Powered by Deep Web Technologies
Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Outdoor Solar Lighting | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outdoor Solar Lighting Outdoor Solar Lighting Outdoor Solar Lighting July 29, 2012 - 6:34pm Addthis Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan What does this mean for me? Outdoor solar lights are easy to install and virtually maintenance free They work in most areas of the United States Find out if replacement bulbs or batteries are available before you buy them Outdoor solar lights are easy to install and virtually maintenance free. Best of all, using them won't increase your electric bill. Popular home

2

Outdoor Solar Lighting | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outdoor Solar Lighting Outdoor Solar Lighting Outdoor Solar Lighting July 29, 2012 - 6:34pm Addthis Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan What does this mean for me? Outdoor solar lights are easy to install and virtually maintenance free They work in most areas of the United States Find out if replacement bulbs or batteries are available before you buy them Outdoor solar lights are easy to install and virtually maintenance free. Best of all, using them won't increase your electric bill. Popular home

3

Outdoor Solar Lighting | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of iStockphoto.comndejan Outdoor solar lights use solar cells,...

4

Federal Energy Management Program: Outdoor Solid State Lighting...  

NLE Websites -- All DOE Office Websites (Extended Search)

& Power Resources Renewable Energy Outdoor Solid State Lighting Case Studies Picture of LED lighting in a covered parking structure. LED lighting replaced aging systems in this...

5

Energy-saver's guide to good outdoor lighting  

SciTech Connect

Recent advances in outdoor lighting design and technology offer opportunities for improving the quality of outdoor lighting and significantly reducing energy consumption. This guidebook provides information on these developments and offers ideas on designing new systems or modifying existing systems.

1984-01-01T23:59:59.000Z

6

Outdoor Solid-State Lighting Technology Deployment | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technologies » Technology Deployment » Outdoor Solid-State Technologies » Technology Deployment » Outdoor Solid-State Lighting Technology Deployment Outdoor Solid-State Lighting Technology Deployment October 7, 2013 - 9:10am Addthis Outdoor solid-state lighting (SSL) technology has the potential to reduce U.S. lighting energy usage by nearly one half and contribute significantly to our nation's climate change solutions. The U.S. Department of Energy's (DOE) Buildings Technologies Office offers a wealth of information on its Solid-State Lighting website. Visit the site to find: SSL Basics Studies and Reports CALiPER Summary Reports Tools SSL Webcasts. Also see: FEMP Outdoor SSL Initiative: Resources for Outdoor SSL Applications outlines resources available for outdoor solid-state lighting projects. Better Buildings Alliance: This DOE initiative is driven and managed

7

Summer Loving-Energy-Efficient Outdoor Lighting! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summer Loving-Energy-Efficient Outdoor Lighting! Summer Loving-Energy-Efficient Outdoor Lighting! Summer Loving-Energy-Efficient Outdoor Lighting! June 20, 2013 - 9:47am Addthis Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan Outdoor solar lights use solar cells, which convert sunlight into electricity, and are easy to install and virtually maintenance free. | Photo courtesy of ©iStockphoto.com/ndejan Erin Connealy Communications Specialist, Office of Energy Efficiency and Renewable Energy How can I participate? Check to see if energy-efficient or solar lighting can fit your outdoor lighting needs this summer. One of the best things about summer to me is all the time I get to spend

8

Federal Energy Management Program: Outdoor Solid State Lighting...  

NLE Websites -- All DOE Office Websites (Extended Search)

& Structures Case Studies Resources Working Group Distributed Energy ResourcesCombined Heat & Power Resources Renewable Energy Outdoor Solid State Lighting Resources Picture of...

9

Federal Energy Management Program: Outdoor Solid-State Lighting...  

NLE Websites -- All DOE Office Websites (Extended Search)

Outdoor solid-state lighting (SSL) technology has the potential to reduce U.S. lighting energy usage by nearly one half and contribute significantly to our nation's climate...

10

FEMP Outdoor Solid State Lighting Intiative: Resources for Outdoor...  

NLE Websites -- All DOE Office Websites (Extended Search)

Fact Sheet - The Consortium shares technical information and experi- ences related to LED street and area light- ing demonstrations. The Consortium also serves as an objective...

11

Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area  

NLE Websites -- All DOE Office Websites (Extended Search)

Hitting the Target: ENERGY Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast to someone by E-mail Share Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on Facebook Tweet about Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on Twitter Bookmark Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on Google Bookmark Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on Delicious Rank Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on Digg Find More places to share Solid-State Lighting: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting Webcast on AddThis.com...

12

Outdoor Light-Emitting Diode (LED) Digital Signage  

Science Conference Proceedings (OSTI)

Utilities have been supporting outdoor advertising companies and their traditional simple billboards for many years. The level of support these billboards needed was minimal because electricity for them was only used to power basic lighting technologies. The growth in the billboard industry combined with the explosion in available electronic and digital systems and the advancements made in light-emitting diodes (LEDs) has resulted in a new type of billboard8212the LED electronic billboard. Electronic bil...

2009-12-17T23:59:59.000Z

13

IntenCity - 2 Solid State Outdoor Luminaire SL-3200 High Output LED Street Light  

Science Conference Proceedings (OSTI)

The product under assessment is an advanced lighting technology8212a solid state outdoor luminarie light emitting diode (LED) street lighting system designed to provide various levels of direct white light.

2008-06-12T23:59:59.000Z

14

FEMP Outdoor Solid State Lighting Intiative: Resources for Outdoor SSL Applications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Municipal Solid-State Street Lighting Municipal Solid-State Street Lighting Consortium Fact Sheet - The Consortium shares technical information and experi- ences related to LED street and area light- ing demonstrations. The Consortium also serves as an objective resource for evalu- ating new products on the market intended for street and area lighting applications. http://apps1.eere.energy.gov/buildings/ publications/pdfs/ssl/consortium_fs.pdf DOE SSL GATEWAY Demonstration Project Results - DOE GATEWAY dem- onstrations showcase high-performance LED products for general illumination in a variety of commercial and residential applications. Demonstration results pro- vide real-world experience and data on state-of-the-art SSL product performance and cost effectiveness. DOE CALiPER Test Results - The DOE

15

Federal Energy Management Program: Outdoor Solid State Lighting...  

NLE Websites -- All DOE Office Websites (Extended Search)

a video on solid state lighting market transformation presented at the July 2011 DOE SSL Market Introduction Workshop. FEMP encourages Federal agencies to accelerate evaluation...

16

Lighting the Great Outdoors: LEDs in Exterior Applications  

SciTech Connect

Recent progress in the development of white light LEDs promises great impact by opening up the huge potential for LED illumination in new areas. One such area is general illumination for exterior applications. For example, there are an estimated combined 60.5 million roadway and parking installations in the U.S. These lights account for an estimated 53.3 TWh of electricity usage annually -- nearly 7% of all lighting. If LEDs could provide the same light performance with just 25% greater efficiency, savings of over 13 TWh could be achieved. In 2007, the authors assessed emerging LED lighting technologies in a parking garage and on a city street. The purpose of these tests was to enable a utility to determine whether energy efficiency programs promoting white light LED products might be justified. The results have supported the great promise of LEDs in exterior applications, while also highlighting the barriers that continue to hinder their widespread adoption. Such barriers include 1) inconsistent product quality across manufacturers; 2) lack of key metrics for comparing LEDs to conventional sources; and 3) high upfront cost of LED luminaires compared to conventional luminaires. This paper examines these barriers, ways in which energy-efficiency programs could help to overcome them, and the potential for energy and financial savings from LED lighting in these two exterior applications.

Cook, Tyson D. S.; Bryan, Mary M.; Kinzey, Bruce R.; Myer, Michael

2008-08-17T23:59:59.000Z

17

Red light, green light | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Red light, green light Red light, green light Red light, green light Posted: December 4, 2013 - 6:28pm After the National Nuclear Security Administration signaled Y-12 to begin resuming full operations after a potential furlough, Production Vice President Bill Tindal said Production had two objectives: refocus production employees on safety, security and quality, and ensure preparedness for normal operations. "It's tempting to jump right back in when you get the green light," Tindal said. "We were in an abnormal state that really shook people. Focusing on people came first." Production began with return-to-work briefings. "During the briefings, we asked employees what they were concerned about, what was causing them stress," Tindal said. "Another concept from the briefing was the theme

18

Dimming Controllers Offer Potential Energy Savings in Outdoor...  

NLE Websites -- All DOE Office Websites (Extended Search)

Sheet: * Introduction * HID Dimming * Conclusions Dimming Controllers Offer Potential Energy Savings in Outdoor Lighting Lighting control technology reduces energy consumption...

19

Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA  

SciTech Connect

Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

Rubinstein, Francis M.

1999-10-25T23:59:59.000Z

20

Survey of utility lighting programs: Final report  

SciTech Connect

Reshaping loads is a major goal of utility lighting efforts. Nearly 60% of the utilities in this survey use lighting for demand-side management. The most popular programs promote lighting efficiency to reduce daytime peaks and outdoor security lighting to increase off-peak loads.

Isaksen, L.

1987-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Outdoor Manners  

NLE Websites -- All DOE Office Websites (Extended Search)

Outdoor Manners Outdoor Manners Nature Bulletin No. 683-A June 10, 1978 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation OUTDOOR MANNERS I AM AN OLD TIME COUNTRY LANE -- just a plain dirt road with a lot of ups and downs, built by the pioneers who settled this region. I was abandoned, thank goodness, after those tin Lizzies began to honk and rattle through the country. They didn't like me and I didn't like them. For more than a century, people went this way on foot, on horseback, and in vehicles drawn by horses or mules. I became well acquainted with many of them and some of their great-grandchildren. They became acquainted with my trees, my wildflowers, the birds and all of my wild creatures. In those days most folks were friendly, neighborly people. They had time to stop, visit, look and listen.

22

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

23

Federal Energy Management Program: Outdoor Solid State Street...  

NLE Websites -- All DOE Office Websites (Extended Search)

& Structures Case Studies Resources Working Group Distributed Energy ResourcesCombined Heat & Power Resources Renewable Energy Outdoor Solid State Street and Roadway Lighting...

24

Lighting Group: Light Distribution Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Retrofit Alternatives to Incandescent Downlights Hotel and Institutional Bathroom Lighting Portable Office Lighting Systems Low Glare Outdoor Retrofit Luminaire LED Luminaires...

25

Science and the Energy Security Challenge: The Example of Solid-State Lighting  

DOE Green Energy (OSTI)

Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences, fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products - a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

Phillips, Julia (Sandia)

2008-08-06T23:59:59.000Z

26

Outdoor science field trips.  

E-Print Network (OSTI)

??The purpose of this study was to assess the cognitive and affective values of an outdoor science field trip. Participants were 28 fifth grade students, (more)

Loyd, Kerrie Anne Therese

2004-01-01T23:59:59.000Z

27

Conservation and Outdoor Education  

NLE Websites -- All DOE Office Websites (Extended Search)

District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation CONSERVATION AND OUTDOOR EDUCATION IN THE FOREST PRESERVE DISTRIC. The Forest...

28

NREL: Photovoltaics Research - Outdoor Test Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Outdoor Test Facility Aerial photo of the Outdoor Test Facility. The Outdoor Test Facility at NREL is used to evaluate prototype, precommercial, and commercial modules. Outdoor...

