Sample records for lighting outdoor security

  1. MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS

    E-Print Network [OSTI]

    California at Davis, University of

    MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION 5 Additions and Alterations Any alteration that increases the connected lighting load must meet all No measures required OUTDOOR LIGHTING11/20/2014 #12;SECTION 5 BACKLIGHT, UPLIGHT, AND GLARE (BUG) RATINGS

  2. MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS

    E-Print Network [OSTI]

    California at Davis, University of

    MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION level of each multi-tier garage. · General lighting must have occupant sensing controls with at least one control step between 20% and 50% of design lighting power · No more than 500 watts of rated

  3. High Performance Outdoor Lighting Accelerator

    Broader source: Energy.gov [DOE]

    Hosted by the U.S. Department of Energy (DOE)s Weatherization and Intergovernmental Programs Office (WIPO), this webinar covered the expansion of the Better Buildings platform to include the newest initiative for the public sector: the High Performance Outdoor Lighting Accelerator (HPOLA).

  4. Pedestrian Friendly Outdoor Lighting

    SciTech Connect (OSTI)

    Miller, Naomi J.; Koltai, Rita; McGowan, Terry

    2013-12-31T23:59:59.000Z

    This GATEWAY report discusses the problems of pedestrian lighting that occur with all technologies with a focus on the unique optical options and opportunities offered by LEDs through the findings from two pedestrian-focused projects, one at Stanford University in California, and one at the Chautauqua Institution in upstate New York. Incorporating user feedback this report reviews the tradeoffs that must be weighed among visual comfort, color, visibility, efficacy and other factors to stimulate discussion among specifiers, users, energy specialists, and in industry in hopes that new approaches, metrics, and standards can be developed to support pedestrian-focused communities, while reducing energy use.

  5. TAP Webinar: High Performance Outdoor Lighting Accelerator

    Broader source: Energy.gov [DOE]

    Hosted by the Technical Assistance Program (TAP), this webinar will cover the recently announced expansion of the Better Buildings platform the High Performance Outdoor Lighting Accelerator (HPOLA).

  6. STATE OF CALIFORNIA OUTDOOR LIGHTING WORKSHEET

    E-Print Network [OSTI]

    STATE OF CALIFORNIA OUTDOOR LIGHTING WORKSHEET CEC-OLTG-2C (Revised 03/10) CALIFORNIA ENERGY COMMISSION 2008 Nonresidential Compliance Forms March 2010 OUTDOOR LIGHTING WORKSHEET (Page 1 of 3) OLTG-2C Project Name: Date: A. LIGHTING POWER ALLOWANCE FOR GENERAL HARDSCAPE AREA WATTAGE ALLOWANCE (AWA) LINEAR

  7. MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS

    E-Print Network [OSTI]

    California at Davis, University of

    EXTERIOR SPACES COMPLY WITH TITLE 24 There are two major steps for exterior spaces to comply with Title 24 for exterior space. A space complies with these requirements if the actual lighting power used in the space. Backlight Backlight includes all illumination that is in the space between the ground and 80 degrees above

  8. Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting Webcast

    Broader source: Energy.gov [DOE]

    In this October 8, 2009 webcast, ENERGY STAR Program Manager Richard Karney gave an overview of ENERGY STAR criteria covering SSL-based outdoor area and roadway lighting, outdoor wall packs,...

  9. LED Outdoor Area Lighting Fact Sheet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PM toLED Lighting Facts LED LightingOutdoor Area

  10. Outdoor Solar Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin of Contamination in ManyDepartment ofOil'sEnergy8OrganicOsmoticOutdoor Solar Lighting

  11. Model Specification for Networked Outdoor Lighting Control Systems

    Broader source: Energy.gov [DOE]

    The DOE Municipal Solid-State Street Lighting Consortium's Model Specification for Networked Outdoor Lighting Control Systems is a tool designed to help cities, utilities, and other local agencies...

  12. FEMP Outdoor Solid-State Lighting Intiative: Resources for Outdoor...

    Broader source: Energy.gov (indexed) [DOE]

    sheet describes the Federal Energy Management Program's (FEMP) solid-state lighting (SSL) initiatives that provide information and resources for the application of SSL lighting...

  13. Outdoor Lighting Overview Page 6-1 2008 Nonresidential Compliance Manual August 2009

    E-Print Network [OSTI]

    Outdoor Lighting ­ Overview Page 6-1 2008 Nonresidential Compliance Manual August 2009 6 Outdoor Lighting This chapter covers the requirements for outdoor lighting design and installation, including controls. This section applies to all outdoor lighting, whether attached to buildings, poles, structures

  14. Campus Outdoor Lighting Standards The following standards provide for minimum safe lighting standards for outdoor area of

    E-Print Network [OSTI]

    de Lijser, Peter

    Campus Outdoor Lighting Standards The following standards provide for minimum safe lighting with a minimum of 3 foot candles. This lighting level is for daytime and at night. Public Streets Streets must have a minimum of one foot candles average with a minimum of .6 foot candles. Augmented lighting should

  15. Outdoor Solar Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    place the lights in a sunny location. Others have the lights separate from a solar cell panel, in which case only the panel needs to be placed in a sunny location. Units vary in...

  16. Text-Alternative Version: Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting Webcast.

  17. Instructions and Data Form for Local Authority Having Jurisdiction to Submit Adjustments to Default Outdoor Lighting Zones

    E-Print Network [OSTI]

    Outdoor Lighting Zones Adjustments to Default Outdoor Lighting Zones A local Authority Having Jurisdiction (AHJ) may officially adopt changes to the default Outdoor Lighting Zone designation of an area the proposed change. For example, the AHJ may determine areas where Outdoor Lighting Zone 4 is applicable

  18. Amending Default Outdoor Lighting Zones by Local Jurisdictions Having Authority (AHJ)

    E-Print Network [OSTI]

    Amending Default Outdoor Lighting Zones by Local Jurisdictions Having Authority (AHJ) An important part of the Standards is to base the outdoor lighting power that is allowed on how bright the surrounding conditions are. The Standards contain lighting power allowances` for newly installed equipment

  19. The Municipal Solid-State Street Lighting Consortium Public Outdoor Lighting Inventory: Phase I: Survey Results

    SciTech Connect (OSTI)

    Kinzey, Bruce R.; Smalley, Edward; Haefer, R.

    2014-09-30T23:59:59.000Z

    This document presents the results of a voluntary web-based inventory survey of public street and area lighting across the U.S. undertaken during the latter half of 2013.This survey attempts to access information about the national inventory in a bottoms-up manner, going directly to owners and operators. Adding to previous top down estimates, it is intended to improve understanding of the role of public outdoor lighting in national energy use.

  20. Big Savings on Outdoor Lighting | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:WhetherNovember 13, 2009OakDepartment ofTheDepartmentEnergyOutdoor

  1. Hierarchical Lighting Simulation for Outdoor Scenes Katja Daubert, Hartmut Schirmacher

    E-Print Network [OSTI]

    Boyer, Edmond

    challengesfor state- of-the-art technology.One such challenge is the accurateand efficientsimulation of light

  2. Lighting the Great Outdoors: LEDs in Exterior Applications

    SciTech Connect (OSTI)

    Cook, Tyson D. S.; Bryan, Mary M.; Kinzey, Bruce R.; Myer, Michael

    2008-08-17T23:59:59.000Z

    Recent progress in the development of white light LEDs promises great impact by opening up the huge potential for LED illumination in new areas. One such area is general illumination for exterior applications. For example, there are an estimated combined 60.5 million roadway and parking installations in the U.S. These lights account for an estimated 53.3 TWh of electricity usage annually -- nearly 7% of all lighting. If LEDs could provide the same light performance with just 25% greater efficiency, savings of over 13 TWh could be achieved. In 2007, the authors assessed emerging LED lighting technologies in a parking garage and on a city street. The purpose of these tests was to enable a utility to determine whether energy efficiency programs promoting white light LED products might be justified. The results have supported the great promise of LEDs in exterior applications, while also highlighting the barriers that continue to hinder their widespread adoption. Such barriers include 1) inconsistent product quality across manufacturers; 2) lack of key metrics for comparing LEDs to conventional sources; and 3) high upfront cost of LED luminaires compared to conventional luminaires. This paper examines these barriers, ways in which energy-efficiency programs could help to overcome them, and the potential for energy and financial savings from LED lighting in these two exterior applications.

  3. Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting...

    Broader source: Energy.gov (indexed) [DOE]

    conducting a major overhaul of its outdoor lighting (replacing 2,000 fixtures with LED lights), while boosting safety and security throughout the site. mcbquantico2014.pdf More...

  4. Low-Pressure Sodium Lighting Basics

    Broader source: Energy.gov [DOE]

    Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and security lighting, where color is not important.

  5. Municipal Consortium Releases Updated Model Specification for Networked Outdoor Lighting Control Systems

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's Municipal Solid-State Street Lighting Consortium (MSSLC) has released an update to its Model Specification for Adaptive Control and Remote Monitoring of LED Roadway...

  6. Outdoor Cooking.

    E-Print Network [OSTI]

    Douglas, Jenoyce; Reasonover, Frances

    1967-01-01T23:59:59.000Z

    ham slices; sirloin, T-bone; rib and ribeye steaks; lamb or pork chops; beef or lamb cubes or patties; Cana. dian bacon; and some varieties of sausage; fryers and fish. Some outdoor cooks prefer a large sirloin steak about 1% inches thick. Allow 1..., sirloin tips and high /-I quality (low choice) chuck and arm roasts are suitable for this 0 .' type of cooking. Lamb, pork and bologna may also be used. / (-)/ Poultry for this method include rock cornish game hen, broiler 1 \\ or fryer, roaster...

  7. Outdoor Burning Field Operations

    E-Print Network [OSTI]

    , or Warmth 4 Fires for Disposal or Land Clearing 5 Prescribed Burns 8 Pipeline Breaks and Oil Spills 8 Other, the regulated community, and responsible state and local officials. This document covers all aspects nuisance condi- tions through the sensible regulation of outdoor burning. Summary of the Rule The Outdoor

  8. Many exterior entry and walkway lights in residential and commercial

    E-Print Network [OSTI]

    be difficult since retail stocking is inconsistent. The Light-Emitting Diode (LED) Hybrid Outdoor Fixture

  9. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema (OSTI)

    Julia Phillips

    2010-01-08T23:59:59.000Z

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  10. Outdoor PV Degradation Comparison

    SciTech Connect (OSTI)

    Jordan, D. C.; Smith, R. M.; Osterwald, C. R.; Gelak, E.; Kurtz, S. R.

    2011-02-01T23:59:59.000Z

    As photovoltaic (PV) penetration of the power grid increases, it becomes vital to know how decreased power output; may affect cost over time. In order to predict power delivery, the decline or degradation rates must be determined; accurately. At the Performance and Energy Rating Testbed (PERT) at the Outdoor Test Facility (OTF) at the; National Renewable Energy Laboratory (NREL) more than 40 modules from more than 10 different manufacturers; were compared for their long-term outdoor stability. Because it can accommodate a large variety of modules in a; limited footprint the PERT system is ideally suited to compare modules side-by-side under the same conditions.

  11. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    SciTech Connect (OSTI)

    Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

    1994-10-01T23:59:59.000Z

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

  12. Covered Product Category: Exterior Lighting

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program (FEMP) provides acquisition guidance and Federal efficiency requirements for outdoor wall-mounted light fixtures or luminaires, outdoor pole/arm-mounted area and roadway luminaires, outdoor pole/arm-mounted decorative luminaires, fuel pump canopy luminaires, bollards, and parking garage luminaires, all of which are FEMP-designated product categories.

  13. Pedestrian-Friendly Nighttime Lighting

    Broader source: Energy.gov [DOE]

    This November 19, 2013 webinar presented issues and considerations related to pedestrian-friendly nighttime lighting, such as color rendering, safety, and adaptation. When it comes to outdoor...

  14. CALIFORNIA ENERGY California Outdoor Lighting Baseline

    E-Print Network [OSTI]

    Design of Commercial Building Ceiling Systems Integrated Design of Residential Ducting & Air Flow Systems Author Sonoma, California Managed By: New Buildings Institute Cathy Higgins, Program Director White Jenkins, PIER Buildings Program Manager Terry Surles, PIER Program Director Robert L. Therkelsen Executive

  15. CALIFORNIA ENERGY California Outdoor Lighting Baseline

    E-Print Network [OSTI]

    Design of Commercial Building Ceiling Systems Integrated Design of Residential Ducting & Air Flow Systems Analytics, Inc. Dr. Roger Wright, Lead Author Sonoma, California Managed By: New Buildings Institute Cathy, Contract Manager Nancy Jenkins, PIER Buildings Program Manager Terry Surles, PIER Program Director Robert L

  16. Outdoor Lighting Resources | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaeferAprilOverviewEfficiencyof EnergyOokieSolarWorldoffers a variety of

  17. Outdoor Area Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014FundsOpti-MNRESPONSEDecember 6,OurBenefits

  18. Outdoor Solar Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014FundsOpti-MNRESPONSEDecember

  19. CBEA LED Site Lighting Specification - Version 1.3, Released...

    Energy Savers [EERE]

    Applications Outdoor Area Lighting Home About the Solid-State Lighting Program R&D Program Market-Based Programs SSL Basics Using LEDs Information Resources Financial Opportunities...

