Andrew; Elgowainy, Amgad

    2015-09-01

    This report serves as an update for the life-cycle analysis (LCA) of aluminum production based on the most recent data representing the state-of-the-art of the industry in North America. The 2013 Aluminum Association (AA) LCA report on the environmental footprint of semifinished aluminum products in North America provides the basis for the update (The Aluminum Association, 2013). The scope of this study covers primary aluminum production, secondary aluminum production, as well as aluminum semi-fabrication processes including hot rolling, cold rolling, extrusion and shape casting. This report focuses on energy consumptions, material inputs and criteria air pollutant emissions for each process from the cradle-to-gate of aluminum, which starts from bauxite extraction, and ends with manufacturing of semi-fabricated aluminum products. The life-cycle inventory (LCI) tables compiled are to be incorporated into the vehicle cycle model of Argonne National Laboratory’s Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) Model for the release of its 2015 version.

  1. Impacts of Vehicle Weight Reduction via Material Substitution on Life-Cycle Greenhouse Gas Emissions

    SciTech Connect (OSTI)

    Kelly, Jarod C.; Sullivan, John L.; Burnham, Andrew; Elgowainy, Amgad

    2015-10-20

    This study examines the vehicle-cycle impacts associated with substituting lightweight materials for those currently found in light-duty passenger vehicles. We determine part-based energy use and greenhouse gas (GHG) emission ratios by collecting material substitution data from both the literature and automotive experts and evaluating that alongside known mass-based energy use and GHG emission ratios associated with material pair substitutions. Several vehicle parts, along with full vehicle systems, are examined for lightweighting via material substitution to observe the associated impact on GHG emissions. Results are contextualized by additionally examining fuel-cycle GHG reductions associated with mass reductions relative to the baseline vehicle during the use phase and also determining material pair breakeven driving distances for GHG emissions. The findings show that, while material substitution is useful in reducing vehicle weight, it often increases vehicle-cycle GHGs depending upon the material substitution pair. However, for a vehicle’s total life cycle, fuel economy benefits are greater than the increased burdens associated with the vehicle manufacturing cycle, resulting in a net total life-cycle GHG benefit. The vehicle cycle will become increasingly important in total vehicle life-cycle GHGs, since fuel-cycle GHGs will be gradually reduced as automakers ramp up vehicle efficiency to meet fuel economy standards.

  2. Life-cycle cost analysis 200-West Weather Enclosure: Multi-function Waste Tank Facility

    SciTech Connect (OSTI)

    Umphrey, M.R.

    1995-01-16

    The Multi-Function Waste Tank Facility (MWTF)will provide environmentally safe and acceptable storage capacity for handling wastes resulting from the remediation of existing single-shell and double-shell tanks on the Hanford Site. The MWTF will construct two tank farm facilities at two separate locations. A four-tank complex will be constructed in the 200-East Area of the Hanford Site; a two-tank complex will be constructed in the 200-West Area. This report documents the results of a life-cycle cost analysis performed by ICF Kaiser Hanford Company (ICF KH) for the Weather Enclosure proposed to be constructed over the 200-West tanks. Currently, all tank farm operations on the Hanford Site are conducted in an open environment, with weather often affecting tank farm maintenance activities. The Weather Enclosure is being proposed to allow year-round tank farm operation and maintenance activities unconstrained by weather conditions. Elimination of weather-related delays at the MWTF and associated facilities will reduce operational costs. The life-cycle cost analysis contained in this report analyzes potential cost savings based on historical weather information, operational and maintenance costs, construction cost estimates, and other various assumptions.

  3. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  4. FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2

    SciTech Connect (OSTI)

    Templeton, K.J.

    1996-05-23

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on

  5. Comprehensive Lifecycle Planning and Management System For Addressing Water Issues Associated With Shale Gas Development In New York, Pennsylvania, And West Virginia

    SciTech Connect (OSTI)

    Arthur, J. Daniel

    2012-07-01

    The objective of this project is to develop a modeling system to allow operators and regulators to plan all aspects of water management activities associated with shale gas development in the target project area of New York, Pennsylvania, and West Virginia (target area ), including water supply, transport, storage, use, recycling, and disposal and which can be used for planning, managing, forecasting, permit tracking, and compliance monitoring. The proposed project is a breakthrough approach to represent the entire shale gas water lifecycle in one comprehensive system with the capability to analyze impacts and options for operational efficiency and regulatory tracking and compliance, and to plan for future water use and disposition. It will address all of the major water-related issues of concern associated with shale gas development in the target area, including water withdrawal, transport, storage, use, treatment, recycling, and disposal. It will analyze the costs, water use, and wastes associated with the available options, and incorporate constraints presented by permit requirements, agreements, local and state regulations, equipment and material availability, etc. By using the system to examine the water lifecycle from withdrawals through disposal, users will be able to perform scenario analysis to answer "what if" questions for various situations. The system will include regulatory requirements of the appropriate state and regional agencies and facilitate reporting and permit applications and tracking. These features will allow operators to plan for more cost effective resource production. Regulators will be able to analyze impacts of development over an entire area. Regulators can then make informed decisions about the protections and practices that should be required as development proceeds. This modeling system will have myriad benefits for industry, government, and the public. For industry, it will allow planning all water management operations for a

  6. System Evaluation and Life-Cycle Cost Analysis of a Commercial-Scale High-Temperature Electrolysis Hydrogen Production Plant

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-11-01

    Results of a system evaluation and lifecycle cost analysis are presented for a commercial-scale high-temperature electrolysis (HTE) central hydrogen production plant. The plant design relies on grid electricity to power the electrolysis process and system components, and industrial natural gas to provide process heat. The HYSYS process analysis software was used to evaluate the reference central plant design capable of producing 50,000 kg/day of hydrogen. The HYSYS software performs mass and energy balances across all components to allow optimization of the design using a detailed process flow sheet and realistic operating conditions specified by the analyst. The lifecycle cost analysis was performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes Microsoft Excel spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. The results of the lifecycle analyses indicate that for a 10% internal rate of return, a large central commercial-scale hydrogen production plant can produce 50,000 kg/day of hydrogen at an average cost of $2.68/kg. When the cost of carbon sequestration is taken into account, the average cost of hydrogen production increases by $0.40/kg to $3.08/kg.

  7. Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews

    2007-09-15

    The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

  8. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  9. Life-cycle cost and payback period analysis for commercial unitary air conditioners

    SciTech Connect (OSTI)

    Rosenquist, Greg; Coughlin, Katie; Dale, Larry; McMahon, James; Meyers, Steve

    2004-03-31

    This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results show how the savings vary among customers facing different electricity prices and other conditions. At 11.5 EER, at least 80% of the users achieve a positive LCC savings. At 12.0 EER, the maximum efficiency analyzed, mean LCC savings are lower but still positive. For the {ge} $65,000 Btu/h to <135,000 Btu/h equipment class, 59% of users achieve a positive LCC savings. For the $135,000 Btu/h to <240,000 Btu/h equipment class, 91% of users achieve a positive LCC savings.