29

Outdoor PV Degradation Comparison  

DOE Green Energy (OSTI)

As photovoltaic (PV) penetration of the power grid increases, it becomes vital to know how decreased power output; may affect cost over time. In order to predict power delivery, the decline or degradation rates must be determined; accurately. At the Performance and Energy Rating Testbed (PERT) at the Outdoor Test Facility (OTF) at the; National Renewable Energy Laboratory (NREL) more than 40 modules from more than 10 different manufacturers; were compared for their long-term outdoor stability. Because it can accommodate a large variety of modules in a; limited footprint the PERT system is ideally suited to compare modules side-by-side under the same conditions.

Jordan, D. C.; Smith, R. M.; Osterwald, C. R.; Gelak, E.; Kurtz, S. R.

2011-02-01T23:59:59.000Z

30

Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA  

E-Print Network (OSTI)

Lighting Research Group FinalReport October 1999 Lighting Recommendations for the Socialin Richmond CA Final Report Lighting Recommendations for the

Rubinstein, Francis M.

1999-01-01T23:59:59.000Z

31

Outdoor Play and Playground Use  

Science Conference Proceedings (OSTI)

... While each classroom strives to accomplish both morning and afternoon outdoor play times, the weather sometimes prohibits such activity, or ...

2010-10-05T23:59:59.000Z

32

Outdoor Education in the Greek Mathematics Textbooks.  

E-Print Network (OSTI)

?? Outdoor education is a promising educational field that can support indoor education and provide benefits beyond the evidentknowledge. Outdoor and indoor education together can (more)

Skouroupathis, Nicolas

2013-01-01T23:59:59.000Z

33

Types of Lighting | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

selection. Types of lighting include: Fluorescent Incandescent Outdoor solar Light-emitting diode (LED) Also learn how energy-efficient lightbulbs compare to traditional...

34

Low-Pressure Sodium Lighting Basics | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Low-Pressure Sodium Lighting Basics Low-Pressure Sodium Lighting Basics Low-Pressure Sodium Lighting Basics August 16, 2013 - 10:17am Addthis Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and security lighting, where color is not important. Low-pressure sodium lamps work somewhat like fluorescent lamps. Like high-intensity discharge lighting, low-pressure sodium lamps require up to 10 minutes to start and have to cool before they can restart. Therefore, they are most suitable for applications in which they stay on for hours at a time. They are not suitable for use with motion detectors. The chart below compares low-pressure sodium lamps and high-intensity

35

Lighting Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Design Design Lighting Design July 29, 2012 - 6:28pm Addthis Energy-efficient indoor and outdoor lighting design focuses on ways to improve both the quality and efficiency of lighting. | Photo courtesy of ©iStockphoto.com/chandlerphoto. Energy-efficient indoor and outdoor lighting design focuses on ways to improve both the quality and efficiency of lighting. | Photo courtesy of ©iStockphoto.com/chandlerphoto. How does it work? Buy ENERGY STAR-rated lighting for the highest quality, energy-efficient lighting. Use timers and other controls to turn lights on and off. Use outdoor solar lighting. Energy-efficient indoor and outdoor lighting design focuses on ways to improve both the quality and efficiency of lighting. If you're constructing a new house, consider lighting as part of your whole-house design -- an

36

Low-Pressure Sodium Lighting  

Energy.gov (U.S. Department of Energy (DOE))

Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and...

37

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

38

SUBCHAPTER D. OUTDOOR BURNING Sec. 352.081. REGULATION OF OUTDOOR BURNING. (a) In this  

E-Print Network (OSTI)

SUBCHAPTER D. OUTDOOR BURNING Sec. 352.081. REGULATION OF OUTDOOR BURNING. (a) In this section measurement that takes into consideration the burning index, spread component, or ignition component court of a county by order may prohibit or restrict outdoor burning in general or outdoor burning

39

Color models for outdoor machine vision  

Science Conference Proceedings (OSTI)

This study develops models for illumination and surface reflectance for use in outdoor color vision, and in particular for predicting the color of surfaces under outdoor conditions. Existing daylight and reflectance models have limitations that reduce ... Keywords: color, daylight, outdoor images, photometric function, reflectance model

Shashi D. Buluswar; Bruce A. Draper

2002-02-01T23:59:59.000Z

40

Lighting.  

SciTech Connect

Since lighting accounts for about one-third of the energy used in commercial buildings, there is opportunity to conserve. There are two ways to reduce lighting energy use: modify lighting systems so that they used less electricity and/or reduce the number of hours the lights are used. This booklet presents a number of ways to do both. Topics covered include: reassessing lighting levels, reducing lighting levels, increasing bulb & fixture efficiency, using controls to regulate lighting, and taking advantage of daylight.

United States. Bonneville Power Administration.

1992-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Energy Basics: Low-Pressure Sodium Lighting  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Low-Pressure Sodium Lighting Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color...

42

Contaminated Outdoor High Voltage Insulators  

Science Conference Proceedings (OSTI)

The external insulation of power lines and outdoor substations is a weak point in transmission systems. The insulation is particularly susceptible to failure if proper attention has not been given to its design, condition monitoring, and maintenance. In regions with high contamination levels, regular maintenance and the application of palliative measures can be critical to ensure that the system meets its outage performance targets. This can involve pure maintenance measures such as cleaning the insulato...

2009-12-22T23:59:59.000Z

43

Lighting  

Energy.gov (U.S. Department of Energy (DOE))

There are many different types of artificial lights, all of which have different applications and uses.Types of lighting include:

44

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

45

Reducing indoor residential exposures to outdoor pollutants  

SciTech Connect

The basic strategy for providing indoor air quality in residences is to dilute indoor sources with outdoor air. This strategy assumes that the outdoor air does not have pollutants at harmful levels or that the outdoor air is, at least, less polluted than the indoor air. When this is not the case, different strategies need to be employed to ensure adequate air quality in the indoor environment. These strategies include ventilation systems, filtration and other measures. These strategies can be used for several types of outdoor pollution, including smog, particulates and toxic air pollutants. This report reviews the impacts that typical outdoor air pollutants can have on the indoor environment and provides design and operational guidance for mitigating them. Poor quality air cannot be used for diluting indoor contaminants, but more generally it can become an indoor contaminant itself. This paper discusses strategies that use the building as protection against potentially hazardous outdoor pollutants, including widespread pollutants, accidental events, and potential attacks.

Sherman, Max H.; Matson, Nance E.

2003-07-01T23:59:59.000Z

46

Lighting Basics | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lighting Basics Lighting Basics Lighting Basics August 15, 2013 - 5:12pm Addthis Text Version There are many different types of artificial lights, all of which have different applications and uses. Types of lighting include: Fluorescent Lighting High-intensity Discharge Lighting Incandescent Lighting LED Lighting Low-pressure Sodium Lighting. Which type is best depends on the application. See the chart below for a comparison of lighting types. Lighting Comparison Chart Lighting Type Efficacy (lumens/watt) Lifetime (hours) Color Rendition Index (CRI) Color Temperature (K) Indoors/Outdoors Fluorescent Straight Tube 30-110 7000-24,000 50-90 (fair to good) 2700-6500 (warm to cold) Indoors/outdoors Compact Fluorescent 50-70 10,000 65-88 (good) 2700-6500 (warm to cold) Indoors/outdoors

47

Reducing Indoor Residential Exposures to Outdoor Pollutants  

NLE Websites -- All DOE Office Websites (Extended Search)

Reducing Indoor Residential Exposures to Outdoor Pollutants Reducing Indoor Residential Exposures to Outdoor Pollutants Title Reducing Indoor Residential Exposures to Outdoor Pollutants Publication Type Journal Article LBNL Report Number LBNL-51758 Year of Publication 2003 Authors Sherman, Max H., and Nance Matson Start Page Chapter Abstract Basic strategy for providing indoor air quality in residences is to dilute indoor sources with outdoor air. This strategy assumes that the outdoor air does not have pollutants at harmful levels or that the outdoor air is, at least, less polluted than the indoor air. When this is not the case, different strategies need to be employed to ensure adequate air quality in the indoor environment. These strategies include ventilation systems, filtration and other measures. These strategies can be used for several types of outdoor pollution, including smog, particulates and toxic air pollutants. This report reviews the impacts that typical outdoor air pollutants can have on the indoor environment and provides design and operational guidance for mitigating them. Poor quality air cannot be used for diluting indoor contaminants, but more generally it can become an indoor contaminant itself. This paper discusses strategies that use the building as protection against potentially hazardous outdoor pollutants, including widespread pollutants, accidental events, and potential attacks

48

Measuring Outdoor Airflow into HVAC Systems  

E-Print Network (OSTI)

MEASURING OUTDOOR AIRFLOW INTO HVAC SYSTEMS W i l l i a m J.minimum OA flow rate if HVAC system has an economizer

Fisk, William J.; Faulkner, David; Sullivan, Douglas P.

2005-01-01T23:59:59.000Z

49

Indoor to Outdoor Channel Measurements & Models  

Science Conference Proceedings (OSTI)

... delay dispersion statistics for outdoor-indoor average PDPs (all values in ns). Band RMS Delay Spread Delay Window 90% Energy Delay Interval ...

2012-10-31T23:59:59.000Z

50

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

51

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

52

Outdoor Recreation Participation Trends in Texas  

E-Print Network (OSTI)

Outdoor recreation is a popular pastime in Texas. This publication reports on the participation and trends in outdoor recreation in the U.S. and Texas revealed in the National Survey on Recreation and the Environment conducted by the U.S. Forest Service.

Schuett, Michael A.; Shafer, Carl Scott; Lu, Jiaying

2009-01-06T23:59:59.000Z

53

Thurmont Municipal Light Co | Open Energy Information  

Open Energy Info (EERE)

Thurmont Municipal Light Co Thurmont Municipal Light Co Jump to: navigation, search Name Thurmont Municipal Light Co Place Maryland Utility Id 18901 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png LARGE GENERAL SERVICE Primary Voltage Industrial LARGE GENERAL SERVICE Secondary Voltage Industrial MEDIUM GENERAL SERVICE Industrial OUTDOOR LIGHTING SERVICE(11,000) Lighting OUTDOOR LIGHTING SERVICE(20,000) Lighting OUTDOOR LIGHTING SERVICE(400w) Lighting OUTDOOR LIGHTING SERVICE(7,000) Lighting RESIDENTIAL SERVICE Residential

54

Lighting  

SciTech Connect

The lighting section of ASHRAE standard 90.1 is discussed. It applies to all new buildings except low-rise residential, while excluding specialty lighting applications such as signage, art exhibits, theatrical productions, medical and dental tasks, and others. In addition, lighting for indoor plant growth is excluded if designed to operate only between 10 p.m. and 6 a.m. Lighting allowances for the interior of a building are determined by the use of the system performance path unless the space functions are not fully known, such as during the initial stages of design or for speculative buildings. In such cases, the prescriptive path is available. Lighting allowances for the exterior of all buildings are determined by a table of unit power allowances. A new addition the exterior lighting procedure is the inclusion of facade lighting. However, it is no longer possible to trade-off power allotted for the exterior with the interior of a building or vice versa. A significant change is the new emphasis on lighting controls.