  20. SUBCHAPTER D. OUTDOOR BURNING Sec. 352.081. REGULATION OF OUTDOOR BURNING. (a) In this

    E-Print Network [OSTI]

    SUBCHAPTER D. OUTDOOR BURNING Sec. 352.081. REGULATION OF OUTDOOR BURNING. (a) In this section: (A) firefighter training; (B) public utility, natural gas pipeline, or mining operations; or (C

  1. Lead exposure at uncovered outdoor firing ranges

    SciTech Connect (OSTI)

    Goldberg, R.L.; Hicks, A.M.; O'Leary, L.M.; London, S. (University of Southern California School of Medicine, Los Angeles (USA))

    1991-06-01T23:59:59.000Z

    Excessive lead exposure in shooting instructors at indoor firing ranges and covered outdoor firing ranges has been documented. The City of Los Angeles assessed exposure of its full-time shooting instructors at uncovered outdoor ranges via air monitoring and blood lead-level measurements. Results of these tests revealed that significant lead exposure and absorption can occur at outdoor firing ranges. The use of copper-jacketed ammunition may decrease air lead levels and decrease lead absorption by range instructors.

  2. Combination of Indoor and Outdoor PositioningOutdoor Positioning

    E-Print Network [OSTI]

    : integrity, anti-jam power, security, clocks! June 24-26, 2008 ETH Zurich number of satellites Today: 10: strong attenuation fading: reflections diffraction scattering no direct line-of- sight: b t l limitations

  3. Light, Nearwork, and Visual Environment Risk Factors in Myopia

    E-Print Network [OSTI]

    Alvarez, Amanda Aleksandra

    2012-01-01T23:59:59.000Z

    of time outdoors and light levels as risk factors for myopiaH. C. (1995). Constant light produces severe cornealNg, H. , & Phillips, J. (2011) Light exposure patterns in

  4. Linking Accelerating Laboratory Test with Outdoor Performance Results for a Model Epoxy Coating System

    E-Print Network [OSTI]

    located in Gaithersburg, MD. Panel temperature and ambient RH of the outdoor exposure and the solar of this type of polymeric material. 2 #12;INTRODUCTION Attempts at linking field and laboratory exposure of the specimens,5 differences in the spectral emission distributions of the sun and laboratory light sources

  5. Reducing home lighting expenses

    SciTech Connect (OSTI)

    Aimone, M.A.

    1981-02-01T23:59:59.000Z

    Ways to reduce lighting expenses are summarized. These include: turning off lights when not in use; keeping fixtures and lamps clean; replacing lamps with more efficient types; using three-way bulbs; use of daylighting; buying fewer lamps and reducing lamp wattage; consider repainting rooms; replacing recessed fixtures with tracklighting; and using efficient lamps for outdoor use. (MCW)

  6. Usability of Outdoor Spaces in Children's Hospitals

    E-Print Network [OSTI]

    Pasha, Samira

    2012-07-16T23:59:59.000Z

    Researchers have studied the positive effect of healing outdoor environments on hospitalized children, their family members and staff's health and mood. Consequently many modern hospitals dedicate portions of their space ...

  7. Princeton University Outdoor Action Sustainability Guide

    E-Print Network [OSTI]

    Itinerary ·Defining sustainability ·Princeton's Sustainability Plan ·Focus: fresh water and climate change of communication, respect for others, caring for the environment, and service. The impact of the Outdoor Action

  8. Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us countLighting Sign In About | Careers |

  9. Decontamination of large horizontal concrete surfaces outdoors

    SciTech Connect (OSTI)

    Barbier, M.M.; Chester, C.V.

    1980-01-01T23:59:59.000Z

    A study is being conducted of the resources and planning that would be required to clean up an extensive contamination of the outdoor environment. As part of this study, an assessment of the fleet of machines needed for decontaminating large outdoor surfaces of horizontal concrete will be attempted. The operations required are described. The performance of applicable existing equipment is analyzed in terms of area cleaned per unit time, and the comprehensive cost of decontamination per unit area is derived. Shielded equipment for measuring directional radiation and continuously monitoring decontamination work are described. Shielding of drivers' cabs and remote control vehicles is addressed.

  10. FEMP Outdoor Solid-State Lighting Intiative: Resources for Outdoor SSL

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,OfficeEnd of Year 2010SaltInstrumentation andFE DOCKETPlanning to

  11. FEMP Outdoor Solid State Lighting Intiative: Resources for Outdoor SSL Applications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport in Representative Geologic MediaTreatmentPROJECT-SPECIFICPractices |of

  12. Arnold Schwarzenegger INDOOR-OUTDOOR AIR LEAKAGE

    E-Print Network [OSTI]

    ;#12;Indoor-Outdoor Air Leakage in Apartments and Commercial Buildings Appendix A Air Infiltration Model for Large Buildings Appendix B Analysis of Commercial Building Data Appendix C Commercial Building Data contains data and discussion of the leakage parameter in commercial buildings. The leakage parameter

  13. Detecting ground shadows in outdoor consumer photographs

    E-Print Network [OSTI]

    Treuille, Adrien

    , stereo, tracking, etc. On the other hand, shadows play a crucial role in deter- mining the type an open problem. This is because the appearances and shapes of shadows outdoors depend on several hidden factors such as the color, direction and size of the illuminants (sun, sky, clouds), the geometry

  14. Floodplain Assessment for the Proposed Outdoor Fire Range Upgrades at TA-72 in Lower Sandia Canyon, Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Hathcock, Charles D. [Los Alamos National Laboratory

    2012-08-27T23:59:59.000Z

    Los Alamos National Laboratory (LANL) is preparing to implement actions in Sandia Canyon at Technical Area (TA) 72. Los Alamos National Security (LANS) biologists conducted a floodplain determination and this project is partially located within a 100-year floodplain. The proposed project is to upgrade the existing outdoor shooting range facilities at TA-72. These upgrades will result in increased safety and efficiencies in the training for Protective Force personnel. In order to remain current on training requirements, the firing ranges at TA-72 will be upgraded which will result in increased safety and efficiencies in the training for Protective Force personnel (Figure 1). These upgrades will allow for an increase in class size and more people to be qualified at the ranges. Some of these upgrades will be built within the 100-year floodplain. The upgrades include: concrete pads for turning target systems and shooting positions, new lighting to illuminate the firing range for night fire, a new speaker system for range operations, canopies at two locations, an impact berm at the far end of the 300-yard mark, and a block wall for road protection.

  15. DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and even preferred. Rather than an array of exposed LEDs, luminaires that spread luminance ("brightness") over a larger luminous area reduce perception of glare. Luminaires...

  16. DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    presents the results of surveys and observations from residents and pedestrians, feedback from facility design and engineering professionals, thoughts and observations from...

  17. Big Savings on Outdoor Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand Sustained CoordinationWater10Big Savings on

  18. Outdoor Solid-State Lighting Technology Deployment | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014FundsOpti-MNRESPONSEDecemberProducts &

  19. Summer Loving-Energy-Efficient Outdoor Lighting! | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE'sSummary Special Report:1, 2015 - JuneSummary,

  20. DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractions and Policy (2009)| Department ofofShortDepartment

  1. DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractions and Policy (2009)| Department

  2. Practical Quantum Cryptography for Secure Free-Space Communications

    SciTech Connect (OSTI)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01T23:59:59.000Z

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  3. Determining Outdoor CPV Cell Temperature: Preprint

    SciTech Connect (OSTI)

    Muller, M.; Deline, C.; Marion, B.; Kurtz, S.; Bosco, N.

    2011-07-01T23:59:59.000Z

    An accurate method is needed for determining cell temperature when measuring CPV modules outdoors. It has been suggested that cell temperature can be calculated though a procedure that shutters sunlight to the cells while measuring the transients in open-circuit voltage (Voc) and heat sink temperature. This paper documents application of this shutter procedure to multiple CPV modules at NREL. The challenges and limitations are presented along with an alternate approach to measuring CPV cell operating temperature.

  4. The concept of the use of recycled uranium for increasing the degree of security of export deliveries of fuel for light-water reactors

    SciTech Connect (OSTI)

    Alekseev, P. N.; Ivanov, E. A.; Nevinitsa, V. A.; Ponomarev-Stepnoi, N. N.; Rumyantsev, A. N.; Shmelev, V. M. [Russian Research Center Kurchatov Institute (Russian Federation); Borisevich, V. D.; Smirnov, A. Yu.; Sulaberidze, G. A. [National Nuclear Research University MEPhI (Russian Federation)

    2010-12-15T23:59:59.000Z

    The present paper deals with investigation of the possibilities for reducing the risk of proliferation of fissionable materials by means of increasing the degree of protection of fresh fuel intended for light-water reactors against unsanctioned use in the case of withdrawal of a recipient country of deliveries from IAEA safeguards. It is shown that the use of recycled uranium for manufacturing export nuclear fuel makes transfer of nuclear material removed from the fuel assemblies for weapons purposes difficult because of the presence of isotope {sup 232}U, whose content increases when one attempts to enrich uranium extracted from fresh fuel. In combination with restricted access to technologies for isotope separation by means of establishing international centers for uranium enrichment, this technical measure can significantly reduce the risk of proliferation associated with export deliveries of fuel made of low-enriched uranium. The assessment of a maximum level of contamination of nuclear material being transferred by isotope {sup 232}U for the given isotope composition of the initial fuel is obtained. The concept of further investigations of the degree of security of export deliveries of fuel assemblies with recycled uranium intended for light-water reactors is suggested.

  5. Minimizing Variation in Outdoor CPV Power Ratings: Preprint

    SciTech Connect (OSTI)

    Muller, M.; Marion, B.; Rodriguez, J.; Kurtz, S.

    2011-07-01T23:59:59.000Z

    The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

  6. GATEWAY Demonstration Outdoor Projects | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdfTechnologiesNATIONAL ENVIRONMENTAL POLICYEnergyIndoorOutdoor

  7. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  8. Guidance on Microbial Contamination in Previously Flooded Outdoor Areas

    E-Print Network [OSTI]

    Guidance on Microbial Contamination in Previously Flooded Outdoor Areas Environmental Health Buford Highway NE (F-60) Atlanta, GA 30341 March 2011 #12;2 Guidance on Microbial Contamination in Previously Flooded Outdoor Areas Problem Statement Microbial contamination--both bacterial and viral

  9. Estimation of Degradation-Based Reliability in Outdoor Environments

    E-Print Network [OSTI]

    Estimation of Degradation-Based Reliability in Outdoor Environments Victor Chan and William Q degradation of materials or products that are exposed to the outdoor environment. There is a growing need to obtain timely predictions of such degradation behaviors on the basis of accelerated laboratory tests

  10. STATE OF CALIFORNIA CERTIFICATE OF COMPLIANCE, SIGN LIGHTING

    E-Print Network [OSTI]

    STATE OF CALIFORNIA CERTIFICATE OF COMPLIANCE, SIGN LIGHTING CEC-SLTG-1C (Revised 10/10) CALIFORNIA Lighting) (Page 1 of 4) SLTG-1C Project Name: Date: Project Address: Location of Sign Phase of Sign Construction Type of Lighting Control Outdoor Signs New Signs New Lighting Controls Indoor Signs Sign

  11. Predictive clothing insulation model based on outdoor air and indoor operative temperatures

    E-Print Network [OSTI]

    Schiavon, Stefano; Lee, Kwang Ho

    2012-01-01T23:59:59.000Z

    2012) Predictive clothing insulation model based on outdoorPredictive clothing insulation model based on outdoor airpredictive models of clothing insulation have been developed

  12. Combination of Indoor and Outdoor Positioning

    E-Print Network [OSTI]

    : integrity, anti-jam power, security, clocks! June 24-26, 2008 ETH Zurich number of satellites gain no direct line-of- sight: obstacles multipath limitations: Positioning Requirements Overview of Systems GNSS

  13. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01T23:59:59.000Z

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  14. Minimizing Variation in Outdoor CPV Power Ratings (Presentation)

    SciTech Connect (OSTI)

    Muller, M.

    2011-04-01T23:59:59.000Z

    Presented at the 7th International Conference on Concentrating Photovoltaic Systems (CPV-7), 4-6 April 2011, Las Vegas, Nevada. The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

  15. Spellbound : an activity-based outdoor mobile multiplayer game

    E-Print Network [OSTI]

    Sra, Misha

    2013-01-01T23:59:59.000Z

    Traditional outdoor recreation is physically and emotionally rewarding from goal directed social activities and encourages a connection with the real world but can be logistically difficult. Online gaming allows people to ...

  16. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  17. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  18. EXTERIOR LIGHTING CASE STUDY CALIFORNIA LIGHTING TECHNOLOGY CENTER, UC DAVIS PHONE: (530) 747-3838 FAX: (530) 747-3812 CLTC.UCDAVIS.EDU

    E-Print Network [OSTI]

    California at Davis, University of

    . This energy waste can easily be averted by implementing energy-efficient light sources and lighting controls.S. health care facilities to install an energy-efficient, ultra-smart outdoor LED lighting system. The award schedules, light levels and time-out settings, monitor the system's energy use, and receive automated alerts

  19. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  20. Advancements in sensing and perception using structured lighting techniques :an LDRD final report.