  10. System Evaluations and Life-Cycle Cost Analyses for High-Temperature Electrolysis Hydrogen Production Facilities

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-05-01

    This report presents results of system evaluations and lifecycle cost analyses performed for several different commercial-scale high-temperature electrolysis (HTE) hydrogen production concepts. The concepts presented in this report rely on grid electricity and non-nuclear high-temperature process heat sources for the required energy inputs. The HYSYS process analysis software was used to evaluate both central plant designs for large-scale hydrogen production (50,000 kg/day or larger) and forecourt plant designs for distributed production and delivery at about 1,500 kg/day. The HYSYS software inherently ensures mass and energy balances across all components and it includes thermodynamic data for all chemical species. The optimized designs described in this report are based on analyses of process flow diagrams that included realistic representations of fluid conditions and component efficiencies and operating parameters for each of the HTE hydrogen production configurations analyzed. As with previous HTE system analyses performed at the INL, a custom electrolyzer model was incorporated into the overall process flow sheet. This electrolyzer model allows for the determination of the average Nernst potential, cell operating voltage, gas outlet temperatures, and electrolyzer efficiency for any specified inlet steam, hydrogen, and sweep-gas flow rates, current density, cell active area, and external heat loss or gain. The lifecycle cost analyses were performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. There are standard default sets of assumptions that the methodology uses to ensure consistency when comparing the cost of different production or plant design options. However, these assumptions may also be varied within the

  11. Life-cycle assessment of corn-based butanol as a potential transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2007-12-31

    Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

  12. Life-cycle analysis results of geothermal systems in comparison to other power systems.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

    2010-10-11

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET

  13. material protection

    National Nuclear Security Administration (NNSA)

    %2A en Office of Weapons Material Protection http:www.nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-1

  14. material protection

    National Nuclear Security Administration (NNSA)

    %2A en Office of Weapons Material Protection http:nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-1

  15. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  16. protective force

    National Nuclear Security Administration (NNSA)

    ntex%20-%20protective%20force%20-%20edited.jpg" alt"successfully completed a recent assessment by the U.S. Department " >

    Members of Pantex's Protective Force on...

  17. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  18. Analysis of material recovery facilities for use in life-cycle assessment

    SciTech Connect (OSTI)

    Pressley, Phillip N.; Levis, James W.; Damgaard, Anders; Barlaz, Morton A.; DeCarolis, Joseph F.

    2015-01-15

    Highlights: • Life-cycle assessment of solid waste management relies on accurate process models. • Material recovery facility (MRF) processes were modeled with new primary data. • Single stream, dual stream, pre-sorted, and mixed waste MRFs were considered. • MRF electricity consumption ranges from 4.7 to 7.8 kW h per Mg input. • Total cost ranges from $19.8 to $24.9 per Mg input. - Abstract: Insights derived from life-cycle assessment of solid waste management strategies depend critically on assumptions, data, and modeling at the unit process level. Based on new primary data, a process model was developed to estimate the cost and energy use associated with material recovery facilities (MRFs), which are responsible for sorting recyclables into saleable streams and as such represent a key piece of recycling infrastructure. The model includes four modules, each with a different process flow, for separation of single-stream, dual-stream, pre-sorted recyclables, and mixed-waste. Each MRF type has a distinct combination of equipment and default input waste composition. Model results for total amortized costs from each MRF type ranged from $19.8 to $24.9 per Mg (1 Mg = 1 metric ton) of waste input. Electricity use ranged from 4.7 to 7.8 kW h per Mg of waste input. In a single-stream MRF, equipment required for glass separation consumes 28% of total facility electricity consumption, while all other pieces of material recovery equipment consume less than 10% of total electricity. The dual-stream and mixed-waste MRFs have similar electricity consumption to a single-stream MRF. Glass separation contributes a much larger fraction of electricity consumption in a pre-sorted MRF, due to lower overall facility electricity consumption. Parametric analysis revealed that reducing separation efficiency for each piece of equipment by 25% altered total facility electricity consumption by less than 4% in each case. When model results were compared with actual data for an

  19. FY 1996 solid waste integrated life-cycle forecast container summary volume 1 and 2

    SciTech Connect (OSTI)

    Valero, O.J.

    1996-04-23

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the containers expected to be used for these waste shipments from 1996 through the remaining life cycle of the Hanford Site. In previous years, forecast data have been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to the more detailed report on waste volumes: WHC-EP0900, FY 1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary. Both of these documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on the types of containers that will be used for packaging low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major waste generators for each waste category and container type are also discussed. Containers used for low-level waste (LLW) are described in Appendix A, since LLW requires minimal treatment and storage prior to onsite disposal in the LLW burial grounds. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste are expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters.

  20. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protections: Sampling Protections: Sampling Protection #3: Sampling for known and unexpected contaminants August 1, 2013 Monitoring stormwater in Los Alamos Canyon Monitoring stormwater in Los Alamos Canyon The Environmental Sampling Board, a key piece of the Strategy, ensures that LANL collects relevant and appropriate data to answer questions about the protection of human and environmental health, and to satisfy regulatory requirements. LANL must demonstrate the data are technically justified

  1. MARVEL: A PC-based interactive software package for life-cycle evaluations of hybrid/electric vehicles

    SciTech Connect (OSTI)

    Marr, W.W.; He, J.

    1995-07-01

    As a life-cycle analysis tool, MARVEL has been developed for the evaluation of hybrid/electric vehicle systems. It can identify the optimal combination of battery and heat engine characteristics for different vehicle types and performance requirements, on the basis of either life-cycle cost or fuel efficiency. Battery models that allow trade-offs between specific power and specific energy, between cycle life and depth of discharge, between peak power and depth of discharge, and between other parameters, are included in the software. A parallel hybrid configuration, using an internal combustion engine and a battery as the power sources, can be simulated with a user-specified energy management strategy. The PC-based software package can also be used for cost or fuel efficiency comparisons among conventional, electric, and hybrid vehicles.

  2. Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.

    SciTech Connect (OSTI)

    Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M.

    2012-02-08

    A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

  3. Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities

    SciTech Connect (OSTI)

    Lu, Hongyou; Masanet, Eric; Price, Lynn

    2009-05-29

    The use of life-cycle assessment (LCA) to understand the embodied energy, environmental impacts, and potential energy-savings of manufactured products has become more widespread among researchers in recent years. This paper reviews recent LCA studies in the cement industry in China and in other countries and provides an assessment of the methodology used by the researchers compared to ISO LCA standards (ISO 14040:2006, ISO 14044:2006, and ISO/TR 14048:2002). We evaluate whether the authors provide information on the intended application, targeted audience, functional unit, system boundary, data sources, data quality assessment, data disaggregation and other elements, and draw conclusions regarding the level of adherence to ISO standards for the papers reviewed. We found that China researchers have gained much experience during last decade, but still have room for improvement in establishing boundaries, assessing data quality, identifying data sources, and explaining limitations. The paper concludes with a discussion of directions for future LCA research in China.

  4. Novel pathways for fuels and lubricants from biomass optimized using life-cycle greenhouse gas assessment

    SciTech Connect (OSTI)

    Balakrishnan, Madhesan; Sacia, Eric R.; Sreekumar, Sanil; Gunbas, Gorkem; Gokhale, Amit A.; Scown, Corinne D.; Toste, F. Dean; Bell, Alexis T.

    2015-06-08

    Decarbonizing the transportation sector is critical to achieving global climate change mitigation. Although biofuels will play an important role in conventional gasoline and diesel applications, bioderived solutions are particularly important in jet fuels and lubricants, for which no other viable renewable alternatives exist. Producing compounds for jet fuel and lubricant base oil applications often requires upgrading fermentation products, such as alcohols and ketones, to reach the appropriate molecular-weight range. Ketones possess both electrophilic and nucleophilic functionality, which allows them to be used as building blocks similar to alkenes and aromatics in a petroleum refining complex. Here, we develop a method for selectively upgrading biomass-derived alkyl methyl ketones with >95% yields into trimer condensates, which can then be hydrodeoxygenated in near-quantitative yields to give a new class of cycloalkane compounds. The basic chemistry developed here can be tailored for aviation fuels as well as lubricants by changing the production strategy. We demonstrate that a sugarcane biorefinery could use natural synergies between various routes to produce a mixture of lubricant base oils and jet fuels that achieve net life-cycle greenhouse gas savings of up to 80%.