McKay, H.N. (Hayden McKay Lighting Design, New York, NY (US))

1990-02-01T23:59:59.000Z

55

Measuring rates of outdoor airflow into HVAC systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Measuring rates of outdoor airflow into HVAC systems Title Measuring rates of outdoor airflow into HVAC systems Publication Type Journal Article LBNL Report Number LBNL-51583 Year...

56

The Transformation of Outdoor Ammonium Nitrate Aerosols in the...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Transformation of Outdoor Ammonium Nitrate Aerosols in the Indoor Environment Title The Transformation of Outdoor Ammonium Nitrate Aerosols in the Indoor Environment...

57

Microsoft Word - Outdoor Small- and Pilot-Scale Research and Development 3768X_final  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outdoor, Small- and Pilot-Scale Research and Development (3768X) Outdoor, Small- and Pilot-Scale Research and Development (3768X) Program or Field Office: Office of Science - ORNL Location(s) (City/County/State): Oak Ridge, Tennessee Proposed Action Description: The U.S. Department of Energy Oak Ridge National Laboratory (ORNL) Site Office (DOE-OSO) proposes to conduct outdoor, small- and pilot-scale research and development activities and associated transfer, lease, disposition or acquisition of interests in personal or real property involving advanced materials, biological and ecological systems, energy science, and national security including but not limited to collecting samples and analyzing ecosystem and atmospheric field data; developing, evaluating and testing equipment, materials and components; and

58

Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY  

NLE Websites -- All DOE Office Websites (Extended Search)

Text-Alternative Version: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting to someone by E-mail Share Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting on Facebook Tweet about Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting on Twitter Bookmark Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting on Google Bookmark Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting on Delicious Rank Solid-State Lighting: Text-Alternative Version: Hitting the Target: ENERGY STAR® SSL Outdoor Area Lighting on Digg Find More places to share Solid-State Lighting: Text-Alternative

59

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

60

Intelligent street lighting application for electric power distribution systems the business case for smartgrid technology.  

E-Print Network (OSTI)

??This research project builds upon previous work related to intelligent and energy efficient lighting in modern street and outdoor lighting systems. The concept of implementing (more)

Davis, Wesley O'Brian Sr.

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

62

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

63

Solid-State Lighting: 2011 Municipal Consortium Southwest Region...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Market Assessment of Networked Outdoor Lighting Controls Mark Rehley, NEEA; Jordan Shackelford, Energy Solutions MSSLC Specification for Remote Monitoring and...

64

Market-Based Programs: Solid-State Lighting GATEWAY Demonstrations  

NLE Websites -- All DOE Office Websites (Extended Search)

Photo of a post-top outdoor light along a walkway through a wooded park. Museums Put LED Lighting on Display Museums rank among the most exacting of all lighting applications....

65

Practical Quantum Cryptography for Secure Free-Space Communications  

Science Conference Proceedings (OSTI)

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

1999-02-01T23:59:59.000Z

66

Hagerstown Light Department | Open Energy Information  

Open Energy Info (EERE)

Hagerstown Light Department Hagerstown Light Department Jump to: navigation, search Name Hagerstown Light Department Place Maryland Utility Id 7908 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes RTO PJM Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png GENERAL AND COMMERCIAL SERVICE Commercial LIGHT AND POWER SERVICE (HIGH LOAD FACTOR) Industrial LIGHT AND POWER SERVICE (Low Load Factor) Commercial OUTDOOR LIGHTING SERVICE (200 Watts)Fluorescent luminaire Lighting OUTDOOR LIGHTING SERVICE(100 Watts)Fluorescent luminaire Lighting OUTDOOR LIGHTING SERVICE(175 Watts MV)) Lighting

67

Outdoor Visual Position Estimation for Planetary Rovers  

Science Conference Proceedings (OSTI)

This paper describes (1) a novel, effective algorithm for outdoor visual position estimation; (2) the implementation of this algorithm in the Viper system; and (3) the extensive tests that have demonstrated the superior accuracy and speed of ... Keywords: computer vision, mobile robots, position estimation, space robotics

Fabio Cozman; Eric Krotkov; Carlos Guestrin

2000-09-01T23:59:59.000Z

68

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

69

Abstraction and depiction of sparsely scanned outdoor environments  

Science Conference Proceedings (OSTI)

This paper describes various techniques and applications of rendering three-dimensionally digitized outdoor en- vironments in non-photorealistic rendering styles. The difficulty in rendering outdoor environments is accommodating their inaccuracy, incompleteness, ...

Hui Xu; Nathan Gossett; Baoquan Chen

2005-05-01T23:59:59.000Z

70

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

71

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

72

Supporting outdoor mixed reality applications for architecture and cultural heritage  

Science Conference Proceedings (OSTI)

This paper introduces new approaches to enable collaborative outdoor mixed reality design review in the architectural domain as well as outdoor mixed reality experiences in the cultural heritage domain. For this purpose we present the results of three ... Keywords: cultural heritage, design review, display technologies, human computer interaction, outdoor mixed reality, pose estimation, rendering

Pedro Santos; Dominik Acri; Thomas Gierlinger; Hendrik Schmedt; Andr Stork

2010-04-01T23:59:59.000Z

73

Floodplain Assessment for the Proposed Outdoor Fire Range Upgrades at TA-72 in Lower Sandia Canyon, Los Alamos National Laboratory  

Science Conference Proceedings (OSTI)

Los Alamos National Laboratory (LANL) is preparing to implement actions in Sandia Canyon at Technical Area (TA) 72. Los Alamos National Security (LANS) biologists conducted a floodplain determination and this project is partially located within a 100-year floodplain. The proposed project is to upgrade the existing outdoor shooting range facilities at TA-72. These upgrades will result in increased safety and efficiencies in the training for Protective Force personnel. In order to remain current on training requirements, the firing ranges at TA-72 will be upgraded which will result in increased safety and efficiencies in the training for Protective Force personnel (Figure 1). These upgrades will allow for an increase in class size and more people to be qualified at the ranges. Some of these upgrades will be built within the 100-year floodplain. The upgrades include: concrete pads for turning target systems and shooting positions, new lighting to illuminate the firing range for night fire, a new speaker system for range operations, canopies at two locations, an impact berm at the far end of the 300-yard mark, and a block wall for road protection.

Hathcock, Charles D. [Los Alamos National Laboratory

2012-08-27T23:59:59.000Z

74

Determining Outdoor CPV Cell Temperature (Presentation)  

DOE Green Energy (OSTI)

An accurate method is needed for determining cell temperature when measuring CPV modules outdoors. It has been suggested that cell temperature can be calculated though a procedure that shutters sunlight to the cells while measuring the transients in open-circuit voltage (Voc) and heat sink temperature. This presentation documents application of this shutter procedure to multiple CPV modules at NREL. The challenges and limitations are presented along with an alternate approach to measuring CPV cell operating temperature.

Muller, M.

2011-04-01T23:59:59.000Z

75

Determining Outdoor CPV Cell Temperature: Preprint  

DOE Green Energy (OSTI)

An accurate method is needed for determining cell temperature when measuring CPV modules outdoors. It has been suggested that cell temperature can be calculated though a procedure that shutters sunlight to the cells while measuring the transients in open-circuit voltage (Voc) and heat sink temperature. This paper documents application of this shutter procedure to multiple CPV modules at NREL. The challenges and limitations are presented along with an alternate approach to measuring CPV cell operating temperature.

Muller, M.; Deline, C.; Marion, B.; Kurtz, S.; Bosco, N.

2011-07-01T23:59:59.000Z

76

Evaluation of Cooling Solutions for Outdoor Electronics  

E-Print Network (OSTI)

The thermal management of an outdoor electronic enclosure can be quite challenging due to the additional thermal load from the sun and the requirement of having an air-sealed enclosure. It is essential to consider the effect of solar heating loads in the design process; otherwise, it can shorten the life expectancy of the electronic product or lead to catastrophic failure. In this paper we analyze and compare the effectiveness of different cooling techniques used for outdoor electronics. Various cooling techniques were compared like special coatings and paints on the outer surface, radiation shields, double-walled vented enclosures, fans for internal air circulation and air-to-air heat exchangers. A highly simplified, typical outdoor system was selected for this study measuring approximately 300x300x400 mm (WxLxH). Solar radiation was incident on 3 sides of the enclosure. There were 8 equally spaced PCBs inside the enclosure dissipating 12.5W each uniformly (100 watts total). A computational fluid dynamics (CFD) model of the system was built and analyzed. This was followed by building a mock-up of the system and conducting experiments to validate the CFD model. It was found that some of the simplest cooling techniques like white oil paint on the outer surface can significantly reduce the impact of solar loads. Adding internal circulation fans can also be very effective. Using air-to-air heat exchangers was found to be the most effective solution although it is more complex and costly.

Mahendra Wankhede; V. Khaire; A. Goswami; S. D. Mahajan

2008-01-07T23:59:59.000Z

77

Evaluation of Cooling Solutions for Outdoor Electronics  

E-Print Network (OSTI)

The thermal management of an outdoor electronic enclosure can be quite challenging due to the additional thermal load from the sun and the requirement of having an air-sealed enclosure. It is essential to consider the effect of solar heating loads in the design process; otherwise, it can shorten the life expectancy of the electronic product or lead to catastrophic failure. In this paper we analyze and compare the effectiveness of different cooling techniques used for outdoor electronics. Various cooling techniques were compared like special coatings and paints on the outer surface, radiation shields, double-walled vented enclosures, fans for internal air circulation and air-to-air heat exchangers. A highly simplified, typical outdoor system was selected for this study measuring approximately 300x300x400 mm (WxLxH). Solar radiation was incident on 3 sides of the enclosure. There were 8 equally spaced PCBs inside the enclosure dissipating 12.5W each uniformly (100 watts total). A computational fluid dynamics (C...

Wankhede, Mahendra; Goswami, A; Mahajan, S D

2008-01-01T23:59:59.000Z

78

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

79

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

80

Full Spectrum Light Therapy Full spectrum light bulbs are said to not only improve mood, but also  

E-Print Network (OSTI)

Full Spectrum Light Therapy Full spectrum light bulbs are said to not only improve mood, but also spectrum light bulbs produce light that is seen by the human eye in a bluish-white tint. Where is full energy, learning ability, and behavior. Light therapy mimics outdoor light and causes a biochemical

Bates, Rebecca A.

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

82

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

83

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

84

Comparing Light-Emitting Diode (LED) Street and Area Lighting to Traditional Lighting Technologies  

Science Conference Proceedings (OSTI)

In 2008, the Tennessee Valley Authority (TVA) and Benton County Electric System partnered with the Electric Power Research Institute (EPRI) to launch an investigation into the use of LED technology for area lighting. The goal of the projectcalled the LED Street and Area Lighting Demonstrationwas to discover a better light bulb, one that not only meets the outdoor lighting requirements of consumers, but also uses less electricity in doing so. This case study discusses the results of ...

2012-09-28T23:59:59.000Z

85

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li Jianxia Ning Zhengyuan Xu . Srikanth V. Krishnamurthy Gang Chen. Springer...

86

Minimizing Variation in Outdoor CPV Power Ratings: Preprint  

DOE Green Energy (OSTI)

The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

Muller, M.; Marion, B.; Rodriguez, J.; Kurtz, S.

2011-07-01T23:59:59.000Z

87

Federal Energy Management Program: Outdoor Solid State Parking...  