    SciTech Connect (OSTI)

    Novick, David Keith; Padilla, Denise D.; Davidson, Patrick A. Jr. (.; .); Carlson, Jeffrey J.

    2005-09-01T23:59:59.000Z

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Advancements in Sensing and Perception using Structured Lighting Techniques''. There is an ever-increasing need for robust, autonomous ground vehicles for counterterrorism and defense missions. Although there has been nearly 30 years of government-sponsored research, it is undisputed that significant advancements in sensing and perception are necessary. We developed an innovative, advanced sensing technology for national security missions serving the Department of Energy, the Department of Defense, and other government agencies. The principal goal of this project was to develop an eye-safe, robust, low-cost, lightweight, 3D structured lighting sensor for use in broad daylight outdoor applications. The market for this technology is wide open due to the unavailability of such a sensor. Currently available laser scanners are slow, bulky and heavy, expensive, fragile, short-range, sensitive to vibration (highly problematic for moving platforms), and unreliable for outdoor use in bright sunlight conditions. Eye-safety issues are a primary concern for currently available laser-based sensors. Passive, stereo-imaging sensors are available for 3D sensing but suffer from several limitations : computationally intensive, require a lighted environment (natural or man-made light source), and don't work for many scenes or regions lacking texture or with ambiguous texture. Our approach leveraged from the advanced capabilities of modern CCD camera technology and Center 6600's expertise in 3D world modeling, mapping, and analysis, using structured lighting. We have a diverse customer base for indoor mapping applications and this research extends our current technology's lifecycle and opens a new market base for outdoor 3D mapping. Applications include precision mapping, autonomous navigation, dexterous manipulation, surveillance and reconnaissance, part inspection, geometric modeling, laser-based 3D volumetric imaging, simultaneous localization and mapping (SLAM), aiding first responders, and supporting soldiers with helmet-mounted LADAR for 3D mapping in urban-environment scenarios. The technology developed in this LDRD overcomes the limitations of current laser-based 3D sensors and contributes to the realization of intelligent machine systems reducing manpower need.

  1. BEHAVIOR OF RADON PROGENY NEAR OUTDOOR SURFACES IN CONTRASTING TERRAINS

    E-Print Network [OSTI]

    S. D. Schery; P. T. Wasiolek; Y. Li

    Federal legislation expresses a long-term goal of reducing indoor radon to levels comparable to those outdoors. A thorough understanding of the behavior of radon and its progeny in the outdoor environment is therefore important We report near-surface measurements of radon, attached-to-aerosol progeny, and unattachcd-toaerosol progeny in the contrasting environments of the forested hill country of Oak Ridge, TN and the desert sands of White Sands National Monument, NM. Vertical progeny gradients are greater at White Sands due to a smoother terrain, and dose levels tend to be lower due to lower radon flux from the gypsum sand. Both sites show a significant diurnal variation of dose rate with a maximum occurring usually in the early morning. Correlation of dose rate variation with radon variation is surprisingly small suggesting the importance of other factors such as progeny deposition and aerosol concentration in controlling outdoor dose.

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  3. Indoor and Outdoor Spectroradiometer Intercomparison for Spectral Irradiance Measurement

    SciTech Connect (OSTI)

    Habte, A.; Andreas, A.; Ottoson, L.; Gueymard, C.; Fedor, G.; Fowler, S.; Peterson, J.; Naranen, R.; Kobashi, T.; Akiyama, A.; Takagi, S.

    2014-05-01T23:59:59.000Z

    This report details the global spectral irradiance intercomparison using spectroradiometers that was organized by the National Renewable Energy Laboratory's Solar Radiation Research Laboratory. The intercomparison was performed both indoors and outdoors on September 17, 2013. Five laboratories participated in the intercomparison using 10 spectroradiometers, and a coordinated measurement setup and a common platform were employed to compare spectral irradiances under both indoor and outdoor conditions. The intercomparison aimed to understand the performance of the different spectroradiometers and to share knowledge in making spectral irradiance measurements. This intercomparison was the first of its kind in the United States.

  4. University of Minnesota Center for Outdoor Adventure (COA) Health History Form

    E-Print Network [OSTI]

    Amin, S. Massoud

    1 University of Minnesota Center for Outdoor Adventure (COA) Health History Form Center for Outdoor: Specific Symptoms Date of last occurrence How you care for condition Frequency of condition Duration

  5. Lighting Research Group FinalReportOctober1999

    E-Print Network [OSTI]

    Lighting Research Group FinalReportOctober1999 Lighting Recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA #12;Final Report Lighting Recommendations to improve the lighting quality and energy efficiency of the lighting system at the Social Security

  6. In Proceedings of SPIE AeroSense 2001. Robotic Technologies for Outdoor Industrial Vehicles

    E-Print Network [OSTI]

    Stentz, Tony

    for the automation of mobile equipment used in outdoor industrial applications are immense. Mobile machines are used. Unfortunately, the automation of outdoor machines for industrial purposes is very difficult and poses greatIn Proceedings of SPIE AeroSense 2001. Robotic Technologies for Outdoor Industrial Vehicles Anthony

  7. Power Quality Improvements in Lighting Systems Mr. Ashish Shrivastava

    E-Print Network [OSTI]

    Kumar, M. Jagadesh

    an integral part of indoor and outdoor lighting in domestic, commercial, industrial, institutional and retail applications. Due to reduced size, compact fluorescent lamps (CFL) have been preferred in comparison and vibration. It is also gaining wider acceptance in the automotive industries, decorative lightings, traffic

  8. OUTDOOR EDUCATION SUBJECT GUIDE -I/S STORY TELLING

    E-Print Network [OSTI]

    Abolmaesumi, Purang

    Canada) http://www.ec.gc.ca/EnviroZine/english/issues/23/feature2_e.cfm Websites: Arctic Climate Impact of the Arctic/ Mark Nuttall, editor Ref: G606 .E49 2005 Impacts of a Warming Arctic: Arctic Climate Impact Association for Geographic & Environmental Education. Outdoor Canada Pathways Online: EnviroZine (Environment

  9. Application of CFD Tools for Indoor and Outdoor Environment Design

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    used to assess building shape design, to evaluate the effectiveness of natural ventilation in buildings environment parameters. Nomenclature Ar Archimedes number Ary local Archimedes number, 2 n U/Tyg C for designing a comfortable indoor or outdoor environment. This is because the design of appropriate ventilation

  10. PLACEMENT OF OUTDOOR RECYCLING CONTAINERS AROUND UBC CAMPUS

    E-Print Network [OSTI]

    PLACEMENT OF OUTDOOR RECYCLING CONTAINERS AROUND UBC CAMPUS UBC SEEDS Project by Iong, Sin I (Jace RECYCLING CONTAINERS ON UBC CAMPUS by Jace Iong 24 April, 2009 INTRODUCTION This SEEDS (Social, Ecological recycling containers on UBC-Vancouver campus. Initiated by David Smith, the associate director of municipal

  11. Bayesian Color Constancy for Outdoor Object Recognition Yanghai Tsin

    E-Print Network [OSTI]

    Collins, Robert

    University Siemens Corporate Research Pittsburgh, PA 15213 Princeton, NJ 08540 {ytsin,rcollins,tk}@cs.cmu.edu rameshv@scr.siemens.com Abstract Outdoor scene classification is challenging due to irregular geometry-overlapping spectral sensitivity functions. The generalized diagonal transform [5] performs better than the diagonal

  12. Block Bootstrap Estimation of the Distribution of Cumulative Outdoor Degradation

    E-Print Network [OSTI]

    Block Bootstrap Estimation of the Distribution of Cumulative Outdoor Degradation Victor Chan University Ames, IA 50011 October 28, 2003 Abstract An interesting prediction problem involving degradation cumulative degrada- tion using small- to moderate-size degradation data sets. This distribution, which

  13. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01T23:59:59.000Z

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  14. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31T23:59:59.000Z

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  15. Data:Ec48b3c9-160d-472a-ad78-7d6fe38fc77b | Open Energy Information

    Open Energy Info (EERE)

    2 3 Next >> Basic Information Utility name: Slash Pine Elec Member Corp Effective date: 19970201 End date if known: Rate name: Outdoor Lighting 175 Watt HPS Security Light...

  16. Data:030dcfda-8aab-4982-9feb-6a788da53eb8 | Open Energy Information

    Open Energy Info (EERE)

    2 3 Next >> Basic Information Utility name: Slash Pine Elec Member Corp Effective date: 19970201 End date if known: Rate name: Outdoor Lighting 100 Watt HPS Security Light...

  17. Data:25cd3ce5-4ddf-4e37-849a-570d53a24ab6 | Open Energy Information

    Open Energy Info (EERE)

    2 3 Next >> Basic Information Utility name: Slash Pine Elec Member Corp Effective date: 19970201 End date if known: Rate name: Outdoor Lighting 250 Watt HPS Security Light...

  18. Data:8a6072d5-dbda-47fb-a54e-7eb1eb932b74 | Open Energy Information

    Open Energy Info (EERE)

    2 3 Next >> Basic Information Utility name: Slash Pine Elec Member Corp Effective date: 19970201 End date if known: Rate name: Outdoor Lighting 250 Watt HPS Security Light...

  19. The effects of outdoor heat exchanger hydrophobic treatment on the performance of an air source heat pump

    E-Print Network [OSTI]

    Parker, Brandon DeWayne

    1995-01-01T23:59:59.000Z

    mode, the system must remove heat from the cold outdoor air and provide it to the conditioned space. To remove the heat from the outdoor air, the refrigerant entering the outdoor heat exchanger must be colder than the outdoor air. The outdoor air... is pulled across the heat exchanger surface by the outdoor fan Hence, the cold liquid refrigerant passing through the evaporator coil receives heat from the outdoor ambient air passing over the coil, causing the refrigerant to vaporize into a cool gas...

  20. Minimizing Variation in Outdoor CPV Power Ratings (Presentation)

    SciTech Connect (OSTI)

    Muller, M.

    2011-02-01T23:59:59.000Z

    Module data from NREL's CPV test bed is used to examine methods for calculating outdoor CPV power ratings. IEC 62670 and ASTM E2527 are used as a starting point for determining a module power rating on a monthly basis. Monthly power ratings vary by more than desired using existing methods. The presentation examines modifications to existing methods as well as spectral corrections to reduce variation in monthly module power ratings.

  1. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Outdoor testing of advanced optical materials for solar thermal electric applications

    SciTech Connect (OSTI)

    Wendelin, T.J.; Jorgensen, G.; Goggin, R.M.

    1992-05-01T23:59:59.000Z

    The development of low-cost, durable advanced optical materials is an important element in making solar energy viable for electricity production. It is important to determine the expected lifetime of candidate reflector materials in real-world service conditions. The demonstration of the optical durability of such materials in outdoor environments is critical to the successful commercialization of solar thermal electric technologies. For many years optical performance data have been collected and analyzed by the National Renewable Energy Laboratory (NREL) for candidate reflector materials subjected to simulated outdoor exposure conditions. Much of this testing is accelerated in order to predict service durability. Some outdoor testing has occurred but not in a systematic manner. To date, simulated/accelerated testing has been limited correlation with actual outdoor exposure testing. Such a correlation is desirable to provide confidence in lifetime predictions based upon accelerated weathering methods. To obtain outdoor exposure data for realistic environments and to establish a data base for correlating simulated/accelerated outdoor exposure data with actual outdoor exposure data, the development of an expanded outdoor testing program has recently been initiated by NREL. Several outdoor test sites will be selected based on the solar climate, potential for solar energy utilization by industry, and cost of installation. Test results are site dependent because exposure conditions vary with geographical location. The importance of this program to optical materials development is outlined, and the process used to determine and establish the outdoor test sites is described. Candidate material identification and selection is also discussed. 10 refs.

  4. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  5. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II Focus on Active Directory, authentication

  6. An outdoor exposure testing program for optical materials used in solar thermal electric technologies

    SciTech Connect (OSTI)

    Wendelin, T.; Jorgensen, G.

    1994-01-01T23:59:59.000Z

    Developing low-cost, durable advanced optical materials is important for making solar thermal energy. technologies viable for electricity production. The objectives of a new outdoor testing program recently initiated by the National Renewable Energy Laboratory (NREL) are to determine the expected lifetimes of candidate reflector materials and demonstrate their optical durability in real-world service conditions. NREL is working with both utilities and industry in a collaborative effort to achieve these objectives. To date, simulated/accelerated exposure testing of these materials has not been correlated with actual outdoor exposure testing. Such a correlation is desirable to provide confidence in lifetime predictions based upon accelerated weathering results. This outdoor testing program will allow outdoor exposure data to be obtained for realistic environments and will establish a data base for correlating simulated/accelerated outdoor exposure data with actual outdoor exposure data. In this program, candidate reflector materials are subjected to various outdoor exposure conditions in a network of sites across the southwestern United States. Important meteorological data are continuously recorded at these sites; these data will be analyzed for possible correlations with material optical performance. Weathered samples are characterized on a regular basis using a series of optical tests. These tests provide the basis for tracking material performance and durability with exposure time in the various outdoor environments. This paper describes the outdoor testing program in more detail including meteorological monitoring capabilities and the optical tests that are performed on these materials.