  5. Novel pathways for fuels and lubricants from biomass optimized using life-cycle greenhouse gas assessment

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Balakrishnan, Madhesan; Sacia, Eric R.; Sreekumar, Sanil; Gunbas, Gorkem; Gokhale, Amit A.; Scown, Corinne D.; Toste, F. Dean; Bell, Alexis T.

    2015-06-08

    Decarbonizing the transportation sector is critical to achieving global climate change mitigation. Although biofuels will play an important role in conventional gasoline and diesel applications, bioderived solutions are particularly important in jet fuels and lubricants, for which no other viable renewable alternatives exist. Producing compounds for jet fuel and lubricant base oil applications often requires upgrading fermentation products, such as alcohols and ketones, to reach the appropriate molecular-weight range. Ketones possess both electrophilic and nucleophilic functionality, which allows them to be used as building blocks similar to alkenes and aromatics in a petroleum refining complex. Here, we develop a methodmore » for selectively upgrading biomass-derived alkyl methyl ketones with >95% yields into trimer condensates, which can then be hydrodeoxygenated in near-quantitative yields to give a new class of cycloalkane compounds. The basic chemistry developed here can be tailored for aviation fuels as well as lubricants by changing the production strategy. We demonstrate that a sugarcane biorefinery could use natural synergies between various routes to produce a mixture of lubricant base oils and jet fuels that achieve net life-cycle greenhouse gas savings of up to 80%.« less

  6. Life-cycle energy savings potential from aluminum-intensive vehicles

    SciTech Connect (OSTI)

    Stodolsky, F.; Vyas, A.; Cuenca, R.; Gaines, L.

    1995-07-01

    The life-cycle energy and fuel-use impacts of US-produced aluminum-intensive passenger cars and passenger trucks are assessed. The energy analysis includes vehicle fuel consumption, material production energy, and recycling energy. A model that stimulates market dynamics was used to project aluminum-intensive vehicle market shares and national energy savings potential for the period between 2005 and 2030. We conclude that there is a net energy savings with the use of aluminum-intensive vehicles. Manufacturing costs must be reduced to achieve significant market penetration of aluminum-intensive vehicles. The petroleum energy saved from improved fuel efficiency offsets the additional energy needed to manufacture aluminum compared to steel. The energy needed to make aluminum can be reduced further if wrought aluminum is recycled back to wrought aluminum. We find that oil use is displaced by additional use of natural gas and nonfossil energy, but use of coal is lower. Many of the results are not necessarily applicable to vehicles built outside of the United States, but others could be used with caution.

  7. Levelized life-cycle costs for four residue-collection systems and four gas-production systems

    SciTech Connect (OSTI)

    Thayer, G.R.; Rood, P.L.; Williamson, K.D. Jr.; Rollett, H.

    1983-01-01

    Technology characterizations and life-cycle costs were obtained for four residue-collection systems and four gas-production systems. All costs are in constant 1981 dollars. The residue-collection systems were cornstover collection, wheat-straw collection, soybean-residue collection, and wood chips from forest residue. The life-cycle costs ranged from $19/ton for cornstover collection to $56/ton for wood chips from forest residues. The gas-production systems were low-Btu gas from a farm-size gasifier, solar flash pyrolysis of biomass, methane from seaweed farms, and hydrogen production from bacteria. Life-cycle costs ranged from $3.3/10/sup 6/ Btu for solar flash pyrolysis of biomass to $9.6/10/sup 6/ Btu for hydrogen from bacteria. Sensitivity studies were also performed for each system. The sensitivity studies indicated that fertilizer replacement costs were the dominate costs for the farm-residue collection, while residue yield was most important for the wood residue. Feedstock costs were most important for the flash pyrolysis. Yields and capital costs are most important for the seaweed farm and the hydrogen from bacteria system.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  9. Influence of corn oil recovery on life-cycle greenhouse gas emissions of corn ethanol and corn oil biodiesel

    SciTech Connect (OSTI)

    Wang, Zhichao; Dunn, Jennifer B.; Han, Jeongwoo; Wang, Michael

    2015-11-04

    Corn oil recovery and conversion to biodiesel has been widely adopted at corn ethanol plants recently. The US EPA has projected 2.6 billion liters of biodiesel will be produced from corn oil in 2022. Corn oil biodiesel may qualify for federal renewable identification number (RIN) credits under the Renewable Fuel Standard, as well as for low greenhouse gas (GHG) emission intensity credits under California’s Low Carbon Fuel Standard. Because multiple products [ethanol, biodiesel, and distiller’s grain with solubles (DGS)] are produced from one feedstock (corn), however, a careful co-product treatment approach is required to accurately estimate GHG intensities of both ethanol and corn oil biodiesel and to avoid double counting of benefits associated with corn oil biodiesel production. This study develops four co-product treatment methods: (1) displacement, (2) marginal, (3) hybrid allocation, and (4) process-level energy allocation. Life-cycle GHG emissions for corn oil biodiesel were more sensitive to the choice of co-product allocation method because significantly less corn oil biodiesel is produced than corn ethanol at a dry mill. Corn ethanol life-cycle GHG emissions with the displacement, marginal, and hybrid allocation approaches are similar (61, 62, and 59 g CO2e/MJ, respectively). Although corn ethanol and DGS share upstream farming and conversion burdens in both the hybrid and process-level energy allocation methods, DGS bears a higher burden in the latter because it has lower energy content per selling price as compared to corn ethanol. As a result, with the process-level allocation approach, ethanol’s life-cycle GHG emissions are lower at 46 g CO2e/MJ. Corn oil biodiesel life-cycle GHG emissions from the marginal, hybrid allocation, and process-level energy allocation methods were 14, 59, and 45 g CO2e/MJ, respectively. Sensitivity analyses were conducted to investigate the influence corn oil yield, soy biodiesel, and

  10. Influence of corn oil recovery on life-cycle greenhouse gas emissions of corn ethanol and corn oil biodiesel

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wang, Zhichao; Dunn, Jennifer B.; Han, Jeongwoo; Wang, Michael

    2015-11-04

    Corn oil recovery and conversion to biodiesel has been widely adopted at corn ethanol plants recently. The US EPA has projected 2.6 billion liters of biodiesel will be produced from corn oil in 2022. Corn oil biodiesel may qualify for federal renewable identification number (RIN) credits under the Renewable Fuel Standard, as well as for low greenhouse gas (GHG) emission intensity credits under California’s Low Carbon Fuel Standard. Because multiple products [ethanol, biodiesel, and distiller’s grain with solubles (DGS)] are produced from one feedstock (corn), however, a careful co-product treatment approach is required to accurately estimate GHG intensities of bothmore » ethanol and corn oil biodiesel and to avoid double counting of benefits associated with corn oil biodiesel production. This study develops four co-product treatment methods: (1) displacement, (2) marginal, (3) hybrid allocation, and (4) process-level energy allocation. Life-cycle GHG emissions for corn oil biodiesel were more sensitive to the choice of co-product allocation method because significantly less corn oil biodiesel is produced than corn ethanol at a dry mill. Corn ethanol life-cycle GHG emissions with the displacement, marginal, and hybrid allocation approaches are similar (61, 62, and 59 g CO2e/MJ, respectively). Although corn ethanol and DGS share upstream farming and conversion burdens in both the hybrid and process-level energy allocation methods, DGS bears a higher burden in the latter because it has lower energy content per selling price as compared to corn ethanol. As a result, with the process-level allocation approach, ethanol’s life-cycle GHG emissions are lower at 46 g CO2e/MJ. Corn oil biodiesel life-cycle GHG emissions from the marginal, hybrid allocation, and process-level energy allocation methods were 14, 59, and 45 g CO2e/MJ, respectively. Sensitivity analyses were conducted to investigate the influence corn oil yield, soy biodiesel, and defatted DGS displacement