NLE Websites -- All DOE Office Websites (Extended Search)

& Structures Case Studies Resources Working Group Distributed Energy ResourcesCombined Heat & Power Resources Renewable Energy Outdoor Solid State Parking Lot and Structure...

88

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

89

Electric energy savings and light guides  

Science Conference Proceedings (OSTI)

Light guides are systems which serve for illumination of internal windowless parts of buildings. Their function is based on the principle of light transport from outdoor to distant indoor places due to multi-reflections on their highly reflective internal ... Keywords: daylight, energy savings, illuminance, light guides, solar energy, solar radiation

Jitka Mohelnikova

2008-02-01T23:59:59.000Z

90

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

91

Conservation and Outdoor Education in the Schools  

NLE Websites -- All DOE Office Websites (Extended Search)

Education in the Schools Education in the Schools Nature Bulletin No. 374-A March 21, 1970 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation CONSERVATION AND OUTDOOR EDUCATION IN THE SCHOOLS Given a favorable climate, two things make and keep a nation great: its people and its natural resources. The well-being of our nation depends upon the wise use of those resources. They provide our basic requirements -- food, clothing and shelter. There is ample evidence that a very large portion of all teachers recognize the need for conservation and the importance of environmental education. Leading educators say that teachers realize the why of conservation but need help with the what, when, where and how -- how to teach the topic so that it hooks onto the personal lives of their students and is translated into behavior -- how to bring conservation home to all pupils in terms of day-to-day living.

92

Outdoor Outfitter Gets Greener With Solar Water Heater | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outdoor Outfitter Gets Greener With Solar Water Heater Outdoor Outfitter Gets Greener With Solar Water Heater Outdoor Outfitter Gets Greener With Solar Water Heater October 8, 2010 - 12:51pm Addthis L.L. Bean’s flagship store sees nearly 3 million visitors each year. The store now uses solar-heated water for showers, restrooms and two cafes. | Photo courtesy of L.L. Bean | L.L. Bean's flagship store sees nearly 3 million visitors each year. The store now uses solar-heated water for showers, restrooms and two cafes. | Photo courtesy of L.L. Bean | Lindsay Gsell L.L. Bean is known for its outdoor apparel- jackets, backpacks and cozy winter sweaters. However, the company does more than just dress for the outdoors, it also works to protect and preserve it. For nearly 100 years, L.L. Bean has been committed to environmental conservation and

93

Transient Response of Cadmium Telluride Modules to Light Exposure: Preprint  

DOE Green Energy (OSTI)

Commercial cadmium telluride (CdTe) photovoltaic (PV) modules from three different manufacturers were monitored for performance changes during indoor and outdoor light-exposure. Short-term transients in Voc were recorded on some modules, with characteristic times of ~1.1 hours. Outdoor performance data shows a similar drop in Voc after early morning light exposure. Preliminary analysis of FF changes show light-induced changes on multiple time scales, including a long time scale.

Deline, C.; del Cueto, J.; Albin, D. S.; Petersen, C.; Tyler, L.; TamizhMani, G.

2011-07-01T23:59:59.000Z

94

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

95

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

96

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

97

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

98

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

99

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

100

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Predictive clothing insulation model based on outdoor air and indoor operative temperatures  

E-Print Network (OSTI)

2012) Predictive clothing insulation model based on outdoorPredictive clothing insulation model based on outdoor airpredictive models of clothing insulation have been developed

Schiavon, Stefano; Lee, Kwang Ho

2012-01-01T23:59:59.000Z

102

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

103

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

104

Comparing Light Emitting Diode (LED) Street and Area Lighting to Traditional Lighting Technologies  

Science Conference Proceedings (OSTI)

High-power light-emitting diode (LED) technology holds great promise for outdoor illumination. This case study discusses the results of the LED Street and Area Lighting Demonstration performed by Tennessee Valley Authority (TVA), Knoxville Utilities Board (KUB), and EPRI. Data was collected on Wall Avenue, a busy thoroughfare in downtown Knoxville, using a specially developed computer-controlled mobile light measurement vehicle with a global positioning system.Early reports from the ...

2012-09-28T23:59:59.000Z

105

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

106

Solar lighting | Open Energy Information  

Open Energy Info (EERE)

lighting lighting Jump to: navigation, search Introductory Facts About Solar Lights It is not just a normal light bulb.The solar light consists of a LED or Light Emitting Diode, which draw little power. Coupled with constantly recharging batteries, you will never run out of light! They will save the customer money. By Replacing all outdoor lighting with solar lights there is no need to plug in to the electrical system. The lights will automatically turn on at dusk and will be charged during the day. They help out the environment.Not only does not plugging in to the power system save money but also energy, therefore protecting the Earth. Easy to Install No wires necessary, just pop in the battery. They come in all designs Just because they are solar lights doesn't

107

Minimizing Variation in Outdoor CPV Power Ratings (Presentation)  

SciTech Connect

Presented at the 7th International Conference on Concentrating Photovoltaic Systems (CPV-7), 4-6 April 2011, Las Vegas, Nevada. The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

Muller, M.

2011-04-01T23:59:59.000Z

108

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

109

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

110

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

111

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

112

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

113

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

114

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

115

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

116

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

117

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

118

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

119

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

120

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

122

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

123

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

124

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

125

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

126

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

127

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

128

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

129

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

130

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

131

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

132

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

133

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

134

Information Resources: Pedestrian-Friendly Nighttime Lighting  

NLE Websites -- All DOE Office Websites (Extended Search)

Pedestrian-Friendly Nighttime Lighting Pedestrian-Friendly Nighttime Lighting This November 19, 2013 webinar presented issues and considerations related to pedestrian-friendly nighttime lighting, such as color rendering, safety, and adaptation. When it comes to outdoor lighting, the industry has understandably focused on footcandles and uniformity, efficacy, pole spacing, and cutoff-but those are not the chief criteria for all neighborhoods. Presenter Naomi Miller of Pacific Northwest National Laboratory discussed the types of communities and spaces that should consider pedestrian-friendly outdoor lighting, what pedestrian-friendly lighting looks like, the basic principles of glare control, color and visibility, and metrics. View the presentation slides View the text-alternative version

135

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

136

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

137

Assessing Sheltering-In-Place Responses to Outdoor Toxic Releases  

NLE Websites -- All DOE Office Websites (Extended Search)

Assessing Sheltering-In-Place Responses to Outdoor Toxic Releases Assessing Sheltering-In-Place Responses to Outdoor Toxic Releases Title Assessing Sheltering-In-Place Responses to Outdoor Toxic Releases Publication Type Conference Proceedings Year of Publication 2005 Authors Sohn, Michael D., Richard G. Sextro, and David M. Lorenzetti Conference Name 10th International Conference on Indoor Air Quality and Climate - Indoor Air 2005 Volume 2(6) Pagination 1792-1796 Date Published Sept. 4-9, 2005 Publisher Tsinghua University Press Conference Location Beijing, China Keywords airflow and pollutant transport group, airflow modeling, comis, countermeasures to chemical and biological threats, emergency response, exposure, indoor environment department, shelter-in-place Abstract An accidental or intentional outdoor release of pollutants can produce a hazardous plume, potentially contaminating large portions of a metropolitan area as it disperses downwind. To minimize health consequences on the populace, government and research organizations often recommend sheltering in place when evacuation is impractical. Some reports also recommend "hardening" an indoor shelter, for example by applying duct tape to prevent leakage into a bathroom. However, few studies have quantified the perceived beneficial effects of sheltering and hardening, or examined the limits of their applicability. In this paper, we examine how sheltering and hardening might reduce exposure levels under different building and meteorological conditions (e.g., wind direction). We predict concentrations and exposure levels for several conditions, and discuss the net benefits from several sheltering and hardening options

138

Trio: enabling sustainable and scalable outdoor wireless sensor network deployments  

Science Conference Proceedings (OSTI)

We present the philosophy, design, and initial evaluation of the Trio Testbed, a new outdoor sensor network deployment that consists of 557 solar-powered motes, seven gateway nodes, and a root server. The testbed covers an area of approximately 50,000 ... Keywords: detection, large-scale, long-life, sensor networks, surveillance, target tracking, testbed

Prabal Dutta; Jonathan Hui; Jaein Jeong; Sukun Kim; Cory Sharp; Jay Taneja; Gilman Tolle; Kamin Whitehouse; David Culler

2006-04-01T23:59:59.000Z

139

Long Term Outdoor Testing of Low Concentration Solar Modules  

Science Conference Proceedings (OSTI)

A 1?axis carousel tracker equipped with four 3?sun low?concentration mirror modules has now been under test outdoors at the University of Nevada in Las Vegas (UNLV) for three years. There are three unique features associated with this unit. First

Lewis Fraas; James Avery; Leonid Minkin; H. X. Huang; Tim Hebrink; Rik Hurt; Robert Boehm

2011-01-01T23:59:59.000Z

140

Improving data fusion in personal positioning systems for outdoor environments  

Science Conference Proceedings (OSTI)

A fault detection and correction methodology for personal positioning systems for outdoor environments is presented. We demonstrate its successful use in a system consisting of a global positioning system receiver and an inertial measurement unit. Localization ... Keywords: Adaptive Kalman filtering, Causal diagnosis, Chi-square test, Dead reckoning, Fault detection, Pedestrian positioning

E. Pulido Herrera; H. Kaufmann; J. Secue; R. QuirS; G. Fabregat

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

142

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

143

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

144

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

145

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

146

Socioeconomic and Outdoor Meteorological Determinants of Indoor Temperature and Humidity in New York City Dwellings  

Science Conference Proceedings (OSTI)

Numerous mechanisms link outdoor weather and climate conditions to human health. It is likely that many health conditions are more directly affected by indoor rather than outdoor conditions. Yet, the relationship between indoor temperature and ...

J. D. Tamerius; M. S. Perzanowski; L. M. Acosta; J. S. Jacobson; I. F. Goldstein; J. W. Quinn; A. G. Rundle; J. Shaman

2013-04-01T23:59:59.000Z

147

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

148

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

149

DOE Science Showcase - Light-emitting Diode (LED) Lighting Research | OSTI,  

Office of Scientific and Technical Information (OSTI)

Science Showcase - Light-emitting Diode (LED) Lighting Research Science Showcase - Light-emitting Diode (LED) Lighting Research Light-emitting diode (LED) lighting is a type of solid-state lighting that uses a semiconductor to convert electricity to light. LED lighting products are beginning to appear in a wide variety of home, business, and industrial products such as holiday lighting, replacement bulbs for incandescent lamps, street lighting, outdoor area lighting and indoor ambient lighting. Over the past decade, LED technology research and development supported by the U.S. Department of Energy (DOE) has yielded impressive improvements in the cost, color performance, light output, efficacy, reliability, lifetime, and manufacturability of LED products and this upward trend is expected to continue. Read about the latest DOE research, the technology behind LEDs,

150

Objective Method for Selecting Outdoor Reporting Conditions for Photovoltaic Performance  

DOE Green Energy (OSTI)

Outdoor performance of photovoltaic modules and systems depends on prevailing conditions at the time of measurement. Outdoor test conditions must be relevant to device performance and readily attainable. Flat-plate, nonconcentrator PV device performance is reported with respect to fixed conditions referred to as Standard Reporting Conditions (SRC) of 1 kW/m{sup 2} plane of array total irradiance, 25 C device temperature, and a reference spectral distribution at air mass 1.5 under certain atmospheric conditions. We report a method of analyzing historical meteorological and irradiance data to determine the range of outdoor environmental parameters and solar irradiance components that affect solar collector performance when the SRC 1 kW/m{sup 2} total irradiance value occurs outdoors. We used data from the 30 year U.S. National Solar Radiation Data Base (NSRDB) , restricting irradiance conditions to within +/- 25 W/m{sup 2} of 1 kW/m{sup 2} on a solar tracking flat-plate collector. The distributions of environmental parameter values under these conditions are non-Gaussian and site dependent. Therefore the median, as opposed to the mean, of the observed distributions is chosen to represent appropriate outdoor reporting conditions. We found the average medians for the direct beam component (834 W/m{sup 2}), ambient temperature (24.4 C), total column water vapor (1.4 cm), and air mass (1.43) are near commonly used SRC values. Average median wind speed (4.4 m/s) and broadband aerosol optical depth (0.08) were significantly different from commonly used values.