  7. Dynamic predictive clothing insulation models based on outdoor air and indoor operative temperatures

    E-Print Network [OSTI]

    Schiavon, Stefano; Lee, Kwang Ho

    2012-01-01T23:59:59.000Z

    predictive clothing insulation models based on outdoor airrange of the clothing insulation calculated for eachbuilding). Figure 8 Clothing insulation versus dress code [

  8. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  10. Outdoor unit construction for an electric heat pump

    DOE Patents [OSTI]

    Draper, Robert (Pittsburgh, PA); Lackey, Robert S. (Pittsburgh, PA)

    1984-01-01T23:59:59.000Z

    The outdoor unit for an electric heat pump is provided with an upper portion 10 containing propeller fan means 14 for drawing air through the lower portion 12 containing refrigerant coil means 16 in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs 64 which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed.

  11. Outdoor unit construction for an electric heat pump

    DOE Patents [OSTI]

    Draper, R.; Lackey, R.S.

    1984-09-11T23:59:59.000Z

    The outdoor unit for an electric heat pump is provided with an upper portion containing propeller fan means for drawing air through the lower portion containing refrigerant coil means in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed. 4 figs.

  12. Outdoor polymeric insulators long-term exposed to HVDC

    SciTech Connect (OSTI)

    Soerqvist, T.; Vlastos, A.E. [Chalmers Univ. of Technology, Gothenburg (Sweden)] [Chalmers Univ. of Technology, Gothenburg (Sweden)

    1997-04-01T23:59:59.000Z

    Field experience from outdoor polymeric insulators exposed to HVDC under natural contamination conditions is presented. This paper summarizes the peak leakage current statistics, the hydrophobicity and the surface material conditions studied by electron spectroscopy for chemical analysis (ESCA) and attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. The results show a strong interrelation between the surface conditions and the performance with respect to leakage currents. Moreover, the results show that the surface conditions and the performance of the insulators exposed to HVDC are rather similar to those of the insulators exposed to HVAC.

  13. NREL: Measurements and Characterization - Outdoor Module Current Versus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for Renewable Energy: Grid Integration NREL isDataWorkingVoltage (I-V) Outdoor Module

  14. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  18. Interactive Montages of Sprites for Indexing and Summarizing Security Video

    E-Print Network [OSTI]

    Pal, Chris

    for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

  19. Indoor and outdoor air pollution in the Himalayas

    SciTech Connect (OSTI)

    Davidson, C.I.; Lin, S.F.; Osborn, J.F.; Pandey, M.R.; Rasmussen, R.A.; Khalil, M.A.K.

    1986-06-01T23:59:59.000Z

    Air pollutant concentrations have been measured in residences in the Himalayas of Nepal where biomass fuels are used for cooking and heating. Levels of total suspended particles are in the range 3-42 mg/m/sup 3/, with respirable suspended particles in the range 1-14 mg/m/sup 3/ in the houses sampled. Limited data for gaseous species show appreciable levels of carbon monoxide, carbon dioxide, methane, and several non-methane hydrocarbons. A questionnaire concerning energy use administered in each household suggests that high per capita use of biomass fuels is responsible for excessive pollutant concentrations. Application of a one-compartment mass balance model to these houses shows only rough agreement between calculated and measured values, due to uncertainties in model input parameters as well as difficulties in estimating average pollutant concentrations throughout each house. High outdoor concentrations of potassium and methyl chloride, previously shown to be tracers of biomass combustion, indicate that the indoor biomass combustion also degrades the outdoor environment. Values of crustal enrichment factors for trace elements in the air and snow of the region suggest that the polluted air is generally confined to the populated villages, with more pristine air at higher elevations. 58 references, 1 figure, 5 tables.

  20. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  1. Many exterior entry lights in residential and commercial applications use two-

    E-Print Network [OSTI]

    , and replacement CFLs are not widely stocked. The Light-Emitting Diode (LED) Hybrid Security Fixture combines

  2. Structured Light In Sunlight Mohit Gupta

    E-Print Network [OSTI]

    Nayar, Shree K.

    an off-the-shelf laser 3D scanner is shown in Figure 1. Under strong ambient il- lumination solution to the ambient light problem is (a) An object placed outdoors (b) Image of the sky 6 am 9 am 12 pm illuminance Ra from the sun and the sky. (b) Im- age of the sky at 9am. (c-e) 3D reconstructions using

  3. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 1 The Impact of Temperature on Outdoor

    E-Print Network [OSTI]

    Roedig, Utz

    support new areas such as industrial process automation and control applications. There are a large number sensor networks for industrial process automation and control applications in outdoor May 31, 2009 DRAFTIEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 1 The Impact of Temperature on Outdoor Industrial WSN

  4. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  5. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

  6. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  7. Energy Conservation in Industrial Lighting

    E-Print Network [OSTI]

    Meharg, E.

    1979-01-01T23:59:59.000Z

    color of the fluorescent is a further advantage indoors. I INCAllDESCEiH 120000 3000 I 2500 ! L1FECOS LIFECOS;-$j 100000 2)00 250 W. _IIERCURY 80000 1500 50000 HPS 1000 f ! 40000 500 VARIOUS LIGHT SOURCES 20000 OUTDOOR LTG. - 10 t... MACHINE SHOP O~-=-=-----::-::------:::----,-,------=----------- o ro w ~~~ w ro ~ ~~ ill 120 ILLUMINATION LEVEL - FOOTCANDLES (MAINTAINED) HPS AT 30 FT. MTG. HT. PLUS INCAIWESCENT TASK LTG. ROOM: 230 X 45 FT. FIGURE 4 A similar illustration is given...

  8. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  13. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  15. Thermosyphon coil arrangement for heat pump outdoor unit

    DOE Patents [OSTI]

    Draper, R.

    1984-05-22T23:59:59.000Z

    For a heat pump, the outdoor unit is provided with a coil and a refrigerant flow arrangement there for which is such that in the heating mode of operation of the heat pump they operate in a thermosyphon fashion. The coil has a feed portion and an exit portion leading to a separator drum from which liquid refrigerant is returned through downcomer line for recirculation to the feed portion. The coil is tilted upwardly from entry to exit by the angle alpha to enhance the clearance of the two phases of refrigerant from each other in the heating mode of operation. There is no thermosyphon function in the cooling mode of operation. 9 figs.

  16. Thermosyphon coil arrangement for heat pump outdoor unit

    DOE Patents [OSTI]

    Draper, Robert (Churchill, PA)

    1984-01-01T23:59:59.000Z

    For a heat pump, the outdoor unit is provided with a coil and a refrigerant flow arrangement therefor which is such that in the heating mode of operation of the heat pump they operate in a thermosyphon fashion. The coil 32 has a feed portion 30 and an exit portion 34 leading to a separator drum 36 from which liquid refrigerant is returned through downcomer line 42 for recirculation to the feed portion. The coil is tilted upwardly from entry to exit by the angle alpha to enhance the clearance of the two phases of refrigerant from each other in the heating mode of operation. There is no thermosyphon function in the cooling mode of operation.

  17. Energy Department Announces Outdoor Winners of Next Generation...

    Office of Environmental Management (EM)

    was launched in 2008 to promote excellence in the design of energy-efficient light-emitting diode (LED) commercial lighting fixtures, or "luminaires." A panel of six judges,...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Data:1a47b8d5-1b6d-4dee-978a-a73c0d514a2d | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  2. Data:B5cb500b-4c09-4c2b-9c50-461abff28239 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  3. Data:5f370d88-7e7b-4eb6-8889-8c50df2906c9 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  4. Data:Abf0715d-5064-4443-aecf-a38cac7fcb48 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  5. Data:24c74ac7-30f4-4ec0-a842-deea3ffebc33 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  6. Data:969d8004-68a5-4123-b681-909d8792acbc | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  7. Data:1bacf163-a23f-4284-b3be-1bb4ac50d1c7 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  8. Data:6fd91040-5479-44a1-a20c-b0f746c71154 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  9. Data:8c8d2411-fa1a-4975-b8a3-244423ba9317 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  10. Data:70356c4d-a6c9-4eb9-8bff-67cf6f5318ae | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  11. Data:2dddc56f-f23b-4b41-a5c3-a6b6c29ef562 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  12. Data:Fbf2b73a-140b-43f3-8382-5b5d79c7f911 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  13. Data:Fc626f7c-c16e-42e8-ad06-857acf951c3c | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  14. Data:4a011770-cdcd-4cd2-a970-cb64c82bd536 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  15. Data:8297637b-a908-4212-8c29-036a5fde8e24 | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  16. Data:Fc304332-d47a-45b7-a90b-8e3b7ff6579b | Open Energy Information

    Open Energy Info (EERE)

    to serve a new outdoor security light. POWER COST ADJUSTMENT: The Cooperative buys wholesale power from the Bonneville Power Administration (BPA) through the Pacific Northwest...

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  18. A study of programs in conservation and outdoor education in selected colleges and universities

    E-Print Network [OSTI]

    Noel, Jean-Guy Claude

    1969-01-01T23:59:59.000Z

    to participate in an outdoor resident school ss part of their etude. ut teaching experience. Twenty planned to offer an outdoor teacher education progr~n. 5. gore emphas]s was placed upon outdoor ducation skills than subject malter in the interdisciplinary... approach. 14 He fart"nur recommended that a study be ccnducted to investi gate outuoor edu at ion programs in higher educe. tiou institutions in an area o her than the western s ction of the United States. Bus' afson ll5J conduct d a study...

  19. Text-Alternative Version of TAP Webinar: High Performance Outdoor Lighting Accelerator

    Broader source: Energy.gov [DOE]

    Nebiat Solomon? We are going to give other attendees a few minutes to get on, and then well be ready to start. Just so you know, if you have questions along the way, just type them into the...

  20. DOE Publishes CALiPER Snapshot Report on LED Outdoor Area Lighting |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractions and Policy (2009)| Department of EnergyDepartment

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: Remain calm Notify Campus Security Dispatch Do NOT move victim EARTHQUAKE When

  4. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Security rules versus Security properties Mathieu Jaume SPI LIP6 University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  6. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  7. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  8. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  10. Architecture for environmental learning : a National Outdoor Leadership School in Baja, Mexico

    E-Print Network [OSTI]

    Galyean, Taylor

    1994-01-01T23:59:59.000Z

    An understanding of people, program, and place establishes a foundation from which to make architectural decisions. The focus of this thesis is to understand the needs of those involved in an outdoor education school in ...

  11. Analysis of a Dedicated Outdoor Air System and Low Temperature Supply Air Conditioning System

    E-Print Network [OSTI]

    Guang, L.; Li, R.

    2006-01-01T23:59:59.000Z

    This paper presents the principles and the characteristics of a dedicated outdoor air system (DOAS) and low temperature supply air system. DOAS is offered based on the demands of indoor air quality and the low temperature supply air system...

  12. A sun-tracking environmental chamber for the outdoor quantification of CPV modules

    SciTech Connect (OSTI)

    Faiman, David, E-mail: faiman@bgu.ac.il; Melnichak, Vladimir, E-mail: faiman@bgu.ac.il; Bokobza, Dov, E-mail: faiman@bgu.ac.il; Kabalo, Shlomo, E-mail: faiman@bgu.ac.il [Department of Solar Energy and Environmental Physics, Blaustein Institutes for Desert Research, Ben-Gurion University of the Negev, Sede Boqer Campus, 8499000 (Israel)

    2014-09-26T23:59:59.000Z

    The paper describes a sun-tracking environmental chamber and its associated fast electronics, devised for the accurate outdoor characterization of CPV cells, receivers, mono-modules, and modules. Some typical measurement results are presented.

  13. Inter-group relationships and networks in an outdoor recreation setting

    E-Print Network [OSTI]

    Bajc, Vida

    1996-01-01T23:59:59.000Z

    This exploratory study examined the information sharing processes between groups of recreationists at two outdoor recreation settings in Sam Houston National Forest. The primary objective of this study was to develop theory that will explain...

  14. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect (OSTI)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10T23:59:59.000Z

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  15. Personal exposure to nitrogen dioxide: relationship to indoor/outdoor air quality and activity patterns

    SciTech Connect (OSTI)

    Quackenboss, J.J.; Spengler, J.D.; Kanarek, M.S.; Letz, R.; Duffy, C.P.

    1986-08-01T23:59:59.000Z

    Personal NO/sub 2/ exposures and indoor and outdoor concentrations were measured for nearly 350 individuals in the Portage, WI, area. Concentrations in homes with gas stoves averaged 18 ..mu..g/m/sup 3/ higher in the summer (median indoor/outdoor ratio 2.4) and 36 ..mu..g/m/sup 3/ (median indoor/outdoor ratio 3.2) higher in the winter than outdoor levels. Personal exposures were closely related to indoor averages for households with gas stoves (r = 0.85 summer, r = 0.87 winter) and with electric stoves (r = 0.68 summer, r = 0.61 winter); more than 65% of the average day was spent at home while about 15% was spent outdoors in summer and less than 5% in winter. The association between personal exposure and outdoor levels of NO/sub 2/ was weakest during the winter for both gas (r = 0.20) and electric (r = 0.28) stove groups. The measures of exposure and time allocation indicate that there is a wide range of variability in personal exposures to NO/sub 2/ that may not be adequately accounted for by simple stratifications based on cooking fuel type. 46 references, 7 tables.

  16. Indoor air quality: multivariate analyses of the relationship between indoor and outdoor aerosols

    SciTech Connect (OSTI)

    McCarthy, S.M.