  11. Protecting Wildlife

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Wildlife Protecting Wildlife We monitor and protect the wildlife and their habitats on Laboratory property. February 2, 2015 Mule deer on LANL property LANL has been home to mule deer since its creation in 1942 and has seasonally been home to elk since their reintroduction to New Mexico in the 1960s. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Protecting our wildlife Since the early 1940s, LANL's

  12. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection 3: Sampling for known and unexpected contaminants August 1, 2013 Monitoring stormwater in Los Alamos Canyon Monitoring stormwater in Los Alamos Canyon The Environmental ...

  13. Glass Composition Constraint Recommendations for Use in Life-Cycle Mission Modeling

    SciTech Connect (OSTI)

    McCloy, John S.; Vienna, John D.

    2010-05-03

    The component concentration limits that most influence the predicted Hanford life-cycle HLW glass volume by HTWOS were re-evaluated. It was assumed that additional research and development work in glass formulation and melter testing would be performed to improve the understanding of component effects on the processability and product quality of these HLW glasses. Recommendations were made to better estimate the potential component concentration limits that could be applied today while technology development is underway to best estimate the volume of HLW glass that will eventually be produced at Hanford. The limits for concentrations of P2O5, Bi2O3, and SO3 were evaluated along with the constraint used to avoid nepheline formation in glass. Recommended concentration limits were made based on the current HLW glass property models being used by HTWOS (Vienna et al. 2009). These revised limits are: 1) The current ND should be augmented by the OB limit of OB ≤ 0.575 so that either the normalized silica (NSi) is less that the 62% limit or the OB is below the 0.575 limit. 2) The mass fraction of P2O5 limit should be revised to allow for up to 4.5 wt%, depending on CaO concentrations. 3) A Bi2O3 concentration limit of 7 wt% should be used. 4) The salt accumulation limit of 0.5 wt% SO3 may be increased to 0.6 wt%. Again, these revised limits do not obviate the need for further testing, but make it possible to more accurately predict the impact of that testing on ultimate HLW glass volumes.

  14. A life-cycle model approach to multimedia waste reduction measuring performance for environmental cleanup projects

    SciTech Connect (OSTI)

    Phifer, B.E. Jr.; George, S.M.

    1993-07-01

    The Martin Marietta Energy Systems, Inc. (Energy Systems), Environmental Restoration (ER) Program adopted a Pollution Prevention Program in March 1991. The program`s mission is to minimize waste and prevent pollution in remedial investigations (RIs), feasibility studies, decontamination and decommissioning, and surveillance and maintenance site program activities. Mission success will result in volume and/or toxicity reduction of generated waste. The ER Program waste generation rates are projected to steadily increase through the year 2005 for all waste categories. Standard production units utilized to measure waste minimization apply to production/manufacturing facilities. Since ER inherited contaminated waste from previous production processes, no historical production data can be applied. Therefore, a more accurate measure for pollution prevention was identified as a need for the ER Program. The Energy Systems ER Program adopted a life-cycle model approach and implemented the concept of numerically scoring their waste generators to measure the effectiveness of pollution prevention/waste minimization programs and elected to develop a numerical scoring system (NSS) to accomplish these measurements. The prototype NSS, a computerized, user-friendly information management database system, was designed to be utilized in each phase of the ER Program. The NSS was designed to measure a generator`s success in incorporating pollution prevention in their work plans and reducing investigation-derived waste (IDW) during RIs. Energy Systems is producing a fully developed NSS and actually scoring the generators of IDW at six ER Program sites. Once RI waste generators are scored utilizing the NSS, the numerical scores are distributed into six performance categories: training, self-assessment, field implementation, documentation, technology transfer, and planning.

  15. Fire Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-05

    This Standard was developed to provide acceptable methods and approaches for meeting DOE fire protection program and design requirements and to address special or unique fire protection issues at DOE facilities that are not comprehensively or adequately addressed in national consensus standards or other design criteria.

  16. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  17. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  18. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, David E.; Czanderna, Alvin W.; Kennedy, Cheryl E.

    1996-01-01

    A protective diffusion barrier having adhesive qualifies for metalized surfaces is provided by a passivating agent having the formula HS--(CH.sub.2).sub.11 --COOH Which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces.

  19. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, D.E.; Czanderna, A.W.; Kennedy, C.E.

    1996-01-30

    A protective diffusion barrier having adhesive qualities for metalized surfaces is provided by a passivating agent having the formula HS--(CH{sub 2}){sub 11}--COOH which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces. 8 figs.

  20. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for management and operation of the DOE Protective Force (PF), establishes requirements for firearms operations and defines the firearms courses of fire. Cancels: DOE M 473.2-1A DOE M 473.2-2

  1. Fire Protection

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... room application. (Refer to NFPA 318, Standard for the Protection of Semiconductor Fabrication Facilities.) See also Appendix A of DOE-STD-1066-99 for information on other types ...

  2. Corrosion protection

    DOE Patents [OSTI]

    Brown, Donald W.; Wagh, Arun S.

    2003-05-27

    There has been invented a chemically bonded phosphate corrosion protection material and process for application of the corrosion protection material for corrosion prevention. A slurry of iron oxide and phosphoric acid is used to contact a warm surface of iron, steel or other metal to be treated. In the presence of ferrous ions from the iron, steel or other metal, the slurry reacts to form iron phosphates which form grains chemically bonded onto the surface of the steel.

  3. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-03-07

    The manual establishes requirements for management and operation of the DOE Protective Force, establishes requirements for firearms operations and defines the firearms courses of fire. Chg 1 dated 3/7/06. DOE M 470.4-3A cancels DOE M 470.4-3, Chg 1, Protective Force, dated 3-7-06, Attachment 2, Contractor Requirement Document (CRD) only (except for Section C). Chg 1, dated 3-7-06, cancels DOE M 470.4-3

  4. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Chg 1, dated 3/7/06. Cancels: DOE M 473.1-1 and DOE M 471.2-1B

  5. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Cancels: DOE M 473.1-1 and DOE M 471.2-1B.

  6. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.

    1986-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  7. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.

    1987-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  8. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O.; Ruka, Roswell J.; Zymboly, Gregory E.

    1985-01-01

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  9. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  10. ORISE: Human Subjects Protection Resource Protection Book

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Protection Resource Book The Human Subjects Protection Resource Book synthesizes information currently available on the protection of human subjects in research, the ...

  11. Physical protection

    SciTech Connect (OSTI)

    Myre, W.C.; DeMontmollin, J.M. )

    1989-07-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratories which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by insiders .

  12. weapons material protection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material protection

  13. Preliminary evaluation of the lifecycle costs and market barriers of reflective pavements

    SciTech Connect (OSTI)

    Ting, M.; Koomey, J.G.; Pomerantz, M.