Myers, D. R.; Kurtz, S. (National Renewable Energy Laboratory); Whitaker, C.; Townsend, T. (Endecon Engineering: San Ramon, California); Maish, A. (Sandia National Laboratories: Albuquerque, New Mexico)

1999-02-25T23:59:59.000Z

151

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

152

Real-Time Measurement of Rates of Outdoor Airflow into HVAC Systems: A Field Study of Three Technologies  

E-Print Network (OSTI)

to determine flow resistance of HVAC ducts and fittings.W. 2003. Outdoor airflow into HVAC systems: an evaluation ofof outdoor airflow into HVAC systems. Lawrence Berkeley

Fisk, William J.; Sullivan, Douglas P.; Faulkner, David

2005-01-01T23:59:59.000Z

153

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

154

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

155

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

156

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

157

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

158

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

159

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

160

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

National Parks Move Transportation Forward in America's Great Outdoors |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Parks Move Transportation Forward in America's Great Parks Move Transportation Forward in America's Great Outdoors National Parks Move Transportation Forward in America's Great Outdoors March 28, 2013 - 3:00pm Addthis Together, the five newest National Parks Initiative projects will save the equivalent of nearly 10,000 gallons of gasoline and 71 tons of greenhouse gas emissions per year. | Infographic by Sarah Gerrity, Energy Department. Together, the five newest National Parks Initiative projects will save the equivalent of nearly 10,000 gallons of gasoline and 71 tons of greenhouse gas emissions per year. | Infographic by Sarah Gerrity, Energy Department. Shannon Brescher Shea Communications Manager, Clean Cities Program What are the key facts? The five new National Parks Initiative projects will save the

162

Health Relevant Outdoor Air Change Rates in Homes  

NLE Websites -- All DOE Office Websites (Extended Search)

Health Relevant Outdoor Air Change Rates in Homes Health Relevant Outdoor Air Change Rates in Homes Speaker(s): Jan Sundell Date: February 6, 2003 - 12:00pm Location: Bldg. 90 The Damp Building and Health (DBH) study started as a cross-sectional questionnaire study of all 14000 children, 1-6 years of age in Värmland, Sweden. The response rate on the questionnaire (year 2001) was 79%, meaning that basic data exists on almost 12,000 children and their homes. In a second step a case-control study on 200 sick (wheezing, asthma, excema), and 200 healthy children, extensive measurements in the home, as well as clinical examinations of the children has been conducted during 2002. Ventilation has been measured with a passive tracer gas method during one week. The results will be presented in this seminar-- seemingly sick

163

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

164

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

165

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

166

Indoor-outdoor air leakage of apartments and commercial buildings.  

NLE Websites -- All DOE Office Websites (Extended Search)

Indoor-outdoor air leakage of apartments and commercial buildings. Indoor-outdoor air leakage of apartments and commercial buildings. Title Indoor-outdoor air leakage of apartments and commercial buildings. Publication Type Report Year of Publication 2006 Authors Price, Phillip N., Arman Shehabi, Wanyu R. Chan, and Ashok J. Gadgil Publisher Lawrence Berkeley National Laboratory Abstract We compiled and analyzed available data concerning indoor-outdoor air leakage rates and building leakiness parameters for commercial buildings and apartments. We analyzed the data, and reviewed the related literature, to determine the current state of knowledge of the statistical distribution of air exchange rates and related parameters for California buildings, and to identify significant gaps in the current knowledge and data. Very few data were found from California buildings, so we compiled data from other states and some other countries. Even when data from other developed countries were included, data were sparse and few conclusive statements were possible. Little systematic variation in building leakage with construction type, building activity type, height, size, or location within the u.s. was observed. Commercial buildings and apartments seem to be about twice as leaky as single-family houses, per unit of building envelope area. Although further work collecting and analyzing leakage data might be useful, we suggest that a more important issue may be the transport of pollutants between units in apartments and mixed-use buildings, an under-studied phenomenon that may expose occupants to high levels of pollutants such as tobacco smoke or dry cleaning fumes.

167

Outdoor airflow into HVAC systems: An evaluation of measurement  

NLE Websites -- All DOE Office Websites (Extended Search)

Outdoor airflow into HVAC systems: An evaluation of measurement Outdoor airflow into HVAC systems: An evaluation of measurement technologies Title Outdoor airflow into HVAC systems: An evaluation of measurement technologies Publication Type Report LBNL Report Number LBNL-53834 Year of Publication 2003 Authors Fisk, William J., David Faulkner, Douglas P. Sullivan, and William W. Delp Abstract During the last few years, new technologies have been introduced for measuring the flow rates of outdoor air (OA) into HVAC systems; however, an evaluation of these measurement technologies has not previously been published. This document describes a test system and protocols developed for controlled evaluation of these measurement technologies. The results of tests of three measurement technologies are also summarized. The test system and protocol were judged practical and very useful. The test results indicate that one measurement technology can measure OA flow rates with errors of 20% or less without a field-based calibration, as long as the OA velocities are sufficient to provide an accurately measurable pressure signal. The test results for a second measurement technology are similar; however, a difficult field-based calibration relating the OA flow rate with the pressure signal would be required to reduce errors below approximately 30%. The errors in OA flow rates measured with the third measurement technology, that uses six electronic airspeed sensors downstream of the OA inlet louver, exceeded 100%; however, these errors could be substantially reduced through a difficult field based calibration. The effects of wind on the accuracy of these measurement technologies still needs to be evaluated

168

Minimizing Variation in Outdoor CPV Power Ratings (Presentation)  

DOE Green Energy (OSTI)

Module data from NREL's CPV test bed is used to examine methods for calculating outdoor CPV power ratings. IEC 62670 and ASTM E2527 are used as a starting point for determining a module power rating on a monthly basis. Monthly power ratings vary by more than desired using existing methods. The presentation examines modifications to existing methods as well as spectral corrections to reduce variation in monthly module power ratings.

Muller, M.

2011-02-01T23:59:59.000Z

169

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

170

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

171

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

172

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

173

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

174

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

175

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

176

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

177

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

178

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

179

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

180

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

182

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

183

LED Lighting Basics | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LED Lighting Basics LED Lighting Basics LED Lighting Basics August 16, 2013 - 10:07am Addthis Light-emitting diodes (LEDs) are light sources that differ from more traditional sources of light in that they are semiconductor devices that produce light when an electrical current is applied. Applying electrical current causes electrons to flow from the positive side of a diode to the negative side. Then, at the positive/negative junction of the diode, the electrons slow down to orbit at a lower energy level. The electrons emit the excess energy as photons of light. LEDs are often used as small indicator lights on various electronic devices. Because of their long life, durability, and efficiency, LEDs are becoming more common in residential, commercial, and outdoor area lighting

184

Exploring relationships between outdoor air particulate-associated  

NLE Websites -- All DOE Office Websites (Extended Search)

Exploring relationships between outdoor air particulate-associated Exploring relationships between outdoor air particulate-associated polycyclic aromatic hydrocarbon and PM2.5: A case study of benzo(a)pyrene in California metropolitan regions Title Exploring relationships between outdoor air particulate-associated polycyclic aromatic hydrocarbon and PM2.5: A case study of benzo(a)pyrene in California metropolitan regions Publication Type Journal Article LBNL Report Number LBNL-514E Year of Publication 2008 Authors Lobscheid, Agnes B., Thomas E. McKone, and D. A. Valleroc Journal Atmospheric Environment Volume 41 Start Page Chapter Pagination 5659-5672 Abstract Polycyclic aromatic hydrocarbons (PAHs) and particulate matter (PM) are co-pollutants emitted as by-products of combustion processes. Convincing evidence exists for PAHs as a primary toxic component of fine PM (PM2.5). Because PM2.5 is listed by the US EPA as a "Criteria Pollutant," it is monitored regularly at sites nationwide. In contrast, very limited data is available on measured ambient air concentrations of PAHs. However, between 1999-2001, ambient air concentrations of PM2.5 and benzo(a)pyrene (BaP) are available for California locations. We use multivariate linear regression models (MLRMs) to predict ambient air levels of BaP in four air basins based on reported PM2.5 concentrations and spatial, temporal and meteorological variables as variates. We obtain an R2 ranging from 0.57-0.72 among these basins. Significant variables (p<0.05) include the average daily PM2.5 concentration, wind speed, temperature and relative humidity, and the coastal distance as well as season, and holiday or weekend. Combining the data from all sites and using only these variables to estimate ambient BaP levels, we obtain an R2 of 0.55. These R2-values, combined with analysis of the residual error and cross validation using the PRESS-statistic, demonstrate the potential of our method to estimate reported outdoor air PAH exposure levels in metropolitan regions. These MLRMs provide a first step towards relating outdoor ambient PM2.5 and PAH concentrations for epidemiological studies when PAH measurements are unavailable, or limited in spatial coverage, based on publicly available meteorological and PM2.5 data

185

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

186

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

187

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

188

Climate-derived tensions in Arctic security.  

Science Conference Proceedings (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

189

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

190

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

191

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

192

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

193

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

194

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

195

Orcas Power & Light Coop | Open Energy Information  

Open Energy Info (EERE)

Orcas Power & Light Coop Orcas Power & Light Coop Jump to: navigation, search Name Orcas Power & Light Coop Place Washington Utility Id 14170 Utility Location Yes Ownership C NERC Location WECC NERC WECC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png TARIFF CS-12 COMMERCIAL SERVICE Industrial TARIFF LR-12 LINE RETENTION Commercial TARIFF M-12 MARINA SERVICE Commercial TARIFF NM-12 UNMETERED SERVICE Commercial TARIFF P-12 PUMP SERVICE Industrial TARIFF POL-12 PRIVATE OUTDOOR LIGHTING 100 Watts Lighting TARIFF POL-12 PRIVATE OUTDOOR LIGHTING 200 Watts Lighting

196

Data:3bf7d9e9-b2cf-43ac-8fe1-63780fa641a1 | Open Energy Information  

Open Energy Info (EERE)

(Utility Company) Effective date: 20090930 End date if known: Rate name: OSL-1 Outdoor Security Lighting (existing wood pole)-9.5 ft Sector: Lighting Description: Source or...