    1986-01-01T23:59:59.000Z

    A unique multivariate data set incorporating simultaneous indoor and outdoor measurements of sixteen air contaminants at ten homes has been used to investigate the contribution of outdoor concentrations to indoor aerosol variability, and to characterize indoor source contribution to the indoor concentrations. The data were available from an earlier field study of particle and gas concentrations outside and inside five homes in each of two cities: Portage, Wisconsin, and Steubenville, Ohio. Three distinct multivariate statistical techniques were used sequentially in the research, successively building on the results and interpretations as they developed. Cluster analysis was selected as the initial method for partitioning the variables into subgroups comprised of highly intercorrelated variables. Significant site-to-site variability was evident in both cities, however within sites, indoor clusters had similarities to the outdoor clusters. Principal component analysis was next performed on the Portage data, reduced in dimension to avoid problems of singularity in the data matrix. The principal component analyses results were used to attribute predominant indoor and outdoor sources, including cigarette smoke, wood stove, road dust, and urban combustion sources. Finally, multiple regression analysis was performed to relate outdoor pollutant concentrations to a composite index of the indoor aerosol as represented by the orthogonal rotations of the indoor principal components. The research indicates that this multivariate analysis framework is preferable to single univariate analysis in evaluating the influence of outdoor aerosols and indoor sources on indoor air quality data.

  17. Measuring Outdoor Air Intake Rates into Existing Building

    SciTech Connect (OSTI)

    Fisk, William; Sullivan, Douglas; Cohen, Sebastian; Han, Hwataik

    2009-04-16T23:59:59.000Z

    Practical and accurate technologies are needed for continuously measuring and controlling outdoor air (OA) intake rates in commercial building heating, ventilating, and air conditioning (HVAC) systems. This project evaluated two new measurement approaches. Laboratory experiments determined that OA flow rates were measurable with errors generally less than 10 percent using electronic air velocity probes installed between OA intake louver blades or at the outlet face of louvers. High accuracy was maintained with OA flow rates as low as 15 percent of the maximum for the louvers. Thus, with this measurement approach HVAC systems do not need separate OA intakes for minimum OA supply. System calibration parameters are required for each unique combination of louver type and velocity sensor location but calibrations are not necessary for each system installation. The research also determined that the accuracy of measuring OA flow rates with velocity probes located in the duct downstream of the intake louver was not improved by installing honeycomb airflow straighteners upstream of the probes. Errors varied with type of upstream louver, were as high as 100 percent, and were often greater than 25 percent. In conclusion, use of electronic air velocity probes between the blades of OA intake louvers or at the outlet face of louvers is a highly promising means of accurately measuring rates of OA flow into HVAC systems. The use of electronic velocity probes downstream of airflow straighteners is less promising, at least with the relatively small OA HVAC inlet systems employed in this research.

  18. Indoor-Outdoor Air Leakage of Apartments and Commercial Buildings

    SciTech Connect (OSTI)

    Price, P.N.; Shehabi, A.; Chan, R.W.; Gadgil, A.J.

    2006-06-01T23:59:59.000Z

    We compiled and analyzed available data concerning indoor-outdoor air leakage rates and building leakiness parameters for commercial buildings and apartments. We analyzed the data, and reviewed the related literature, to determine the current state of knowledge of the statistical distribution of air exchange rates and related parameters for California buildings, and to identify significant gaps in the current knowledge and data. Very few data were found from California buildings, so we compiled data from other states and some other countries. Even when data from other developed countries were included, data were sparse and few conclusive statements were possible. Little systematic variation in building leakage with construction type, building activity type, height, size, or location within the u.s. was observed. Commercial buildings and apartments seem to be about twice as leaky as single-family houses, per unit of building envelope area. Although further work collecting and analyzing leakage data might be useful, we suggest that a more important issue may be the transport of pollutants between units in apartments and mixed-use buildings, an under-studied phenomenon that may expose occupants to high levels of pollutants such as tobacco smoke or dry cleaning fumes.

  19. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  1. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  2. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  3. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  4. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  5. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  6. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  7. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  8. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  9. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  10. Safety of Hydrogen Systems Installed in Outdoor Enclosures

    SciTech Connect (OSTI)

    Barilo, Nick F.

    2013-11-06T23:59:59.000Z

    The Hydrogen Safety Panel brings a broad cross-section of expertise from the industrial, government, and academic sectors to help advise the U.S. Department of Energys (DOE) Fuel Cell Technologies Office through its work in hydrogen safety, codes, and standards. The Panels initiatives in reviewing safety plans, conducting safety evaluations, identifying safety-related technical data gaps, and supporting safety knowledge tools and databases cover the gamut from research and development to demonstration and deployment. The Panels recent work has focused on the safe deployment of hydrogen and fuel cell systems in support of DOE efforts to accelerate fuel cell commercialization in early market applications: vehicle refueling, material handling equipment, backup power for warehouses and telecommunication sites, and portable power devices. This paper resulted from observations and considerations stemming from the Panels work on early market applications. This paper focuses on hydrogen system components that are installed in outdoor enclosures. These enclosures might alternatively be called cabinets, but for simplicity, they are all referred to as enclosures in this paper. These enclosures can provide a space where a flammable mixture of hydrogen and air might accumulate, creating the potential for a fire or explosion should an ignition occur. If the enclosure is large enough for a person to enter, and ventilation is inadequate, the hydrogen concentration could be high enough to asphyxiate a person who entered the space. Manufacturers, users, and government authorities rely on requirements described in codes to guide safe design and installation of such systems. Except for small enclosures used for hydrogen gas cylinders (gas cabinets), fuel cell power systems, and the enclosures that most people would describe as buildings, there are no hydrogen safety requirements for these enclosures, leaving gaps that must be addressed. This paper proposes that a technical basis be developed to enable code bodies to write requirements for the range of enclosures from the smallest to the largest.

  11. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  12. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: Integrate information from different communication

  13. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  14. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  15. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  16. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  17. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  18. Smart lighting: New Roles for Light

    E-Print Network [OSTI]

    Salama, Khaled

    Smart lighting: New Roles for Light in the Solid State Lighting World Robert F. Karlicek, Jr. Director, Smart Lighting Engineering Research Center Professor, Electrical, Systems and Computer Lighting What is Smart Lighting Technology Barriers to Smart Lighting Visible Light Communications

  19. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  20. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems Architectural and policy

  1. Commercial Lighting

    Broader source: Energy.gov [DOE]

    Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

  2. Indoor and Outdoor in Situ High-Resolution Gamma Radiation Measurements in Urban Areas of Cyprus

    E-Print Network [OSTI]

    E. Svoukis; H. Tsertos

    2006-10-02T23:59:59.000Z

    In situ, high-resolution, gamma-ray spectrometry of a total number of 70 outdoor and 20 indoor representative measurements were performed in preselected, common locations of the main urban areas of Cyprus. Specific activities and gamma absorbed dose rates in air due to the naturally occurring radionuclides of Th-232 and U-238 series, and K-40 are determined and discussed. Effective dose rate to the Cyprus population due to terrestrial gamma radiation is derived directly from this work. The results obtained outdoors match very well with those derived previously by high-resolution gamma spectrometry of soil samples, which were collected from the main island bedrock surface. This implies that the construction and building materials in urban areas do not affect the external gamma dose rate; thus they are mostly of local origin. Finally, the indoor/outdoor gamma dose ratio was found to be 1.4 +- 0.5.

  3. Indoor and Outdoor in Situ High-Resolution Gamma Radiation Measurements in Urban Areas of Cyprus

    E-Print Network [OSTI]

    Svoukis, E

    2006-01-01T23:59:59.000Z

    In situ, high-resolution, gamma-ray spectrometry of a total number of 70 outdoor and 20 indoor representative measurements were performed in preselected, common locations of the main urban areas of Cyprus. Specific activities and gamma absorbed dose rates in air due to the naturally occurring radionuclides of Th-232 and U-238 series, and K-40 are determined and discussed. Effective dose rate to the Cyprus population due to terrestrial gamma radiation is derived directly from this work. The results obtained outdoors match very well with those derived previously by high-resolution gamma spectrometry of soil samples, which were collected from the main island bedrock surface. This implies that the construction and building materials in urban areas do not affect the external gamma dose rate; thus they are mostly of local origin. Finally, the indoor/outdoor gamma dose ratio was found to be 1.4 +- 0.5.

  4. Movement of outdoor particles to the indoor environment: An analysis of the Arnhem Lead Study

    SciTech Connect (OSTI)

    Layton, D.W. [Lawrence Livermore National Lab., CA (United States); Thatcher, T.L. [Univ. of California, Berkeley, CA (United States). Dept. of Civil Engineering

    1995-03-01T23:59:59.000Z

    This paper analyzes the role of soil tracking as a source of indoor particles and quantifies key parameters influencing the transport of soil-derived particles (resuspension rates for particulate matter on floors, deposition velocities of suspended particles in indoor and outdoor air). The paper begins with a brief review of studies of particle transport processes and presents a simple model for studying the transport of particles in the indoor environment. The model is used to examine data on Pb distributions in the indoor and outdoor environments of community adjacent to a secondary lead smelter.

  5. Lecture 13: Control System Cyber Security

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  6. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  7. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  8. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  9. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  10. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  11. The effect of agrochemicals on indicator bacteria densities in outdoor mesocosmsemi_2287 3150..3158

    E-Print Network [OSTI]

    Rohr, Jason

    The effect of agrochemicals on indicator bacteria densities in outdoor mesocosmsemi_2287 3150, including patho- gens. Agrochemicals may influence the survival of these microorganisms in water bodies were used to investigate the response of Escherichia coli and enterococci to agrochemicals. Replicate

  12. Emergency Communications Outdoor Warning Siren: As part of our continued commitment to enhancing safety measures

    E-Print Network [OSTI]

    Karsai, Istvan

    is designed to be heard OUTDOORS ONLY. ETSU's sirens are set up to sound during immediate life activities." For more information on ETSU's siren system please visit the following website http://www.etsu-mail address on the GoldAlert registration website http://www.etsu.edu/goldalert . This URL is located on ETSU

  13. We see plants nearly everywhere in our environment. They dominate outdoor

    E-Print Network [OSTI]

    Reiterer, Harald

    We see plants nearly everywhere in our environment. They dominate outdoor scenes and most interior scenes as well. So why do we only have a few satisfactory plant models? We think it's because, so far, creating plants is a job for experts who can handle the large structural and geometrical com- plexity

  14. Outdoor Scene Synthesis in the Infrared Range for Remote Sensing Applications

    E-Print Network [OSTI]

    Boyer, Edmond

    Outdoor Scene Synthesis in the Infrared Range for Remote Sensing Applications Thierry Poglio Eric under remote sensing applications, like meteorology, farming, or military information are concerned. Yet. The solar forcing leads to an increase in temperature, while heat transfer due to strong cold wind decreases

  15. Simple Surface Reflectance Estimation of Diffuse Outdoor Object using Spherical Images

    E-Print Network [OSTI]

    Tokyo, University of

    percent of a 360-degree field of view; thus, it captures the radiance of an object and il- lumination- eral ways. Yu et al., the first who handled outdoor objects, took photographs of the sun and sky was calculated by the time and date, and the sky radiance was fitted to the CIE (International Commission

  16. Ris-M-2476 RELATIONSHIPS IN INDOOR/OUTDOOR AIR POLLUTION

    E-Print Network [OSTI]

    Risø-M-2476 RELATIONSHIPS IN INDOOR/OUTDOOR AIR POLLUTION Jørn Roed Abstract. Beryllium-7 a pollution episode, especially a reactor accident. The effect of operating a vacuum cleaner during the pollution episode and airing shortly after is also investigated. Earlier relevant literature is reviewed

  17. Outdoor 3D Acquisition System for Small and Fast Targets. Application to honeybee monitoring at the

    E-Print Network [OSTI]

    Boyer, Edmond

    Outdoor 3D Acquisition System for Small and Fast Targets. Application to honeybee monitoring-based system for monitoring honeybees in 3D at the beehive entrance. In this context, this article highlights or health conditions. 1 Introduction The honeybee is a bio-indicator species, and nowadays researchers use

  18. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org Energy Security & Climate Change:

  20. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  1. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  2. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  3. Light Pollution as Part of the Environmental Problems

    E-Print Network [OSTI]

    Quaranta, Nancy

    2012-01-01T23:59:59.000Z

    Unscrupulous outdoor lighting produces a number of effects that are currently included under the term light pollution. Its consequences (e.g. loss of resources by energy waste), are being recognized for some time, as well as the possibility to mitigate this pollution. In the present work, we present some lines of action developed at the Facultad Regional San Nicol\\'as of National Technological University (UTN) of Argentina to include the CL as a regular topic of study in the problems of air pollution.

  4. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  6. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  7. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  8. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  9. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  10. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  11. Light Properties Light travels at the speed of light `c'

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    LIGHT!! #12;Light Properties Light travels at the speed of light `c' C = 3 x 108 m/s Or 190,000 miles/second!! Light could travel around the world about 8 times in one second #12;What is light?? Light is a "wave packet" A photon is a "light particle" #12;Electromagnetic Radiation and You Light is sometimes

  12. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  15. Smart Lighting Controller!! Smart lighting!