    2001-11-21

    , which we call the chipping and aggregate methods, and calculated their potential life cycle costs. By analyzing the potential for increased pavement durability resulting from these conceptual approaches, we then estimated the incremental costs that would allow them to be cost-effective compared to conventional AC. For our example case of Los Angeles, we found that those allowable incremental costs range from less than dollar 1 to more than dollar 11 per square yard (dollar 1 to dollar 13 per square meter) depending on street type and the condition of the original pavement. Finally, we evaluated the main actors in the pavement market and the existing and potential market barriers associated with reflective pavements. Apart from situations where lifecycle costs are high compared to conventional AC, all reflective paving technologies face a cultural barrier based on the belief that black is better. For PCC, high first costs were found to be the most significant economic barrier, particularly where agencies are cons trained by first cost. Lack of developer standards was found to be a significant institutional barrier to PCC since developers are often not held accountable for the long-term maintenance of roads after initial construction, which creates a misplaced incentive to build low first-cost pavements. PCC also faces site-specific barriers such as poorly compacted base soils and proximity to areas of frequent utility cutting.

  14. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-23

    This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys (DOEs) purview ranging from facilities, buildings, Government property, and employees to national security interests such as classified information, special nuclear material (SNM), and nuclear weapons. Cancels Section A of DOE M 470.4-2 Chg 1. Canceled by DOE O 473.3.

  15. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  16. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  17. Life-cycle assessment of municipal solid waste management alternatives with consideration of uncertainty: SIWMS development and application

    SciTech Connect (OSTI)

    El Hanandeh, Ali; El-Zein, Abbas

    2010-05-15

    This paper describes the development and application of the Stochastic Integrated Waste Management Simulator (SIWMS) model. SIWMS provides a detailed view of the environmental impacts and associated costs of municipal solid waste (MSW) management alternatives under conditions of uncertainty. The model follows a life-cycle inventory approach extended with compensatory systems to provide more equitable bases for comparing different alternatives. Economic performance is measured by the net present value. The model is verified against four publicly available models under deterministic conditions and then used to study the impact of uncertainty on Sydney's MSW management 'best practices'. Uncertainty has a significant effect on all impact categories. The greatest effect is observed in the global warming category where a reversal of impact direction is predicted. The reliability of the system is most sensitive to uncertainties in the waste processing and disposal. The results highlight the importance of incorporating uncertainty at all stages to better understand the behaviour of the MSW system.

  18. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  19. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  20. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  1. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  2. Waters LANL Protects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waters LANL Protects Waters LANL Protects LANL watersheds source in the Jemez Mountains and end at the Rio Grande.

  3. Comparative life-cycle energy payback analysis of multi-junction a-SiGe and nanocrystalline/a-Si modules

    SciTech Connect (OSTI)

    Fthenakis, V.; Kim, H.

    2010-07-15

    Despite the publicity of nanotechnologies in high tech industries including the photovoltaic sector, their life-cycle energy use and related environmental impacts are understood only to a limited degree as their production is mostly immature. We investigated the life-cycle energy implications of amorphous silicon (a-Si) PV designs using a nanocrystalline silicon (nc-Si) bottom layer in the context of a comparative, prospective life-cycle analysis framework. Three R and D options using nc-Si bottom layer were evaluated and compared to the current triple-junction a-Si design, i.e., a-Si/a-SiGe/a-SiGe. The life-cycle energy demand to deposit nc-Si was estimated from parametric analyses of film thickness, deposition rate, precursor gas usage, and power for generating gas plasma. We found that extended deposition time and increased gas usages associated to the relatively high thickness of nc-Si lead to a larger primary energy demand for the nc-Si bottom layer designs, than the current triple-junction a-Si. Assuming an 8% conversion efficiency, the energy payback time of those R and D designs will be 0.7-0.9 years, close to that of currently commercial triple-junction a-Si design, 0.8 years. Future scenario analyses show that if nc-Si film is deposited at a higher rate (i.e., 2-3 nm/s), and at the same time the conversion efficiency reaches 10%, the energy-payback time could drop by 30%.

  4. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncoveredmore » that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.« less

  5. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    SciTech Connect (OSTI)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncovered that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.

  6. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  7. Physical protection technologies for the reconfigured weapons complex

    SciTech Connect (OSTI)

    Jaeger, C.D.

    1994-08-01

    Sandia National Laboratories was a memtier of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S&S) team providing assistance to the Department of Energy`s (DOE) Office of Weapons Complex Reconfigaration. New and improved S&S concepts, approaches and technologies were needed to support both new and upgraded facilities. Physical protection technologies used in these facilities were to use proven state-of-the-art systems in such areas as image processing, alarm communications and display, entry control, contraband detection, intrusion detection and video assessment, access delay, automation and robotics, and various insider protection systems. Factors considered in the selection of these technologies were protection against the design basis threat, reducing S&S life-cycle costs, automation of S&S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, increasing the amount of delay to an outsider adversary and having reliable and maintainable systems. This paper will discuss the S&S issues, requirements, technology opportunities and needs. Physical protection technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed.

  8. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  9. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    SciTech Connect (OSTI)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  10. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C.E.; Benson, D.K.

    1984-07-20

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate prior to metal deposition thereon to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  11. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C. Edwin; Benson, David K.

    1988-01-01

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate before metal deposition to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  12. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  13. Encapsulants for protecting MEMS devices during post-packaging release etch

    DOE Patents [OSTI]

    Peterson, Kenneth A.

    2005-10-18

    The present invention relates to methods to protect a MEMS or microsensor device through one or more release or activation steps in a "package first, release later" manufacturing scheme: This method of fabrication permits wirebonds, other interconnects, packaging materials, lines, bond pads, and other structures on the die to be protected from physical, chemical, or electrical damage during the release etch(es) or other packaging steps. Metallic structures (e.g., gold, aluminum, copper) on the device are also protected from galvanic attack because they are protected from contact with HF or HCL-bearing solutions.

  14. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-04-30

    {alpha} - Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}). The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor.

  15. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-08-31

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray onto to the surface of YSZ coating. Oxidation at high temperature and hot corrosion tests showed that Al{sub 2}O{sub 3} overlay deposited on the YSZ TBCs surface can not only reduce the hot corrosion rate, but also significantly prevents the bond coat from oxidation.

  16. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  17. Protections = Defenses in Depth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protections: Cleanup Cleanup 101 Corrective Measures Process Protection 1: Remove the Source Example Cleanup: Removal of Polychlorinated Biphenyls from Hillside 140 Environmental ...

  18. Office of Physical Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Physical Protection is comprised of a team of security specialists engaged in providing Headquarters-wide physical protection.

  19. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    This program demonstrates acceptable methods and examples to assist each DOE site in meeting the fire protection objectives provided in DOE Order 5480.7A, "Fire Protection."

  20. ORISE: Protecting Human Subjects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Human Subjects Protecting Human Subjects The U.S. Department of Energy (DOE) Human Subjects Research Program exists to ensure that all research conducted at DOE ...

  1. Fire Protection Program

    Broader source: Energy.gov [DOE]

    Department of Energy (DOE) Fire Protection Program provides published fire safety directives (orders, standards, and guidance documents), a range of oversight activities, an annual fire protection program summary.