197

Data:B15f050a-da57-4ac0-909d-82b56bbb6235 | Open Energy Information  

Open Energy Info (EERE)

(Utility Company) Effective date: 20090930 End date if known: Rate name: OSL-1 Outdoor Security Lighting (existing wood pole)-14 ft Sector: Lighting Description: Source or...

198

Data:1df2ac30-64b0-4d70-a4e6-d737c8aba8c7 | Open Energy Information  

Open Energy Info (EERE)

(Utility Company) Effective date: 20090930 End date if known: Rate name: OSL-1 Outdoor Security Lighting (existing wood pole)7 ft Sector: Lighting Description: Source or...

199

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

200

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

202

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

203

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

204

Slash Pine Elec Member Corp | Open Energy Information  

Open Energy Info (EERE)

Slash Pine Elec Member Corp Slash Pine Elec Member Corp Jump to: navigation, search Name Slash Pine Elec Member Corp Place Georgia Utility Id 17290 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Outdoor Lighting 100 Watt HPS Security Light Lighting Outdoor Lighting 1000 Watt HPS Flood Light* Lighting Outdoor Lighting 1000 Watt MH Flood Light* Lighting Outdoor Lighting 1500 Watt MH Flood Light* Lighting Outdoor Lighting 175 Watt HPS Security Light Lighting Outdoor Lighting 250 Watt HPS Security Light Lighting

205

Outdoor polymeric insulators long-term exposed to HVDC  

SciTech Connect

Field experience from outdoor polymeric insulators exposed to HVDC under natural contamination conditions is presented. This paper summarizes the peak leakage current statistics, the hydrophobicity and the surface material conditions studied by electron spectroscopy for chemical analysis (ESCA) and attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. The results show a strong interrelation between the surface conditions and the performance with respect to leakage currents. Moreover, the results show that the surface conditions and the performance of the insulators exposed to HVDC are rather similar to those of the insulators exposed to HVAC.

Soerqvist, T.; Vlastos, A.E. [Chalmers Univ. of Technology, Gothenburg (Sweden)

1997-04-01T23:59:59.000Z

206

Outdoor unit construction for an electric heat pump  

DOE Patents (OSTI)

The outdoor unit for an electric heat pump is provided with an upper portion 10 containing propeller fan means 14 for drawing air through the lower portion 12 containing refrigerant coil means 16 in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs 64 which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed.

Draper, Robert (Pittsburgh, PA); Lackey, Robert S. (Pittsburgh, PA)

1984-01-01T23:59:59.000Z

207

Outdoor unit construction for an electric heat pump  

DOE Patents (OSTI)

The outdoor unit for an electric heat pump is provided with an upper portion containing propeller fan means for drawing air through the lower portion containing refrigerant coil means in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed. 4 figs.

Draper, R.; Lackey, R.S.

1984-09-11T23:59:59.000Z

208

Parkland Light & Water Company | Open Energy Information  

Open Energy Info (EERE)

Parkland Light & Water Company Parkland Light & Water Company Jump to: navigation, search Name Parkland Light & Water Company Place Washington Utility Id 14505 Utility Location Yes Ownership C NERC Location WECC NERC WECC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Large Commercial (Over 50kVA) Commercial Residential Rate Residential Security Lights-100 WATT HP SODIUM Lighting Security Lights-200 WATT HP SODIUM Lighting Security Lights-250 WATT HP SODIUM Lighting Security Lights-400 WATT HP SODIUM Lighting Small Commercial (Under 50kVA) Commercial Average Rates

209

Newnan Wtr, Sewer & Light Comm | Open Energy Information  

Open Energy Info (EERE)

Newnan Wtr, Sewer & Light Comm Newnan Wtr, Sewer & Light Comm Jump to: navigation, search Name Newnan Wtr, Sewer & Light Comm Place Georgia Utility Id 13547 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial Power Rates Commercial Large Power Service Industrial Residential Power Rates Residential Security Lighting - 100 Watt (Decorative) Lighting Security Lighting - 1000 Watt (Directional Flood) Lighting Security Lighting - 1000 Watt (Metal Halide Flood) Lighting Security Lighting - 100W (Cobra or Open) Lighting

210

Albany Water Gas & Light Comm | Open Energy Information  

Open Energy Info (EERE)

Water Gas & Light Comm Water Gas & Light Comm Jump to: navigation, search Name Albany Water Gas & Light Comm Place Georgia Utility Id 230 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial Demand Commercial Commercial Non-Demand Commercial Large Commercial Demand Commercial Residential Residential Security Lights 1000 Watt Metal Halide Metal Pole Lighting Security Lights 1000 Watt Metal Halide Wooden Pole Lighting Security Lights 150 HPSV Fixtures Metal Pole Lighting Security Lights 150 HPSV Fixtures Wooden Pole Lighting

211

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

212

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

213

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

214

An outdoor exposure testing program for optical materials used in solar thermal electric technologies  

DOE Green Energy (OSTI)

Developing low-cost, durable advanced optical materials is important for making solar thermal energy. technologies viable for electricity production. The objectives of a new outdoor testing program recently initiated by the National Renewable Energy Laboratory (NREL) are to determine the expected lifetimes of candidate reflector materials and demonstrate their optical durability in real-world service conditions. NREL is working with both utilities and industry in a collaborative effort to achieve these objectives. To date, simulated/accelerated exposure testing of these materials has not been correlated with actual outdoor exposure testing. Such a correlation is desirable to provide confidence in lifetime predictions based upon accelerated weathering results. This outdoor testing program will allow outdoor exposure data to be obtained for realistic environments and will establish a data base for correlating simulated/accelerated outdoor exposure data with actual outdoor exposure data. In this program, candidate reflector materials are subjected to various outdoor exposure conditions in a network of sites across the southwestern United States. Important meteorological data are continuously recorded at these sites; these data will be analyzed for possible correlations with material optical performance. Weathered samples are characterized on a regular basis using a series of optical tests. These tests provide the basis for tracking material performance and durability with exposure time in the various outdoor environments. This paper describes the outdoor testing program in more detail including meteorological monitoring capabilities and the optical tests that are performed on these materials.

Wendelin, T.; Jorgensen, G.

1994-01-01T23:59:59.000Z

215

Dynamic predictive clothing insulation models based on outdoor air and indoor operative temperatures  

E-Print Network (OSTI)

predictive clothing insulation models based on outdoor airrange of the clothing insulation calculated for eachbuilding). Figure 8 Clothing insulation versus dress code [

Schiavon, Stefano; Lee, Kwang Ho

2012-01-01T23:59:59.000Z

216

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

217

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

218

Rooftop Unitary Air Conditioner with Integral Dedicated Outdoor Air System  

SciTech Connect

Energy use of rooftop and other unitary air-conditioners in commercial applications accounts for about 1 quad (10{sup 15} Btu) of primary energy use annually in the U.S. [Reference 7]. The realization that this cooling equipment accounts for the majority of commercial building cooled floorspace and the majority also of commercial building energy use has spurred development of improved-efficiency equipment as well as development of stricter standards addressing efficiency levels. Another key market driver affecting design of rooftop air-conditioning equipment has been concern regarding comfort and the control of humidity. Trends for increases in outdoor air ventilation rates in certain applications, and the increasing concern about indoor air quality problems associated with humidity levels and moisture in buildings points to a need for improved dehumidification capability in air-conditioning equipment of all types. In many cases addressing this issue exacerbates energy efficiency, and vice versa. The integrated dedicated outdoor air system configuration developed in this project addresses both energy and comfort/humidity issues.

Tiax Llc

2006-02-28T23:59:59.000Z

219

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

220

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

222

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

223

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

224

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

225

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

226

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

227

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

228

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

229

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

230

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

232

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

233

On the Security of the Ping-Pong Protocol  

E-Print Network (OSTI)

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

Kim Bostroem; Timo Felbinger

2007-08-22T23:59:59.000Z

234

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

235

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

236

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

237

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

238

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

239

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

240

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

A Small-Area Study of Environmental Risk Assessment of Outdoor Falls  

Science Conference Proceedings (OSTI)

Falls in public places are an issue of great health concern especially for the elderly. Falls among the elderly is also a major health burden in many countries. This study describes a spatial approach to assess environmental causes of outdoor falls using ... Keywords: Environmental risk assessment, GIS, Outdoor falls, Small-area study, Spatial clustering

Poh-Chin Lai; Wing-Cheung Wong; Chien-Tat Low; Martin Wong; Ming-Houng Chan

2011-12-01T23:59:59.000Z

242

Bateau ivre: an artistic markerless outdoor mobile augmented reality installation on a riverboat  

Science Conference Proceedings (OSTI)

Bateau Ivre is a project presented on the Seine River to make a large audience aware of the possible developments of Augmented Reality through an artistic installation in a mobile outdoor environment. The installation could be viewed from a ship ... Keywords: augmented reality, heritage, mobile augmented reality, outdoor digital art, real-time image processing

Christian Jacquemin; Wai Kit Chan; Mathieu Courgeon

2010-10-01T23:59:59.000Z

243

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

244

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

245

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

246

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

247

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

248

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

249

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

250

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

251

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

252

Wind heat transfer coefficient in solar collectors in outdoor conditions  

Science Conference Proceedings (OSTI)

Knowledge of wind heat transfer coefficient, h{sub w}, is required for estimation of upward losses from the outer surface of flat plate solar collectors/solar cookers. In present study, an attempt has been made to estimate the wind induced convective heat transfer coefficient by employing unglazed test plate (of size about 0.9 m square) in outdoor conditions. Experiments, for measurement of h{sub w}, have been conducted on rooftop of a building in the Institute campus in summer season for 2 years. The estimated wind heat transfer coefficient has been correlated against wind speed by linear regression and power regression. Experimental values of wind heat transfer coefficient estimated in present work have been compared with studies of other researchers after normalizing for plate length. (author)

Kumar, Suresh; Mullick, S.C. [Centre for Energy Studies, Indian Institute of Technology, Delhi, Hauz Khas, New Delhi 110 016 (India)

2010-06-15T23:59:59.000Z

253

Thermosyphon coil arrangement for heat pump outdoor unit  

DOE Patents (OSTI)

For a heat pump, the outdoor unit is provided with a coil and a refrigerant flow arrangement there for which is such that in the heating mode of operation of the heat pump they operate in a thermosyphon fashion. The coil has a feed portion and an exit portion leading to a separator drum from which liquid refrigerant is returned through downcomer line for recirculation to the feed portion. The coil is tilted upwardly from entry to exit by the angle alpha to enhance the clearance of the two phases of refrigerant from each other in the heating mode of operation. There is no thermosyphon function in the cooling mode of operation. 9 figs.

Draper, R.

1984-05-22T23:59:59.000Z

254

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

255

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

256

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

257

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

258

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

259

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

260

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses  

E-Print Network (OSTI)

Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

Sen, Jaydip

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Light-Light Scattering  

E-Print Network (OSTI)

For a long time, it is believed that the light by light scattering is described properly by the Lagrangian density obtained by Heisenberg and Euler. Here, we present a new calculation which is based on the modern field theory technique. It is found that the light-light scattering is completely different from the old expression. The reason is basically due to the unphysical condition (gauge condition) which was employed by the QED calcualtion of Karplus and Neumann. The correct cross section of light-light scattering at low energy of $(\\frac{\\omega}{m} \\ll 1)$ can be written as $ \\displaystyle{\\frac{d\\sigma}{d\\Omega}=\\frac{1}{(6\\pi)^2}\\frac{\\alpha^4} {(2\\omega)^2}(3+2\\cos^2\\theta +\\cos^4\\theta)}$.