    E-Print Network [OSTI]

    Anderson, Betty Lise

    1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if://blogs.stthomas.edu/realestate/2011/01/24/residential-real-estate-professionals-how-do-you- develop feedback! There is a connection between the output and the input! Therefore forces inputs to same voltage

  16. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  17. Beam Measurements of a CLOUD (Cosmics Leaving OUtdoor Droplets) Chamber

    E-Print Network [OSTI]

    Jasper Kirkby

    2001-04-27T23:59:59.000Z

    A striking correlation has recently been observed between global cloud cover and the flux of incident cosmic rays. The effect of natural variations in the cosmic ray flux is large, causing estimated changes in the Earth's energy radiation balance that are comparable to those attributed to greenhouse gases from the burning of fossil fuels since the Industrial Revolution. However a direct link between cosmic rays and cloud formation has not been unambiguously established. We therefore propose to experimentally measure cloud (water droplet) formation under controlled conditions in a test beam at CERN with a CLOUD chamber, duplicating the conditions prevailing in the troposphere. These data, which have never been previously obtained, will allow a detailed understanding of the possible effects of cosmic rays on clouds and confirm, or otherwise, a direct link between cosmic rays, global cloud cover and the Earth's climate. The measurements will, in turn, allow more reliable calculations to be made of the residual effect on global temperatures of the burning of fossil fuels, an issue of profound importance to society. Furthermore, light radio-isotope records indicate a correlation has existed between global climate and the cosmic ray flux extending back over the present inter-glacial and perhaps earlier. This suggests it may eventually become possible to make long-term (10-1,000 year) predictions of changes in the Earth's climate, provided a deeper understanding can be achieved of the ``geomagnetic climate'' of the Sun and Earth that modulates the cosmic-ray flux.

  18. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

  19. Influence of Transfer Efficiency of the Outdoor Pipe Network and Boiler Operating Efficiency on the Building Heat Consumption Index

    E-Print Network [OSTI]

    Fang, X.; Wang, Z.; Liu, H.

    2006-01-01T23:59:59.000Z

    This paper analyzes the influence of transfer efficiency of the outdoor pipe network and operating efficiency of the boiler on the building heat consumption index, on the premise of saving up to 65 percent energy in different climates. The results...

  20. The effects of outdoor heat exchanger hydrophobic treatment on the performance of an air source heat pump

    E-Print Network [OSTI]

    Parker, Brandon DeWayne

    1995-01-01T23:59:59.000Z

    compared to tests that utilized coated aluminum outdoor heat exchangers. The overall performance of each test was analyzed. These tests were carried out for cooling and heating mode conditions. The adhesion strength of water droplets to a bare aluminum...

  1. Nearby Outdoor Environmental Support of Older Adults' Yard Activities, Neighborhood Walking and Independent Living in the Community

    E-Print Network [OSTI]

    Wang, Zhe

    2011-02-22T23:59:59.000Z

    to remain healthy and gives them the ability to access daily-life services, and thus extend their independent years at home. Nearby outdoor environments on residential sites and in the neighborhoods may influence older adults' independent living through...

  2. The effect of hardware configuration on the performance of residential air conditioning systems at high outdoor ambient temperatures

    E-Print Network [OSTI]

    Bain, Joel Alan

    1995-01-01T23:59:59.000Z

    A study was performed which investigated the effect of hardware configuration on air conditioning cooling system performance at high outdoor temperatures. The initial phase of the investigation involved the testing of ten residential air...

  3. Air Corrosivity in U.S. Outdoor-Air-Cooled Data Centers is Similar to That in Conventional Data Centers

    E-Print Network [OSTI]

    Coles, Henry C.

    2012-01-01T23:59:59.000Z

    is Just Prior to Cooling Air Entering IT Equipment FigureGadgil, A.J. and Tschudi, W.F. , Air Corrosivity in U.S.Outdoor-Air-Cooled Data Centers is Similar to That in

  4. Outdoor Performance of a Thin-Film Gallium-Arsenide Photovoltaic Module

    SciTech Connect (OSTI)

    Silverman, T. J.; Deceglie, M. G.; Marion, B.; Cowley, S.; Kayes, B.; Kurtz, S.

    2013-06-01T23:59:59.000Z

    We deployed a 855 cm2 thin-film, single-junction gallium arsenide (GaAs) photovoltaic (PV) module outdoors. Due to its fundamentally different cell technology compared to silicon (Si), the module responds differently to outdoor conditions. On average during the test, the GaAs module produced more power when its temperature was higher. We show that its maximum-power temperature coefficient, while actually negative, is several times smaller in magnitude than that of a Si module used for comparison. The positive correlation of power with temperature in GaAs is due to temperature-correlated changes in the incident spectrum. We show that a simple correction based on precipitable water vapor (PWV) brings the photocurrent temperature coefficient into agreement with that measured by other methods and predicted by theory. The low operating temperature and small temperature coefficient of GaAs give it an energy production advantage in warm weather.

  5. Data:Db98df4f-f52c-4ef5-8d56-516dc5d87ae8 | Open Energy Information

    Open Energy Info (EERE)

    2 3 Next >> Basic Information Utility name: Slash Pine Elec Member Corp Effective date: 19970201 End date if known: Rate name: Outdoor Lighting 400 Watt MV Security Light Sector:...

  6. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  7. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  8. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  9. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  10. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  11. Growing Minds: The Relationship Between Parental Attitudes About Children Spending Time Outdoors And Their Children's Overall Health

    E-Print Network [OSTI]

    Hammond, Danielle E.

    2010-07-14T23:59:59.000Z

    were spent indoors watching TV (Hofferth and Sandberg, 2001b). Children ages 12 to 14 now spend only 50 minutes per weekend day doing sports and outdoor activities (Juster et al., 2004). Even with the reports of positive health benefits from... of time children spend indoors. A study done on children under the age of 13 found that approximately half an hour a week was spent outdoors by children doing activities such as gardening, picnicking, playing, walking and hiking (Hofferth and Sandberg...

  12. Monitoring and simulation of the thermal performance of solar heated outdoor swimming pools

    SciTech Connect (OSTI)

    Hahne, E.; Kuebler, R. (Universitaet Stuttgart (Germany))

    1994-07-01T23:59:59.000Z

    Based on detailed measurements of two outdoor swimming pools (at Leonberg and Moehringen) a computer model has been developed and validated for the simulation of the thermal behaviour of such pools. The subroutine is compatible to TRNSYS 13.1. Correlations for the heat losses due to evaporation, convection, and radiation were taken from literature and tested in the model. It was not possible to select one optimal correlation for the description of the evaporative heat losses of both swimming pools due to the different exposure to wind. Using the most suitable correlation for the evaporative heat losses of each pool allowed for the simulation of the pool temperature with less than 0.5 K standard deviation between measured and simulated temperature. the major problem was the measurement of the relevant wind speed to be used in the correlations describing the evaporative heat losses under real outdoor conditions. A method is described detailing how to calibrate the model using the heating energy requirement and the measured pool temperature during actual operation periods. The analysis of the measured data of two different outdoor swimming pools under the same climatic conditions showed differences of a factor 2 and more in the heat demand per unit pool area. This was mainly caused by the difference in local wind speed which differed by more than a factor 4. The two pools investigated were heated by solar energy with a fraction of 28% and 14%, respectively, and the seasonal efficiency of the solar systems was 37.7% and 33.4%. Simulations show that a reduction of the water temperature from 24[degrees]C to 22[degrees]C during periods with low outdoor temperatures and few visitors, reduces the fuel consumption to less than half and increases the solar fraction from 28% to 50% in one pool.

  13. Factors affecting the concentration of outdoor particles indoors (COPI): Identification of data needs and existing data

    SciTech Connect (OSTI)

    Thatcher, Tracy L.; McKone, Thomas E.; Fisk, William J.; Sohn, Michael D.; Delp, Woody W.; Riley, William J.; Sextro, Richard G.

    2001-12-01T23:59:59.000Z

    The process of characterizing human exposure to particulate matter requires information on both particle concentrations in microenvironments and the time-specific activity budgets of individuals among these microenvironments. Because the average amount of time spent indoors by individuals in the US is estimated to be greater than 75%, accurate characterization of particle concentrations indoors is critical to exposure assessments for the US population. In addition, it is estimated that indoor particle concentrations depend strongly on outdoor concentrations. The spatial and temporal variations of indoor particle concentrations as well as the factors that affect these variations are important to health scientists. For them, knowledge of the factors that control the relationship of indoor particle concentrations to outdoor levels is particularly important. In this report, we identify and evaluate sources of data for those factors that affect the transport to and concentration of outdoor particles in the indoor environment. Concentrations of particles indoors depend upon the fraction of outdoor particles that penetrate through the building shell or are transported via the air handling (HVAC) system, the generation of particles by indoor sources, and the loss mechanisms that occur indoors, such as deposition. To address these issues, we (i) identify and assemble relevant information including the behavior of particles during air leakage, HVAC operations, and particle filtration; (ii) review and evaluate the assembled information to distinguish data that are directly relevant to specific estimates of particle transport from those that are only indirectly useful and (iii) provide a synthesis of the currently available information on building air-leakage parameters and their effect on indoor particle matter concentrations.

  14. A plan for teaching waste management education at an outdoor education center

    E-Print Network [OSTI]

    Armstrong, Joe Don

    1994-01-01T23:59:59.000Z

    management has become a top environmental concern. Effective environmental education can help reduce the demands currently placed on our landfills. Outdoor education centers are playing a key role in environmental education. This paper proposes a plan... REFERENCES APPENDICES 93 100 103 105 PLASTIC CONTAINER CODE SYSTEM DATA SHEET 108 TABLE OF CONTENTS (continued) Vi APPENDICES CLASS-Y-TRASH DATA SHEET Page 109 LANDFILL DIAGRAM 110 IT'S HAPPENING AT THE DUMP DATA SHEET 111 WASTE ESTIMATE DATA...

  15. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems securityTrust: An Element of Information Security, in Security andInternational Journal of Information Security, vol. 4, pp.

  16. Cerenkov Light

    ScienceCinema (OSTI)

    Slifer, Karl

    2014-05-22T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  17. Cerenkov Light

    SciTech Connect (OSTI)

    Slifer, Karl

    2013-06-13T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  18. Lighting Renovations

    Broader source: Energy.gov [DOE]

    When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

  19. Quantum cryptography for secure free-space communications

    SciTech Connect (OSTI)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01T23:59:59.000Z

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  20. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  1. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  2. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  3. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  4. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  5. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

  6. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  7. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  8. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  9. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  10. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  11. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  12. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  13. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  14. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  15. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  16. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  17. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  18. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  19. Performance Stabilization of CdTe PV Modules using Bias and Light

    SciTech Connect (OSTI)

    Silverman, T. J.; Deceglie, M. G.; Marion, B.; Kurtz, S. R.

    2014-07-01T23:59:59.000Z

    Reversible performance changes due to light exposure frustrate repeatable performance measurements on CdTe PV modules. It is common to use extended light-exposure to ensure that measurements are representative of outdoor performance. We quantify the extent to which such a light-exposed state depends on module temperature and consider bias in the dark to aid in stabilization. We evaluate the use of dark forward bias to bring about a performance state equivalent to that obtained with light exposure, and to maintain a light-exposed state prior to STC performance measurement. Our results indicate that the most promising method for measuring a light-exposed state is to use light exposure at controlled temperature followed by prompt STC measurement with a repeatable time interval between exposure and the STC measurement.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 The intent behind the current security measures in place at OHSU The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  5. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  6. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  7. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  8. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  9. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  10. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  11. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  12. A comparison of Nannochloropsis salina growth performance in two outdoor pond designs: conventional raceways versus the ARID pond with superior temperature management

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Crowe, Braden [Pacific Northwest National Laboratory; Attalah, Said [University of Arizona; Agrawal, Shweta [University of Arizona; Waller, Peter [University of Arizona; Ryan, Randy [University of Arizona.edu; Van Wagenen, Jon [Pacific Northwest National Laboratory; Chavis, Aaron [Pacific Northwest National Laboratory; Kyndt, John [University of Arizona; Kacira, Murat [University of Arizona; Ogden, Kim L. [University of Arizona; Huesemann, Michael [Pacific Northwest National Laboratory

    2012-01-01T23:59:59.000Z

    A comparison of Nannochloropsis salina growth performance in two outdoor pond designs: conventional raceways versus the ARID pond with superior temperature management

  13. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  14. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, W.J.

    1983-06-30T23:59:59.000Z

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

  15. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  16. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  17. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  18. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda What do Safety/Security work with? If something happens Opening hours Remember Website How to find us #12;The Section for Safety and Security work with; Security revolving work environment Handle locks, keys, alarms, surveillance Responsible

  19. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  20. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  1. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  2. A survey and comparative analysis of selected university outdoor recreation/education centers

    E-Print Network [OSTI]

    Brewer, Randy Carter

    1984-01-01T23:59:59.000Z

    of the survey schedule can be found in Appendix A. Methods of Data Collection The method of data collection utilized in this study was the on-site personal interview. As a method of data collection in survey studies, the personal interview has been held...- search technique was an on-site population status survey based on a 3x2x2 classification scheme using an interview data collection technique. It was concluded that major outdoor recreation/education centers (O'RECs) develop on the basis of individual...