  2. Voluntary Protection Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Voluntary Protection Program

  3. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  4. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  5. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  6. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  7. Prospective life-cycle modeling of a carbon capture and storage system using metal-organic frameworks for CO2 capture

    SciTech Connect (OSTI)

    Sathre, R; Masanet, E

    2013-01-01

    Metal-organic frameworks (MOFs) are promising new material media for carbon dioxide (CO2) capture. Their tunable adsorption patterns may allow relatively efficient separation of gases, e.g. from power plant exhaust. Here we conduct scenario-based prospective life-cycle system modeling to estimate the potentials and implications of large-scale MOF application for post-combustion carbon capture and storage (CCS), and estimate the source and magnitude of uncertainties. The methodological approach includes parametric system modeling to quantify relations between system components; scenario projections of plausible pathways for system scale-up; proxy data on analogous materials and processes; and uncertainty analysis of parameter significance. We estimate the system-wide material and energy flows and economic costs associated with projected large-scale CCS deployment. We compare the performance of a MOF-based system to currently more mature amine-based capture technology. We discuss balancing two critical factors that determine the success of CO2 capture media: thermodynamic efficiency of the capture/regeneration cycle, and life-cycle embodied energy and cost of the material and its ancillary systems.

  8. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  9. Incorporating Agricultural Management Practices into the Assessment of Soil Carbon Change and Life-Cycle Greenhouse Gas Emissions of Corn Stover Ethanol Production

    SciTech Connect (OSTI)

    Qin, Zhangcai; Canter, Christina E.; Dunn, Jennifer B.; Mueller, Steffen; Kwon, Ho-young; Han, Jeongwoo; Wander, Michelle M.; Wang, Michael

    2015-09-01

    Land management practices such as cover crop adoption or manure application that can increase soil organic carbon (SOC) may provide a way to counter SOC loss upon removal of stover from corn fields for use as a biofuel feedstock. This report documents the data, methodology, and assumptions behind the incorporation of land management practices into corn-soybean systems that dominate U.S. grain production using varying levels of stover removal in the GREETTM (Greenhouse gases, Regulated Emissions, and Energy use in Transportation) model and its CCLUB (Carbon Calculator for Land Use change from Biofuels production) module. Tillage (i.e., conventional, reduced and no tillage), corn stover removal (i.e., at 0, 30% and 60% removal rate), and organic matter input techniques (i.e., cover crop and manure application) are included in the analysis as major land management practices. Soil carbon changes associated with land management changes were modeled with a surrogate CENTURY model. The resulting SOC changes were incorporated into CCLUB while GREET was expanded to include energy and material consumption associated with cover crop adoption and manure application. Life-cycle greenhouse gas (GHG) emissions of stover ethanol were estimated using a marginal approach (all burdens and benefits assigned to corn stover ethanol) and an energy allocation approach (burdens and benefits divided between grain and stover ethanol). In the latter case, we considered corn grain and corn stover ethanol to be produced at an integrated facility. Life-cycle GHG emissions of corn stover ethanol are dependent upon the analysis approach selected (marginal versus allocation) and the land management techniques applied. The expansion of CCLUB and GREET to accommodate land management techniques can produce a wide range of results because users can select from multiple scenario options such as choosing tillage levels, stover removal rates, and whether crop yields increase annually or remain constant

  10. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  11. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  12. Voluntary Protection Program Announcement

    Broader source: Energy.gov [DOE]

    Secretary O'Leary formally announced a new initiative, "The Department of Energy Voluntary Protection Program (DOEVPP)," which is designed to recognize contractor sites that are providing excellent safety and health protection to their employees.

  13. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30

    Provides detailed requirements to supplement DOE O 473.2, Protective Force Program, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Does not cancel other directives.

  14. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-14

    This Order establishes requirements for the management and operation of the Department of Energy (DOE) Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE.

  15. Fire Protection Program Metrics

    Broader source: Energy.gov [DOE]

    Presenter: Perry E. D ’Antonio, P.E., Acting Sr. Manager, Fire Protection - Sandia National Laboratories

  16. Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

    SciTech Connect (OSTI)

    Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

    2008-03-28

    The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

  17. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    To facilitate conformance with its fire safety directives and the implementation of a comprehensive fire protection program, DOE has developed a number of "model" program documents. These include a comprehensive model fire protection program, model fire hazards analyses and assessments, fire protection system inspection and testing procedures, and related material.

  18. Corium protection assembly

    DOE Patents [OSTI]

    Gou, Perng-Fei; Townsend, Harold E.; Barbanti, Giancarlo

    1994-01-01

    A corium protection assembly includes a perforated base grid disposed below a pressure vessel containing a nuclear reactor core and spaced vertically above a containment vessel floor to define a sump therebetween. A plurality of layers of protective blocks are disposed on the grid for protecting the containment vessel floor from the corium.

  19. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  20. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  1. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  2. METHOD OF FORMING A PROTECTIVE COATING ON FERROUS METAL SURFACES

    DOE Patents [OSTI]

    Schweitzer, D.G.; Weeks, J.R.; Kammerer, O.F.; Gurinsky, D.H.

    1960-02-23

    A method is described of protecting ferrous metal surfaces from corrosive attack by liquid metals, such as liquid bismuth or lead-bismuth alloys. The nitrogen content of the ferrous metal surface is first reduced by reacting the metal surface with a metal which forms a stable nitride. Thereafter, the surface is contacted with liquid metal containing at least 2 ppm zirconium at a temperature in the range of 550 to 1100 deg C to form an adherent zirconium carbide layer on the ferrous surface.

  3. Chavez Position Paper for DHS Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chavez Position Paper for DHS Workshop on Future Directions in Cyber-physical Systems Security, July 22-24, 2009 Page 1 Position Paper: Protecting Process Control Systems against Lifecycle Attacks Using Trust Anchors Adrian R Chavez Sandia National Laboratories 1 adrchav@sandia.gov Abstract Critical infrastructure systems are vulnerable to physical and cyber attack. Securing these systems is a top priority for the U.S., but ongoing efforts ignore important aspects of the information technology

  4. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  5. Fire Protection Program Manual

    SciTech Connect (OSTI)

    Sharry, J A

    2012-05-18

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  6. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  7. Long- vs. short-term energy storage technologies analysis : a life-cycle cost study : a study for the DOE energy storage systems program.

    SciTech Connect (OSTI)

    Schoenung, Susan M.; Hassenzahl, William V.

    2003-08-01

    This report extends an earlier characterization of long-duration and short-duration energy storage technologies to include life-cycle cost analysis. Energy storage technologies were examined for three application categories--bulk energy storage, distributed generation, and power quality--with significant variations in discharge time and storage capacity. More than 20 different technologies were considered and figures of merit were investigated including capital cost, operation and maintenance, efficiency, parasitic losses, and replacement costs. Results are presented in terms of levelized annual cost, $/kW-yr. The cost of delivered energy, cents/kWh, is also presented for some cases. The major study variable was the duration of storage available for discharge.

  8. Assessment of potential life-cycle energy and greenhouse gas emission effects from using corn-based butanol as a transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2008-01-01

    Since advances in the ABE (acetone-butanol-ethanol) fermentation process in recent years have led to significant increases in its productivity and yields, the production of butanol and its use in motor vehicles have become an option worth evaluating. This study estimates the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. It employs a well-to-wheels (WTW) analysis tool: the Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model. The estimates of life-cycle energy use and greenhouse gas (GHG) emissions are based on an Aspen Plus(reg. sign) simulation for a corn-to-butanol production process, which describes grain processing, fermentation, and product separation. Bio-butanol-related WTW activities include corn farming, corn transportation, butanol production, butanol transportation, and vehicle operation. In this study, we also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. We then compared the results for bio-butanol with those of conventional gasoline. Our study shows that driving vehicles fueled with corn-based butanol produced by the current ABE fermentation process could result in substantial fossil energy savings (39%-56%) and avoid large percentage of the GHG emission burden, yielding a 32%-48% reduction relative to using conventional gasoline. On energy basis, a bushel of corn produces less liquid fuel from the ABE process than that from the corn ethanol dry mill process. The coproduction of a significant portion of acetone from the current ABE fermentation presents a challenge. A market analysis of acetone, as well as research and development on robust alternative technologies and processes that minimize acetone while increase the butanol yield, should be conducted.