Kanda, Naohiro

2011-01-01T23:59:59.000Z

262

Light-Light Scattering  

E-Print Network (OSTI)

For a long time, it is believed that the light by light scattering is described properly by the Lagrangian density obtained by Heisenberg and Euler. Here, we present a new calculation which is based on the modern field theory technique. It is found that the light-light scattering is completely different from the old expression. The reason is basically due to the unphysical condition (gauge condition) which was employed by the QED calcualtion of Karplus and Neumann. The correct cross section of light-light scattering at low energy of $(\\frac{\\omega}{m} \\ll 1)$ can be written as $ \\displaystyle{\\frac{d\\sigma}{d\\Omega}=\\frac{1}{(6\\pi)^2}\\frac{\\alpha^4} {(2\\omega)^2}(3+2\\cos^2\\theta +\\cos^4\\theta)}$.

Naohiro Kanda

2011-06-03T23:59:59.000Z

263

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

264

Texas A&M AgriLife Research Procedures 24.01.01.A0.09 Outdoor Burning  

E-Print Network (OSTI)

Texas A&M AgriLife Research Procedures 24.01.01.A0.09 Outdoor Burning Approved: October 5, 2000: August 27, 2014 Texas A&M AgriLife Research Procedure 24.01.01.A0.09 Outdoor Burning Page 1 of 2 PROCEDURE STATEMENT The Texas Commission on Environmental Quality (TCEQ) regulates outdoor burning (30 TAC

265

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

266

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

267

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

268

Energy Capture with Optimized Photovoltaic Cells under Low Lighting Conditions  

Science Conference Proceedings (OSTI)

The optimization of photovoltaic devices for versatile conditions is necessary to improve the energy capture for indoor applications, such as self sufficient sensors. However, the design rules of standard outdoor solar cells are not applicable for cells ... Keywords: energy harvesting, indoor photovoltaics, low lighting conditions, photovoltaic cells

Karola Ruhle, Leonhard M. Reindl, Martin Kasemann

2012-11-01T23:59:59.000Z

269

Village of Deshler, Ohio (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Deshler Deshler Place Ohio Utility Id 5096 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial General Service (Single Phase) Commercial Commercial General Service (Three Phase) Commercial Industrial Large Power Service Industrial Outdoor Security Lighting (100 HPS) Commercial Outdoor Security Lighting (150 HPS) Commercial Outdoor Security Lighting (175 MV) Commercial Outdoor Security Lighting (250 HPS) Commercial Outdoor Security Lighting (250 MV) Commercial Outdoor Security Lighting (400 MV) Commercial

270

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

271

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

272

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

273

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

274

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

275

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

276

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

277

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

278

Indoor-Outdoor Air Leakage of Apartments and Commercial Buildings  

SciTech Connect

We compiled and analyzed available data concerning indoor-outdoor air leakage rates and building leakiness parameters for commercial buildings and apartments. We analyzed the data, and reviewed the related literature, to determine the current state of knowledge of the statistical distribution of air exchange rates and related parameters for California buildings, and to identify significant gaps in the current knowledge and data. Very few data were found from California buildings, so we compiled data from other states and some other countries. Even when data from other developed countries were included, data were sparse and few conclusive statements were possible. Little systematic variation in building leakage with construction type, building activity type, height, size, or location within the u.s. was observed. Commercial buildings and apartments seem to be about twice as leaky as single-family houses, per unit of building envelope area. Although further work collecting and analyzing leakage data might be useful, we suggest that a more important issue may be the transport of pollutants between units in apartments and mixed-use buildings, an under-studied phenomenon that may expose occupants to high levels of pollutants such as tobacco smoke or dry cleaning fumes.

Price, P.N.; Shehabi, A.; Chan, R.W.; Gadgil, A.J.

2006-06-01T23:59:59.000Z

279

Measuring Outdoor Air Intake Rates into Existing Building  

SciTech Connect

Practical and accurate technologies are needed for continuously measuring and controlling outdoor air (OA) intake rates in commercial building heating, ventilating, and air conditioning (HVAC) systems. This project evaluated two new measurement approaches. Laboratory experiments determined that OA flow rates were measurable with errors generally less than 10 percent using electronic air velocity probes installed between OA intake louver blades or at the outlet face of louvers. High accuracy was maintained with OA flow rates as low as 15 percent of the maximum for the louvers. Thus, with this measurement approach HVAC systems do not need separate OA intakes for minimum OA supply. System calibration parameters are required for each unique combination of louver type and velocity sensor location but calibrations are not necessary for each system installation. The research also determined that the accuracy of measuring OA flow rates with velocity probes located in the duct downstream of the intake louver was not improved by installing honeycomb airflow straighteners upstream of the probes. Errors varied with type of upstream louver, were as high as 100 percent, and were often greater than 25 percent. In conclusion, use of electronic air velocity probes between the blades of OA intake louvers or at the outlet face of louvers is a highly promising means of accurately measuring rates of OA flow into HVAC systems. The use of electronic velocity probes downstream of airflow straighteners is less promising, at least with the relatively small OA HVAC inlet systems employed in this research.

Fisk, William; Sullivan, Douglas; Cohen, Sebastian; Han, Hwataik

2009-04-16T23:59:59.000Z

280

Colour Recognition In Outdoor Images Through Context-Based Models  

E-Print Network (OSTI)

This paper analyzes the variation of the color of objects with respect to existing models of daylight and surface reflectance, and develops context-based models of daylight (based on the CIE model [18]) and hybrid surface reflectance (based on existing hybrid surface reflectance models [21, 25, 32, 35]) called the Normalized Photometric Function. Thereafter, given the time-of-day (which, along with location, is used to calculate the sun-angle [23]), approximate cloud cover and sun-visibility, the color of the incident daylight is predicted, and combined with the reflectance model of the target object to predict the apparent color of the object; image pixels are then classified based on the predicted color. Section 2 describes the causes for the variation in apparent color; section 3 gives a brief literature review; section 4 describes the CIE daylight model and the context-based daylight model developed in this study; section 5 analyzes surface reflectance with respect to existing models and then develops the Normalized Photometric Function (NPF) model; section 6 combines the daylight and NPF models for context-based color prediction; finally, section 7 summarizes the conclusions of the study. 2 Causes for color shift in outdoor scenes

Shashi Buluswar; Red Green; Red Green

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

282

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

283

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

284

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

285

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

286

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

287

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

288

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

289

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

290

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

291

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

292

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

293

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

294

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

295

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

296

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

297

Architecture for environmental learning : a National Outdoor Leadership School in Baja, Mexico  

E-Print Network (OSTI)

An understanding of people, program, and place establishes a foundation from which to make architectural decisions. The focus of this thesis is to understand the needs of those involved in an outdoor education school in ...

Galyean, Taylor

1994-01-01T23:59:59.000Z

298

SITEWIDE CATEGORICAL EXCLUSION FOR OUTDOOR TESTS ON MATERIALS AND COMPONENTS, PACIFIC NORTHWEST NATIONAL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SITEWIDE CATEGORICAL EXCLUSION FOR OUTDOOR TESTS ON SITEWIDE CATEGORICAL EXCLUSION FOR OUTDOOR TESTS ON MATERIALS AND COMPONENTS, PACIFIC NORTHWEST NATIONAL LABORATORY, RICHLAND, WASHINGTON Proposed AetioD: The U.S. Department of Energy (DOE) Pacific Northwest Site Office (PNSO) proposes to conduct outdoor tests and experiments on materials and equipment components under controlled conditions. No source, special nuclear, or byproduct materials would be involved, but encapsulated radioactive sources manufactured to applicable standards or other radiological materials could be used in activities under this categorical exclusion (eX). LoeatioD of Action: The locations would include DOE property at the Pacific Northwest National Laboratory (PNNL) Site and other offsite outdoor locations. Description of the Proposed Action:

299

Ideal balance of work, play makes outdoor enthusiast's James Miller life  

NLE Websites -- All DOE Office Websites (Extended Search)

Ideal balance of work, play makes outdoor enthusiast's life enviable Ideal balance of work, play makes outdoor enthusiast's life enviable Ideal balance of work, play makes outdoor enthusiast's James Miller life enviable Nuclear engineer graduate research assistant gets valueable experience while taking advantage of local outdoor recreational activities. August 2, 2012 James Miller Miller first came to the Laboratory in 2006 as a summer student. His college advisor, a former LANL employee, found him an internship through the student programs office. Miller highly recommends LANL as a place to start a career, "The student programs are very mentor-driven, allowing you to gain phenomenal experience and build a professional network that will set you up for the rest of your life." "I have access to top-level scientists in the world, doing some of the best

300

Roughness Lengths for Momentum and Heat Derived from Outdoor Urban Scale Models  

Science Conference Proceedings (OSTI)

Urban climate experimental results from the Comprehensive Outdoor Scale Model (COSMO) were used to estimate roughness lengths for momentum and heat. Two different physical scale models were used to investigate the scale dependence of the ...

M. Kanda; M. Kanega; T. Kawai; R. Moriwaki; H. Sugawara

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Factors affecting the indoor concentrations of carbonaceous aerosols of outdoor origin  

E-Print Network (OSTI)

Valley of California, USA. J. Aerosol Science 32, S631-S632.particles of outdoor origin. Aerosol Science and Technology,in Central California. Aerosol Science and Technology, 40,

Lunden, Melissa M.

2009-01-01T23:59:59.000Z

302

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

303

LED Lighting  

Energy.gov (U.S. Department of Energy (DOE))

Light-emitting diodes (LEDs) are light sources that differ from more traditional sources of light in that they are semiconductor devices that produce light when an electrical current is applied....

304

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

305

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

306

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

307

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

308

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

309

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

310

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

311

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

312

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

313

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

314

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

315

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

316

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

317

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

318

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

319

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

320

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

322

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

323

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

324

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

325

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

326

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

327

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

328

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

329

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Institutional Research & Development > Contact Us Contact Us Above Image: Fission neutrons can be distinguished from background radiation using a novel variation of a metal-organic framework (MOF) scintillator that was a new class of scintillator previously patented by Sandia: Crystals of a metal organic framework (left) emit light in the blue (middle) when exposed to ionizing radiation. Infiltrating them with an organometallic compound causes the crystals to emit red light as well (right), creating a new way to differentiate fission neutrons from

330

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

331

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

332

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

333

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

334

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

335

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

336

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

337

A model of an intelligent video-based security surveillance system for general indoor/outdoor environments  

Science Conference Proceedings (OSTI)

Over a decade ago, simply recording a few minutes of CCTV footage required special hardware. Today, with the emergence of new sensors and improved processing hardware, a relatively inexpensive personal computer can process and store video in real-time, ... Keywords: background modelling, motion detection, object tracking, video surveillance

Wayne Chelliah Naidoo; Jules-Raymond Tapamo

2008-10-01T23:59:59.000Z

338

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

339

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

340

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

342

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

343

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

344

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

345

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

346

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

347

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

348

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

349

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

350

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

351

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

352

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

353

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

354

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

355

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

356

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

357

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

358

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

359

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

360

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

362

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

363

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

364

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

365

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

366

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

367

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

368

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

369

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

370

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

371

Lighting Techniques  

Science Conference Proceedings (OSTI)

...Lighting is very critical in photography. The specimen should be placed on a background which will not detract from the resolution of the fracture surface. For basic lighting, one spotlight is suggested. The light is then raised or lowered, and

372

Evaluation of commercially available lighting design software  

Science Conference Proceedings (OSTI)

This report addresses the need for commercially available lighting design computer programs and evaluates several of these programs. Sandia National Laboratories uses these programs to provide lighting designs for exterior closed-circuit television camera intrusion detection assessment for high-security perimeters.