  3. Recreation motivators and facility factors as relative determinants of urban outdoor recreation behavior and satisfaction

    E-Print Network [OSTI]

    Milkes, Jeffrey Stephen

    1987-01-01T23:59:59.000Z

    Years from Now 22K No 78$ Yes 19K No 81$ Yes Mean Outdoor Recreation Spending Per Week 16. 95 35. 31 FIGURE 3 Comparison of Respondents to Nonrespondents NUMBER OF CHILDREN IN HOUSEHOLD LIVING AKRNGENENT 3. 5 2. 8 ' e 4% Whi $43, 0 81... Development Mail Survey Data Collection and Coding Data Analysis. V FINDINGS The Sampled Population . The Presentation of the Results qf Each Hypothesis Tested Summary of Analysis Results. 14 14 14 15 18 20 21 23 24 24 31 34 36 40 40 46...

  4. Eucalyptus kraft black liquor enhances growth and productivity of Spirulina in outdoor cultures

    SciTech Connect (OSTI)

    Chauhan, V.S.; Singh, G.; Ramamurthy, V. [Thapar Institute of Engineering and Technology, Patiala (India)

    1995-07-01T23:59:59.000Z

    Mass cultivation of microalgae for commercial applications suffers from poor productivities when measured against laboratory results or theoretical projections. In an effort to reduce this gap it was discovered that addition of eucalyptus kraft black liquor (BL) enhanced biomass productivity in outdoor cultures of Spirulina by increasing growth rate by 38% and biomass yield by 43%. BL treatment resulted in elevation of nitrogen assimilating enzyme activities and efficiency of phosphate utilization. Analyses of forenoon and afternoon oxygen production rates (OPRs) indicated higher photosynthetic and respiratory activity in BL-treated cultures compared to untreated cultures. 20 refs., 1 fig., 2 tabs.

  5. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  6. An Assessment of the U.S. Residential Lighting Market

    SciTech Connect (OSTI)

    Jennings, Judy; Brown, Rich; Moezzi, Mithra; Mills, Evan; Sardinsky, Robert

    1995-10-01T23:59:59.000Z

    This report provides background data upon which residential lighting fixture energy conservation programs can be built. The current stock of residential lighting is described by usage level, lamp wattage, fixture type, and location within the house. Data are discussed that indicate that 25% of residential fixtures are responsible for 80% of residential lighting energy use, and that justify targeting these fixtures as candidates for retrofit with energy-efficient fixtures. Fixtures determined to have the highest energy use are hardwired ceiling fixtures in kitchens, living/family rooms, dining rooms, and outdoors. An assessment of the market for residential fixtures shows that nearly half of new residential fixtures are imported, 61% of new fixtures sold are hardwired, and about half of all new fixtures sold are for ceiling installation.

  7. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  8. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  9. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  10. Trial Demonstration of Area Lighting Retrofit: Yuma Border Patrol, Yuma Arizona

    SciTech Connect (OSTI)

    Wilkerson, Andrea M.; McCullough, Jeffrey J.

    2014-12-30T23:59:59.000Z

    The Yuma Sector Border Patrol Area is a high flux lighting application in a high temperature environment, presenting a formidable challenge for light-emitting diodes (LEDs). This retrofit is an Energy Savings Performance Contract ENABLE project under the U.S. Department of Energy (DOE) Federal Energy Management Program. If high flux LED technology performs well in a region with high ambient temperature and solar radiation, it can perform well in most outdoor environments. The design process for the Yuma retrofit has already provided valuable knowledge to CBP and DOE. The LED lighting system selected for the retrofit is expected to reduce energy consumption 69% compared to the incumbent quartz metal halide (QMH) lighting system. If the LED lighting system is installed, GATEWAY will continue to document and disseminate information regarding the installation and long-term performance so that others may also gain valuable knowledge from the Yuma Sector Border Patrol Area lighting retrofit.

  11. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  13. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  15. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  16. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  18. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  19. Direct Analysis of JV-Curves Applied to an Outdoor-Degrading CdTe Module (Presentation)

    SciTech Connect (OSTI)

    Jordan, D; Kurtz, S.; Ulbrich, C.; Gerber, A.; Rau, U.

    2014-03-01T23:59:59.000Z

    We present the application of a phenomenological four parameter equation to fit and analyze regularly measured current density-voltage JV curves of a CdTe module during 2.5 years of outdoor operation. The parameters are physically meaningful, i.e. the short circuit current density Jsc, open circuit voltage Voc and differential resistances Rsc, and Roc. For the chosen module, the fill factor FF degradation overweighs the degradation of Jsc and Voc. Interestingly, with outdoor exposure, not only the conductance at short circuit, Gsc, increases but also the Gsc(Jsc)-dependence. This is well explained with an increase in voltage dependent charge carrier collection in CdTe.

  20. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  1. Lai, D., Guo, D., Hou, Y., Lin, C., and Chen, Q. 2014. "Studies of Outdoor Thermal Comfort in Northern China," Building and Environment, 77, 110-118

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    Lai, D., Guo, D., Hou, Y., Lin, C., and Chen, Q. 2014. "Studies of Outdoor Thermal Comfort in Northern China," Building and Environment, 77, 110-118 Studies of Outdoor Thermal Comfort in Northern China Engineering, Purdue University, Indiana, USA 2 School of Environment Science and Engineering, Tianjin

  2. Light Computing

    E-Print Network [OSTI]

    Gordon Chalmers

    2006-10-13T23:59:59.000Z

    A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

  3. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda Overview Security goals Security approaches prevention

  4. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  5. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10T23:59:59.000Z

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  6. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  8. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  9. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  10. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  11. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  12. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  13. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  14. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security, ACM Journal onWorld Conference on Information Security Education pp. 23Colloquium on Information Systems Security Education (CISSE)

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS, Hanover, NH,on the Economics of Information Security. Anderson, R. and

  16. LED Provides Effective and Efficient Parking Area Lighting at the NAVFAC Engineering Service Center

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PM toLED Lighting Facts LED LightingOutdoorLED

  17. Residential Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical squestionnairesquestionnaires AgreementLighting

  18. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  19. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  20. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  1. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  2. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  4. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  5. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  6. Mechanistic modeling of the interrelationships between indoor/outdoor air quality and human exposure in a GIS framework

    SciTech Connect (OSTI)

    Isukapalli, S.S.; Purushothaman, V.; Georgopoulos, P.G.

    1999-07-01T23:59:59.000Z

    Evaluation of human exposure to atmospheric contaminants such as ozone and particulate matter (PM) is often based on measured data from fixed ambient (outdoors) Air Monitoring Stations. This results in an artificial characterization of indoor exposures, as concentrations and physicochemical attributes of indoor pollutants vary significantly and are different from corresponding outdoor values. A mechanistically-based modeling approach is presented here that aims to improve estimates for the outdoor/indoor relationships of photochemical pollutants and of associated fine particles and, subsequently, of human exposure assessments. New approaches for refining the spatial, temporal, and indoor/outdoor patterns of gas phase photochemical contaminants and PM are currently being developed and tested. These approaches are combined with information from either ambient monitoring networks or from ambient air quality models that consider aerosol physics and chemistry coupled with gas phase photochemistry (e.g. UAM-AERO). This process utilizes Geographic Information Systems (GIS) and Relational Database (RD) methods, to facilitate detailed exposure scenario construction (involving e.g. the geographic location of an individual considered in time) and to aid in the estimation of population exposure over selected geographic areas. The combination of monitor data or air quality modeling with microenvironmental modeling in a GIS framework can potentially provide a useful platform for more accurate assessments of human exposure to co-occurring gas and particulate phase air pollutants.

  7. Application of the Transmission Line Matrix method for outdoor sound propagation modelling Part 2: Experimental validation using

    E-Print Network [OSTI]

    Ribes, Aurlien

    noise levels under different propagation conditions were com- pared to in situ measurements for application to outdoor sound propagation, i.e. to take into account topography, ground impedance compared with the meteorological measurements during the experimental campaign. In Section 4, the numerical

  8. Lighting Inventory Lighting Theatre and Drama

    E-Print Network [OSTI]

    Indiana University

    Lighting Inventory Lighting Theatre and Drama Description Totals R.Halls Wells- Metz Light ERS ETC SourceFour 25 25 50 degree ERS Strand Lighting 64 14 24 12 14 36 degree ERS ETC Source Four 15 15 36 degree ERS Strand Lighting 124 60 58 2 4 26 degree ERS ETC SourceFour 2 2 26 degree ERS Strand

  9. A comparison of Nannochloropsis salina growth performance in two outdoor pond designs: conventional raceways versus the ARID pond with superior temperature management

    SciTech Connect (OSTI)

    Crowe, Braden J.; Attalah, Said; Agrawal, Shweta; Waller, Peter; Ryan, Randy; Van Wagenen, Jonathan M.; Chavis, Aaron R.; Kyndt, John; Kacira, Murat; Ogden, Kimberly L.; Huesemann, Michael H.

    2012-10-01T23:59:59.000Z

    The present study examines how climatic conditions and pond design affect the growth performance of microalgae. From January to April of 2011, outdoor batch cultures of Nannochloropsis salina were grown in three replicate 780 L conventional raceways, as well as in an experimental 7500 L ARID (Algae Raceway Integrated Design) pond. The ARID culture system utilizes a series of 8 to 20 cm deep basins and a 1.5 m deep canal to enhance light exposure and mitigate temperature variations and extremes. The ARID culture reached the stationary phase 27 days earlier than the conventional raceways, which can be attributed to its superior temperature management and shallower basins. On a night when the air temperature dropped to -9 C, the water temperature was 18 C higher in the ARID pond than in the conventional raceways. Lipid and fatty acid content ranged from 16 - 25 % and 5 - 15 %, respectively, as a percentage of AFDW. Palmitic, palmitoleic, and eicosapentaenoic acid comprised the majority of fatty acids. While the ARID culture system achieved nearly double the volumetric productivity relative to the conventional raceways (0.023 vs 0.013 g L-1day-1), areal biomass productivities were of similar magnitude in both pond systems (3.34 vs. 3.47 g m-2day-1), suggesting that the ARID pond design has to be further optimized, most likely by increasing the culture depth or operating at higher cell densities while maintaining adequate mixing.

  10. Measuring the Optical Performance of Evacuated Receivers via an Outdoor Thermal Transient Test: Preprint

    SciTech Connect (OSTI)

    Kutscher, C.; Burkholder, F.; Netter, J.

    2011-08-01T23:59:59.000Z

    Modern parabolic trough solar collectors operated at high temperatures to provide the heat input to Rankine steam power cycles employ evacuated receiver tubes along the collector focal line. High performance is achieved via the use of a selective surface with a high absorptance for incoming short-wave solar radiation and a low emittance for outgoing long-wave infrared radiation, as well as the use of a hard vacuum to essentially eliminate convective and conductive heat losses. This paper describes a new method that determines receiver overall optical efficiency by exposing a fluid-filled, pre-cooled receiver to one sun outdoors and measuring the slope of the temperature curve at the point where the receiver temperature passes the glass envelope temperature (that is, the point at which there is no heat gain or loss from the absorber). This transient test method offers the potential advantages of simplicity, high accuracy, and the use of the actual solar spectrum.

  11. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  12. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  13. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  14. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  15. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  16. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  17. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  18. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  19. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  20. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  1. LED Lighting Basics

    Broader source: Energy.gov [DOE]

    Light-Emitting diodes (LEDs) efficiently produce light in a fundamentally different way than any legacy or traditional source of light.

  2. Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count theLienertLift Forces in a Light

  3. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  4. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  5. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  6. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  7. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  8. Corporate Security and Conflict Outcomes

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  9. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

  10. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  11. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  12. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    initiatives to be accomplished within the next five years using light technologies and best practices to provide enterprise-wide services in a cost effective and efficient...

  14. Dual LED/incandescent security fixture

    DOE Patents [OSTI]

    Gauna, Kevin Wayne

    2005-06-21T23:59:59.000Z

    A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

  15. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ... Technical Capabilities to Support PSI Foreign Policy and External Relations ............... Republic of Bevostan .. Geography ... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  16. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grgoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Mditerrane, France Cours de Master 2 Univerisit de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  17. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  18. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  19. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  20. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  1. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jrjens, TU Munich: Foundations for Designing Secure

  2. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITT GTTINGEN Computer Security Overview and Introduction Computer Security Security @ Gttingen Research group for comuter security Prof. Dr. Konrad Rieck 4 PhD students (+ 2 security Research on analysis, detection and prevention of threats Development of intelligent security

  3. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  4. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  5. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  7. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  8. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  9. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  12. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  13. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  14. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  15. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  17. Visitor ParkingP Blue Light Security Phones

    E-Print Network [OSTI]

    Vertes, Akos

    Hensley Residence Hall 15 Tennis Courts/Parking Garage*7 Cole Residence Hall 16 Dorothy Williamson Clock8 Entrance The Vern Express (Connects the Foggy Bottom & Mount Vernon campuses) GW Police P To: Mac

  18. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01T23:59:59.000Z

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  19. Sustainable Office Lighting Options

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

  20. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  1. Valuing the Invaluable: An Investigation of Outdoor Recreation Behavior, Perceived Values of Ecosystem Services, and Biophysical Conditions on Channel Islands National Park

    E-Print Network [OSTI]

    van Riper, Carena J

    2014-05-06T23:59:59.000Z

    , assigned values of ecosystem services, and ecological values of the CINP. In first of three papers, I tested the value-belief-norm (VBN) theory of environmentalism to determine the psychological processes driving low-impact behavior among outdoor...