  9. Risk analysis tools for force protection and infrastructure/asset protection

    SciTech Connect (OSTI)

    Jaeger, C.D.; Duggan, R.A.; Paulus, W.K.

    1998-09-01

    The Security Systems and Technology Center at Sandia National Laboratories has for many years been involved in the development and use of vulnerability assessment and risk analysis tools. In particular, two of these tools, ASSESS and JTS, have been used extensively for Department of Energy facilities. Increasingly, Sandia has been called upon to evaluate critical assets and infrastructures, support DoD force protection activities and assist in the protection of facilities from terrorist attacks using weapons of mass destruction. Sandia is involved in many different activities related to security and force protection and is expanding its capabilities by developing new risk analysis tools to support a variety of users. One tool, in the very early stages of development, is EnSURE, Engineered Surety Using the Risk Equation. EnSURE addresses all of the risk equation and integrates the many components into a single, tool-supported process to help determine the most cost-effective ways to reduce risk. This paper will briefly discuss some of these risk analysis tools within the EnSURE framework.

  10. Respiratory Protection Program

    Broader source: Energy.gov [DOE]

    This page is supported by the Respiratory Protection Program Administrators Group. The Respiratory Protection Program Administrators Group is a volunteer organization co-sponsored by the DOE Office of Worker Safety and Health Policy and the Energy Facility Contractors Group (EFCOG) to provide a forum for DOE and DOE contractor personnel to identify respiratory protection issues of concern to the DOE and pursue solutions to issues identified.

  11. Protective Actions and Reentry

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume defines appropriate protective actions and reentry of a site following an emergency. Canceled by DOE G 151.1-4.

  12. ORISE: Human Subjects Protection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Protection The Oak Ridge Institute for Science and Education (ORISE) ... U.S. Department of Energy (DOE) laboratories involved in human subjects research projects. ...

  13. Physical Protection Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Supplements DOE O 473.1, by establishing requirements for the physical protection of safeguards and security interests. Cancels: DOE M 5632.1C-1

  14. Asset Protection Analysis Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-21

    The Guide provides examples of the application of as set protection analysis to several common problems. Canceled by DOE N 251.80.

  15. Environmental Protection: Controlling the Present

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection community-environmentassetsimagesiconearthday.jpg Environmental Protection: Controlling the Present The Laboratory is committed to increasing sustainable practices...

  16. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  17. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  18. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ă?Â?Ă?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  19. Environmental protection Implementation Plan

    SciTech Connect (OSTI)

    R. C. Holland

    1999-12-01

    This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

  20. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The order establishes Department of Energy (DOE) procedures and responsibilities for implementing the policy and requirements set forth in 10 Code of Federal Regulations (CFR) Part 745, Protection of Human Subjects; and in DOE P 443.1A, Protection of Human Subjects, dated 12-20-07. Cancels DOE O 443.1. Canceled by DOE O 443.1B.

  1. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    To establish DOE procedures and responsibilities for implementing the policy and requirements set forth in 10 CFR Part 745, Protection of Human Subjects, ad in DOE P 443.1, Policy on the Protection of Human Subjects. Cancels DOE O 1300.3. Canceled by DOE O 443.1A.

  2. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-12-20

    Provides detailed requirements to supplement DOE O 473.2, PROTECTIVE FORCE PROGRAM, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Change 1 revised pages in Chapters IV and VI on 12/20/2001.

  3. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Cancels DOE 5400.1 and DOE N 450.4.

  4. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-03-23

    The Order establishes requirements for the management and operation of the DOE Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE. Supersedes DOE O 473.3. NOTE: Safeguards and Security Alarm Management and Control Systems, of DOE O 473.3, is retained as Attachment 3, Annex 1.

  5. Fire protection design criteria

    SciTech Connect (OSTI)

    1997-03-01

    This Standard provides supplemental fire protection guidance applicable to the design and construction of DOE facilities and site features (such as water distribution systems) that are also provided for fire protection. It is intended to be used in conjunction with the applicable building code, national Fire Protection Association Codes and Standards, and any other applicable DOE construction criteria. This Standard, along with other delineated criteria, constitutes the basic criteria for satisfying DOE fire and life safety objectives for the design and construction or renovation of DOE facilities.

  6. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Policy is to establish DOE-specific principles for the protection of human subjects involved in DOE research. Cancels DOE P 443.1. Canceled by DOE O 443.1B

  7. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    The purpose of this Policy is to establish DOE-specific policy for the protection of human subjects involved in DOE research. Canceled by DOE P 443.1A.

  8. CALUTRON PROTECTIVE CIRCUIT

    DOE Patents [OSTI]

    Schmidt, F.H.

    1959-05-26

    A switch and relay circuit is described for protection of calutrons. By means of this arrangement no arc can be established in the arc chamber unless cooling water flow is established. (T.R.H.)

  9. Physical Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Establishes Department of Energy management objectives, requirements and responsibilities for the physical protection of safeguards and security interests. Cancels DOE 5632.1C. Canceled by DOE O 470.4.

  10. Protective Force Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-02-13

    To prescribe Department of Energy policy, responsibilities, and requirements for the management and operation of the Protective Force Program. Chg 1 dated 2-13-95. Cancels DOE O 5632.7 and DOE O 5632.8.

  11. Federal Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-15

    This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

  12. Environmental Protection, Safety, and Health Protection Program for DOE Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1980-05-05

    This order establishes the Environmental Protection, Safety, and Health Protection Program for Department of Energy (DOE) operations. Cancels Interim Management Directive No. 5001, Safety, Health And Environmental Protection dated 9-29-77.

  13. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Chg 1, dated 1-24-05; Chg 2, dated 12-7-05; Admin Chg 1, dated 1-3-07. Cancels DOE 5400.1 and DOE N 450.4.

  14. Protecting Against Nuclear Threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Against Nuclear Threats Protecting Against Nuclear Threats Los Alamos' mission is to solve national security challenges through scientific excellence. April 12, 2012 Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports: MagViz project leader Michelle Espy demonstrates the MagViz liquid detection and analysis system in the Albuquerque International Sunport.

  15. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-06-04

    The objective is to implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by DOE operations, and meet or exceed compliance with applicable environmental, public health, and resource protection requirements cost effectively. The revision provides specific expectations for implementation of Executive Order 13423, Strengthening Federal Environment, Energy, and Transportation Management. Cancels DOE O 450.1. Canceled by DOE O 436.1.

  16. Voluntary Protection Program- Basics

    Broader source: Energy.gov [DOE]

    The Department of Energy Voluntary Protection Program (DOE-VPP) promotes safety and health excellence through cooperative efforts among labor, management, and government at the Department of Energy (DOE) contractor sites. DOE has also formed partnerships with other Federal agencies and the private sector for both advancing and sharing its Voluntary Protection Program (VPP) experiences and preparing for program challenges in the next century. The safety and health of contractor and federal employees are a high priority for the Department.