  2. Assessment of outdoor radiofrequency electromagnetic field exposure through hotspot localization using kriging-based sequential sampling

    SciTech Connect (OSTI)

    Aerts, Sam, E-mail: sam.aerts@intec.ugent.be; Deschrijver, Dirk; Verloock, Leen; Dhaene, Tom; Martens, Luc; Joseph, Wout

    2013-10-15T23:59:59.000Z

    In this study, a novel methodology is proposed to create heat maps that accurately pinpoint the outdoor locations with elevated exposure to radiofrequency electromagnetic fields (RF-EMF) in an extensive urban region (or, hotspots), and that would allow local authorities and epidemiologists to efficiently assess the locations and spectral composition of these hotspots, while at the same time developing a global picture of the exposure in the area. Moreover, no prior knowledge about the presence of radiofrequency radiation sources (e.g., base station parameters) is required. After building a surrogate model from the available data using kriging, the proposed method makes use of an iterative sampling strategy that selects new measurement locations at spots which are deemed to contain the most valuable informationinside hotspots or in search of thembased on the prediction uncertainty of the model. The method was tested and validated in an urban subarea of Ghent, Belgium with a size of approximately 1 km{sup 2}. In total, 600 input and 50 validation measurements were performed using a broadband probe. Five hotspots were discovered and assessed, with maximum total electric-field strengths ranging from 1.3 to 3.1 V/m, satisfying the reference levels issued by the International Commission on Non-Ionizing Radiation Protection for exposure of the general public to RF-EMF. Spectrum analyzer measurements in these hotspots revealed five radiofrequency signals with a relevant contribution to the exposure. The radiofrequency radiation emitted by 900 MHz Global System for Mobile Communications (GSM) base stations was always dominant, with contributions ranging from 45% to 100%. Finally, validation of the subsequent surrogate models shows high prediction accuracy, with the final model featuring an average relative error of less than 2 dB (factor 1.26 in electric-field strength), a correlation coefficient of 0.7, and a specificity of 0.96. -- Highlights: We present an iterative measurement and modeling method for outdoor RF-EMF exposure. Hotspots are rapidly identified, and accurately characterized. An accurate graphical representation, or heat map, is created, using kriging. Random validation shows good correlation (0.7) and low relative errors (2 dB)

  3. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  4. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  5. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  6. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  7. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  8. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  9. A comparative study of staffing patterns at selected agencies providing outdoor adventure programs for youth-at-risk

    E-Print Network [OSTI]

    Keck, Mary A.

    1988-01-01T23:59:59.000Z

    split between a bachelor's degree and a master's degree. The most preferred experiences and certifications across all three levels were counseling and outdoor experience and first aid certification. Thirty-nine percent of the staff were hired... through referrals and thirty-eight percent of the new staff training was conducted on-the-job. Sixty-one percent of the on-going staff training was conducted by agency personnel. The salaries and benefits proved to be quite diverse among the agencies...

  10. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  11. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  12. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  13. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  14. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  16. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01T23:59:59.000Z

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  17. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprises

  18. Uncertainty Estimate for the Outdoor Calibration of Solar Pyranometers: A Metrologist Perspective

    SciTech Connect (OSTI)

    Reda, I.; Myers, D.; Stoffel, T.

    2008-12-01T23:59:59.000Z

    Pyranometers are used outdoors to measure solar irradiance. By design, this type of radiometer can measure the; total hemispheric (global) or diffuse (sky) irradiance when the detector is unshaded or shaded from the sun disk, respectively. These measurements are used in a variety of applications including solar energy conversion, atmospheric studies, agriculture, and materials science. Proper calibration of pyranometers is essential to ensure measurement quality. This paper describes a step-by-step method for calculating and reporting the uncertainty of the calibration, using the guidelines of the ISO 'Guide to the Expression of Uncertainty in Measurement' or GUM, that is applied to the pyranometer; calibration procedures used at the National Renewable Energy Laboratory (NREL). The NREL technique; characterizes a responsivity function of a pyranometer as a function of the zenith angle, as well as reporting a single; calibration responsivity value for a zenith angle of 45 ..deg... The uncertainty analysis shows that a lower uncertainty can be achieved by using the response function of a pyranometer determined as a function of zenith angle, in lieu of just using; the average value at 45..deg... By presenting the contribution of each uncertainty source to the total uncertainty; users will be able to troubleshoot and improve their calibration process. The uncertainty analysis method can also be used to determine the uncertainty of different calibration techniques and applications, such as deriving the uncertainty of field measurements.

  19. Evaluation of surface sampling method performance for Bacillus Spores on clean and dirty outdoor surfaces.

    SciTech Connect (OSTI)

    Wilson, Mollye C.; Einfeld, Wayne; Boucher, Raymond M.; Brown, Gary Stephen; Tezak, Matthew Stephen

    2011-06-01T23:59:59.000Z

    Recovery of Bacillus atrophaeous spores from grime-treated and clean surfaces was measured in a controlled chamber study to assess sampling method performance. Outdoor surfaces investigated by wipe and vacuum sampling methods included stainless steel, glass, marble and concrete. Bacillus atrophaeous spores were used as a surrogate for Bacillus anthracis spores in this study designed to assess whether grime-coated surfaces significantly affected surface sampling method performance when compared to clean surfaces. A series of chamber tests were carried out in which known amounts of spores were allowed to gravitationally settle onto both clean and dirty surfaces. Reference coupons were co-located with test coupons in all chamber experiments to provide a quantitative measure of initial surface concentrations of spores on all surfaces, thereby allowing sampling recovery calculations. Results from these tests, carried out under both low and high humidity conditions, show that spore recovery from grime-coated surfaces is the same as or better than spore recovery from clean surfaces. Statistically significant differences between method performance for grime-coated and clean surfaces were observed in only about half of the chamber tests conducted.

  20. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  1. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  2. Lighting Options for Homes.

    SciTech Connect (OSTI)

    Baker, W.S.

    1991-04-01T23:59:59.000Z

    This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

  3. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  4. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  5. Mobile lighting apparatus

    DOE Patents [OSTI]

    Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

    2013-05-14T23:59:59.000Z

    A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

  6. Light disappears rapidly (exponentially)

    E-Print Network [OSTI]

    Kudela, Raphael M.

    #12;#12;#12;#12;Light disappears rapidly (exponentially) with depth At the same time, the color of the light shifts #12;#12;#12;#12; Euphotic zone plentiful light 0-100 m (about) Dysphotic zone very, very little light 100-1000 m (about) Aphotic zone no light below 1000 m #12;Sunlight in Water

  7. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  8. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  10. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  11. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  12. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  13. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  14. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  15. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

  16. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  17. New Light Sources for Tomorrow's Lighting Designs

    E-Print Network [OSTI]

    Krailo, D. A.

    can ever be saved on that monthly energy bill. During the past several years, many new light sources have been developed and introduced. These product introductions have not been limited to anyone lamp type, but instead may be found in fila ment..., fluorescent and high intensity discharge lamp families. Man , ufacturers of light sources have two basic goals for new product development. These goals are high efficiency lighting and improved colo'r rendering properties. High efficiency lighting may take...

  18. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  19. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  20. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  1. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  2. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  3. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  4. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  5. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  6. EK101 Engineering Light Smart Lighting

    E-Print Network [OSTI]

    Bifano, Thomas

    EK101 Engineering Light Smart Lighting Homework for 9/10 1. Make an estimate (using if the patent is granted.) 3. What is a lumen? A lux? How are the two related? How would you use a lux meter, (Lux, Lumens/m2) Luminous Flux: Perceivable light power from a source, (Lumens) Use the lux meter

  7. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  8. Specific light in sculpture

    E-Print Network [OSTI]

    Powell, John William

    1989-01-01T23:59:59.000Z

    Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

  9. Light Duty Combustion Research: Advanced Light-Duty Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and...

  10. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  11. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  12. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  13. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  14. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  15. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  16. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  17. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  18. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  19. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  20. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  1. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  3. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  4. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  5. Exciting White Lighting

    Broader source: Energy.gov [DOE]

    Windows that emit light and are more energy efficient? Universal Displays PHOLED technology enables windows that have transparent light-emitting diodes in them.

  6. Apartment Hunting Checklist FURNITURE AND APPLIANCES

    E-Print Network [OSTI]

    Kravets, Robin

    ), close and lock? Hallway & outdoor lighting sufficient? STATE OF REPAIR Doors & windows fit securely light fixture covers broken or missing? Covers on light switches & electrical outlets? Electrical to be replaced? Cleaned? Enough light in each room? Need lamps? DON'T FORGET TO CHECK Enough electrical outlets

  7. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  8. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  10. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  11. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01T23:59:59.000Z

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  12. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  13. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  14. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  15. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  16. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  17. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  18. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  19. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  20. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  1. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  2. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  3. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  4. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  5. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  6. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  7. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, William J. (Kansas City, MO)

    1985-06-18T23:59:59.000Z

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument. A method of measuring a radius of curvature of an unknown surface includes positioning the spherometer on a surface between the surface and a depth measuring optical instrument. As the spherometer is frontally illuminated, the distance from the depth measuring instrument to the fiducial mark and the underlying surface are alternately measured and the difference in these measurements is used as the sagittal height to calculate a radius of curvature.

  8. PFP Emergency Lighting Study

    SciTech Connect (OSTI)

    BUSCH, M.S.

    2000-02-02T23:59:59.000Z

    NFPA 101, section 5-9 mandates that, where required by building classification, all designated emergency egress routes be provided with adequate emergency lighting in the event of a normal lighting outage. Emergency lighting is to be arranged so that egress routes are illuminated to an average of 1.0 footcandle with a minimum at any point of 0.1 footcandle, as measured at floor level. These levels are permitted to drop to 60% of their original value over the required 90 minute emergency lighting duration after a power outage. The Plutonium Finishing Plant (PFP) has two designations for battery powered egress lights ''Emergency Lights'' are those battery powered lights required by NFPA 101 to provide lighting along officially designated egress routes in those buildings meeting the correct occupancy requirements. Emergency Lights are maintained on a monthly basis by procedure ZSR-12N-001. ''Backup Lights'' are battery powered lights not required by NFPA, but installed in areas where additional light may be needed. The Backup Light locations were identified by PFP Safety and Engineering based on several factors. (1) General occupancy and type of work in the area. Areas occupied briefly during a shiftly surveillance do not require backup lighting while a room occupied fairly frequently or for significant lengths of time will need one or two Backup lights to provide general illumination of the egress points. (2) Complexity of the egress routes. Office spaces with a standard hallway/room configuration will not require Backup Lights while a large room with several subdivisions or irregularly placed rooms, doors, and equipment will require Backup Lights to make egress safer. (3) Reasonable balance between the safety benefits of additional lighting and the man-hours/exposure required for periodic light maintenance. In some plant areas such as building 236-Z, the additional maintenance time and risk of contamination do not warrant having Backup Lights installed in all rooms. Sufficient light for egress is provided by existing lights located in the hallways.

  9. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  11. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  12. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  13. Results of First Outdoor Comparison Between Absolute Cavity Pyrgeometer (ACP) and Infrared Integrating Sphere (IRIS) Radiometer at PMOD (Presentation)

    SciTech Connect (OSTI)

    Reda, I.; Grobner, J.; Wacker, S.; Stoffel, T.

    2013-03-01T23:59:59.000Z

    The ACP and IRIS are developed to establish a world reference for calibrating pyrgeometers with traceability to SI units. The two radiometers are unwindowed with negligible spectral dependence, and traceable to SI units through the temperature scale (ITS-90). The first outdoor comparison between the two designs was held from January 28 to February 8, 2013 at the Physikalisch-Metorologisches Observatorium Davos (PMOD). The difference between the irradiance measured by ACP and that of IRIS was within 1 W/m2. A difference of 5 W/m2 was observed between the irradiance measured by ACP&IRIS and that of the interim World Infrared Standard Group (WISG).

  14. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  15. Sandia National Laboratories: Solid-State Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Updated: May 23, 2013 Go To Top Exceptional service in the national interest EC About Energy and Climate (EC) Energy Security Climate Security Infrastructure Security Energy...

  16. Lighting and Daylight Harvesting

    E-Print Network [OSTI]

    Bos, J.

    2011-01-01T23:59:59.000Z

    exposing us to the latest products and technologies. Daylight Harvesting A system of controlling the direction and the quantity of light both natural and artificial within a given space. This implies: Control of fenestration in terms of size..., transmission and direction. Control of reflected light within a space. Control of electric light in terms of delivery and amount Daylight harvesting systems are typically designed to maintain a minimum recommended light level. This light level...

  17. EK101 Engineering Light Project: Evaluate Residential Lighting

    E-Print Network [OSTI]

    Bifano, Thomas

    EK101 Engineering Light Project: Evaluate Residential Lighting Compare technical and economic characteristics of three sources of residential light. Two teams of four complete the same project Engineering Light Project: Evaluate Residential Lighting Project Assignment: Evaluate current options

  18. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a no securityno security nn 802.11b802.11b WEP

  19. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  20. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...