  17. Protecting your personal information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting your personal information Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: September 1, 2016 all issues All Issues » submit Protecting your personal information Quantum cryptography keeps data secure from cyber thieves October 1, 2014 Mass-producible quantum smart card and fiber optics cable. Mass-producible quantum smart card and fiber optics cable. Contact Community Programs Director Kurt Steinhaus Email Editor Ute Haker

  18. General Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1990-06-29

    To establish environmental protection program requirements, authorities, and responsibilities for Department of Energy (DOE) Operations for assuring compliance with applicable Federal, State and local environmental protection laws and regulations, Executive Orders, and internal Department policies. Cancels DOE O 5480.1A. Para. 2b, 4b, and 4c of Chap. II and para. 2d and 3b of Chap. III canceled by DOE O 231.1.

  19. Advanced worker protection system

    SciTech Connect (OSTI)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-10-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment.

  20. Collaborative Defense of Transmission and Distribution Protection...

    Office of Environmental Management (EM)

    ... (R&D) program, which aims to enhance the reliability and resilience of the nation's energy infrastructure by reducing the risk of energy disruptions due to cyber attacks. ...

  1. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  2. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  3. Comparisons of four categories of waste recycling in China's paper industry based on physical input-output life-cycle assessment model

    SciTech Connect (OSTI)

    Liang Sai; Zhang, Tianzhu; Xu Yijian

    2012-03-15

    Highlights: Black-Right-Pointing-Pointer Using crop straws and wood wastes for paper production should be promoted. Black-Right-Pointing-Pointer Bagasse and textile waste recycling should be properly limited. Black-Right-Pointing-Pointer Imports of scrap paper should be encouraged. Black-Right-Pointing-Pointer Sensitivity analysis, uncertainties and policy implications are discussed. - Abstract: Waste recycling for paper production is an important component of waste management. This study constructs a physical input-output life-cycle assessment (PIO-LCA) model. The PIO-LCA model is used to investigate environmental impacts of four categories of waste recycling in China's paper industry: crop straws, bagasse, textile wastes and scrap paper. Crop straw recycling and wood utilization for paper production have small total intensity of environmental impacts. Moreover, environmental impacts reduction of crop straw recycling and wood utilization benefits the most from technology development. Thus, using crop straws and wood (including wood wastes) for paper production should be promoted. Technology development has small effects on environmental impacts reduction of bagasse recycling, textile waste recycling and scrap paper recycling. In addition, bagasse recycling and textile waste recycling have big total intensity of environmental impacts. Thus, the development of bagasse recycling and textile waste recycling should be properly limited. Other pathways for reusing bagasse and textile wastes should be explored and evaluated. Moreover, imports of scrap paper should be encouraged to reduce large indirect impacts of scrap paper recycling on domestic environment.

  4. Optimization and life-cycle cost of health clinic PV system for a rural area in southern Iraq using HOMER software

    SciTech Connect (OSTI)

    Al-Karaghouli, Ali; Kazmerski, L.L.

    2010-04-15

    This paper addresses the need for electricity of rural areas in southern Iraq and proposes a photovoltaic (PV) solar system to power a health clinic in that region. The total daily health clinic load is 31.6 kW h and detailed loads are listed. The National Renewable Energy Laboratory (NREL) optimization computer model for distributed power, ''HOMER,'' is used to estimate the system size and its life-cycle cost. The analysis shows that the optimal system's initial cost, net present cost, and electricity cost is US$ 50,700, US$ 60,375, and US$ 0.238/kW h, respectively. These values for the PV system are compared with those of a generator alone used to supply the load. We found that the initial cost, net present cost of the generator system, and electricity cost are US$ 4500, US$ 352,303, and US$ 1.332/kW h, respectively. We conclude that using the PV system is justified on humanitarian, technical, and economic grounds. (author)

  5. Comparative analysis of the production costs and life-cycle GHG emissions of FT liquid fuels from coal and natural gas

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews

    2008-10-15

    Liquid transportation fuels derived from coal and natural gas could help the United States reduce its dependence on petroleum. The fuels could be produced domestically or imported from fossil fuel-rich countries. The goal of this paper is to determine the life-cycle GHG emissions of coal- and natural gas-based Fischer-Tropsch (FT) liquids, as well as to compare production costs. The results show that the use of coal- or natural gas-based FT liquids will likely lead to significant increases in greenhouse gas (GHG) emissions compared to petroleum-based fuels. In a best-case scenario, coal- or natural gas-based FT-liquids have emissions only comparable to petroleum-based fuels. In addition, the economic advantages of gas-to-liquid (GTL) fuels are not obvious: there is a narrow range of petroleum and natural gas prices at which GTL fuels would be competitive with petroleum-based fuels. CTL fuels are generally cheaper than petroleum-based fuels. However, recent reports suggest there is uncertainty about the availability of economically viable coal resources in the United States. If the U.S. has a goal of increasing its energy security, and at the same time significantly reducing its GHG emissions, neither CTL nor GTL consumption seem a reasonable path to follow. 28 refs., 2 figs., 4 tabs.

  6. Life-cycle cost comparisons of advanced storage batteries and fuel cells for utility, stand-alone, and electric vehicle applications

    SciTech Connect (OSTI)

    Humphreys, K.K.; Brown, D.R.

    1990-01-01

    This report presents a comparison of battery and fuel cell economics for ten different technologies. To develop an equitable economic comparison, the technologies were evaluated on a life-cycle cost (LCC) basis. The LCC comparison involved normalizing source estimates to a standard set of assumptions and preparing a lifetime cost scenario for each technology, including the initial capital cost, replacement costs, operating and maintenance (O M) costs, auxiliary energy costs, costs due to system inefficiencies, the cost of energy stored, and salvage costs or credits. By considering all the costs associated with each technology over its respective lifetime, the technology that is most economical to operate over any given period of time can be determined. An analysis of this type indicates whether paying a high initial capital cost for a technology with low O M costs is more or less economical on a lifetime basis than purchasing a technology with a low initial capital cost and high O M costs. It is important to realize that while minimizing cost is important, the customer will not always purchase the least expensive technology. The customer may identify benefits associated with a more expensive option that make it the more attractive over all (e.g., reduced construction lead times, modularity, environmental benefits, spinning reserve, etc.). The LCC estimates presented in this report represent three end-use applications: utility load-leveling, stand-alone power systems, and electric vehicles.

  7. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R. Michael

    1991-01-01

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device.

  8. Protective sheath for a continuous measurement thermocouple

    DOE Patents [OSTI]

    Phillippi, R.M.

    1991-12-03

    Disclosed is a protective thermocouple sheath of a magnesia graphite refractory material for use in continuous temperature measurements of molten metal in a metallurgical ladle and having a basic slag layer thereon. The sheath includes an elongated torpedo-shaped sheath body formed of a refractory composition and having an interior borehole extending axially therethrough and adapted to receive a thermocouple. The sheath body includes a lower end which is closed about the borehole and forms a narrow, tapered tip. The sheath body also includes a first body portion integral with the tapered tip and having a relatively constant cross section and providing a thin wall around the borehole. The sheath body also includes a second body portion having a relatively constant cross section larger than the cross section of the first body portion and providing a thicker wall around the borehole. The borehole terminates in an open end at the second body portion. The tapered tip is adapted to penetrate the slag layer and the thicker second body portion and its magnesia constituent material are adapted to withstand chemical attack thereon from the slag layer. The graphite constituent improves thermal conductivity of the refractory material and, thus, enhances the thermal responsiveness of the device. 4 figures.

  9. Protection of the Groundwater Resource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection of the Groundwater Resource Protection of the Groundwater Resource Monitoring wells act as sentinels between suspected LANL contamination and the water supply. August 1,...

  10. Protections: Sediment Control = Contaminant Retention

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sediment Control Protections: Sediment Control Contaminant Retention LANL maintains hundreds of wells, stream sampling stations and stormwater control structures to protect...