McConnell, D.G.

1990-09-01T23:59:59.000Z

373

An evaluation of three commercially available technologies for real-time measurement of rates of outdoor airflow into HVAC systems  

E-Print Network (OSTI)

RATES OF OUTDOOR AIRFLOW INTO HVAC SYSTEMS William J. Fisk,determine flow resistance of hvac ducts and fittings. A S H

Fisk, William J.; Faulkner, David; Sullivan, Douglas P.

2004-01-01T23:59:59.000Z

374

Making recreational space: citizen involvement in outdoor recreation and park establishment in British Columbia, 1900-2000.  

E-Print Network (OSTI)

??Studies of outdoor recreation and the social construction of wilderness have shown how urban consumption of wilderness areas dispossessed rural residents from traditional land uses. (more)

Clayton, Jenny

2009-01-01T23:59:59.000Z

375

The effects of outdoor heat exchanger hydrophobic treatment on the performance of an air source heat pump.  

E-Print Network (OSTI)

??The effects of outdoor heat exchanger hydrophobic treatment on the performance of an air source heat pump were investigated. The base case tests used a (more)

Parker, Brandon DeWayne

2012-01-01T23:59:59.000Z

376

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

377

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

378

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

379

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

380

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

382

Ningbo Liaoyuan Lighting Co | Open Energy Information  

Open Energy Info (EERE)

Liaoyuan Lighting Co Liaoyuan Lighting Co Jump to: navigation, search Name Ningbo Liaoyuan Lighting Co Place Yuyao, Zhejiang Province, China Zip 315408 Sector Solar, Wind energy Product Engaged in outdoor LED lighting manufacture and design including street lamps and solar/wind hybrid street lamps. Coordinates 30.047501°, 121.151222° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":30.047501,"lon":121.151222,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

383

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

384

Quantum cryptography for secure free-space communications  

SciTech Connect

The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

1999-03-01T23:59:59.000Z

385

Solar Decathlon Design Places People and the Outdoors at its Heart |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Decathlon Design Places People and the Outdoors at its Heart Solar Decathlon Design Places People and the Outdoors at its Heart Solar Decathlon Design Places People and the Outdoors at its Heart May 26, 2011 - 5:57pm Addthis Members of Team New Zealand | Courtesy of the New Zealand team's Flickr photostream Members of Team New Zealand | Courtesy of the New Zealand team's Flickr photostream Erin R. Pierce Erin R. Pierce Digital Communications Specialist, Office of Public Affairs How can I participate? The next Solar Decathlon will be held Sept. 23-Oct. 2, 2011, at the National Mall's West Potomac Park in Washington, D.C. In honor of the U.S Department of Energy's Solar Decathlon -- which challenges 20 collegiate teams to design, build and operate solar-powered houses that are cost-effective, energy-efficient and attractive -- we are

386

B3.11 SWCX for Outdoor Tests, Experiments on Materials and Equipment Components-  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 SWCX for Outdoor Tests, Experiments on Materials and Equipment Components- 1 SWCX for Outdoor Tests, Experiments on Materials and Equipment Components- Revision 0 Sitewide Categorical Exclusion for Outdoor Tests, Experiments on Materials and Equipment Components Introduction .A .. s defined in the U.S. Department of Energy's (DOE) Richland Operations Office Integrated Management System Procedure, NEPA Analysis at Hanford, a sitewide categorical exclusion is: An application of DOE categorical exclusions described in 10 CFR 1021, Appendices A and B, which may apply to Hanford Site proposed actions (activities) that are "sitewide" in nature and extent, which the cognizant DOE Hanford NCO has determined fit within the scope (i.e., same n

387

Solar Decathlon Design Places People and the Outdoors at its Heart |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Decathlon Design Places People and the Outdoors at its Heart Solar Decathlon Design Places People and the Outdoors at its Heart Solar Decathlon Design Places People and the Outdoors at its Heart May 26, 2011 - 5:57pm Addthis Members of Team New Zealand | Courtesy of the New Zealand team's Flickr photostream Members of Team New Zealand | Courtesy of the New Zealand team's Flickr photostream Erin R. Pierce Erin R. Pierce Digital Communications Specialist, Office of Public Affairs How can I participate? The next Solar Decathlon will be held Sept. 23-Oct. 2, 2011, at the National Mall's West Potomac Park in Washington, D.C. In honor of the U.S Department of Energy's Solar Decathlon -- which challenges 20 collegiate teams to design, build and operate solar-powered houses that are cost-effective, energy-efficient and attractive -- we are

388

Lighting Research Center Lighting Products  

Science Conference Proceedings (OSTI)

... 12) Solid State Lighting Luminaires - Color Characteristic Measurements. [22/S04] IES LM-16:1993 Practical Guide to Colorimetry of Light Sources. ...

2013-07-26T23:59:59.000Z

389

Incandescent bulbs still play a role in the future of lighting ...  

U.S. Energy Information Administration (EIA)

The Energy Independence and Security Act of 2007 (EISA) mandates longer lasting, more efficient light bulbs for general service. Detailed results from ...

390

SEIS for the Production of Tritium in a Commercial Light Water...  

National Nuclear Security Administration (NNSA)

SEIS for the Production of Tritium in a Commercial Light Water Reactor | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

391

Life-changing Computer Security Research careers. The Sandia Difference  

NLE Websites -- All DOE Office Websites (Extended Search)

Addressing sophisticated cyber threats demands a Addressing sophisticated cyber threats demands a multidisciplinary team with a unique mindset. Sandia provides challenging career opportunities for those with a passion to tackle the complexities of protecting critical systems. World-changing technologies. Life-changing Computer Security Research careers. The Sandia Difference S A N D I A E N V I R O N M E N T At Sandia, you will have access to first-class, state- of-the-art facilities and equipment to develop advanced technologies. Sandia's unique work requires the collective, creative minds of the nation's top scientists, engineers, and support staff. L O C A T I O N & W E A T H E R Sandia's principal sites are in Albuquerque, NM and Livermore, CA. You will find diverse cultural, sport, and outdoor activities amid countryside and climate

392

Outlaw lighting  

SciTech Connect

Demand-side management programs by utilities and the federal government`s Green Lights program have made significant inroads in promoting energy-efficient lighting. But the Energy Policy Act now prohibits certain types of lighting. This article provides analysis to help architects determine new lamp performance compared with older lighting products.

Bryan, H.

1994-12-01T23:59:59.000Z

393

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

394

Cullman Power Board | Open Energy Information  

Open Energy Info (EERE)

Board Board Jump to: navigation, search Name Cullman Power Board Place Alabama Utility Id 4617 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Outdoor Lights 100 W HPS Lighting Outdoor Lights 175 W MV Lighting Outdoor Lights 400 W MV Lighting Residential Residential Security Light Service 1000 W MH Lighting Security Light Service 250 W HPS Flood Lighting Security Light Service 250 W MH Lighting Security Light Service 400 W HPS Lighting Security Light Service 400 W HPS Flood Lighting

395

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

396

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

397

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

398

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

399

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

400

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

402

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

403

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

404

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

405

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

406

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

407

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

408

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

409

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

410

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

411

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

412

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

413

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

414

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

415

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

416

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

417

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

418

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

419

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

420

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

422

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

423

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

424

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

425

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

426

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

427

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

428

The NREL Outdoor Accelerated-weathering Tracking System and Photovoltaic Module Exposure Results  

DOE Green Energy (OSTI)

This paper describes the Outdoor Accelerated-weathering Tracking System (OATS) and interim results for the first OATS study on photovoltaic (PV) modules. With two test planes measuring 1.52 x 1.83 m, OATS provides a unique solar-concentrating exposure capability. Test sample temperatures are moderated by air blowers. Water spray capability exists for wetting samples. The OATS two-axis tracker points to the sun using software calculations. Non-imaging aluminum reflectors give a nominal clear-sky optical concentration ratio of three. Field-qualification measurements in the test plane under reflector conditions showed its relative irradiance non-uniformity was '' 15% for a clear-sky summer day with '' 75 mm as the smallest distance for that non-uniformity. Exposure studies began in November 1997 on seven pairs of commercially available ribbon silicon, crystalline silicon and amorphous silicon PV modules kept at constant resistive load. The modules were periodically removed from OATS for visual inspection and solar simulator performance measurements. There were no module failures. This PV module study is ongoing and later results will be compared to other testing techniques. Through July 1998, the modules under reflector conditions received 392 MJ/m2 of total ultraviolet (TUV) exposure. That was 2.07 times the TUV exposure compared to a south-facing fixed array tilted 40{sup o} up from horizontal at NREL. Similarly, the modules in the test plane under the covered reflectors received 1.04 times the fixed array TUV exposure. For the test plane under the covered reflectors there was a loss of 13% TUV exposure attributed to the reflectors blocking some of the diffuse-sky UV light. Also through July 1998, the OATS sunlight availability measured 95% compared to the cumulative global normal exposure at the NREL Solar Radiation Research Laboratory (SRRL). The OATS sunlight availability losses included downtime when the PV modules were removed, and when there were OAT S tracking problems, maintenance, and repair. For December 1997 through July 1998, the SRRL cumulative exposure was 99% compared to the respective monthly averages from years 1961 through 1990 at Boulder, Colorado.

Basso, T. S.

1998-10-31T23:59:59.000Z

429

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

430

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

431

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

432

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

433

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Incident Response. Contingency Planning and Disaster Response; Incident Identification, Reporting, and Response. Back to Top Security Controls. ...

434

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...

435

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

436

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

437

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

438

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

439

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... North Korean nuclear proliferation - using distributed ... in a Collaborative Environment - "to investigate ... can fulfil the current security requirements of ...

440

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

442

The NREL Outdoor Accelerated-Weathering Tracking System Photovoltaic Module Exposure Results  

DOE Green Energy (OSTI)

Status results are presented for the Outdoor Accelerated-Weathering Tracking System (OATS) first study on photovoltaic (PV) modules. Studies began in November 1997 on pairs of commercially available crystalline silicon and amorphous silicon (a-Si) PV modules kept at constant resistive load.

Basso, T. S.

2000-01-01T23:59:59.000Z

443

EVLA Memo No. 89 The EVLA Outdoor Antenna Test Range Project  

E-Print Network (OSTI)

Projected Costs if new range equipment were purchased Total Material and Equipment costs (to date) for building test range: Funds required to complete project Total NRAO Costs (estimate) without NMT involvementEVLA Memo No. 89 The EVLA Outdoor Antenna Test Range Project: Fourth Quarter 2004, Progress Report

Groppi, Christopher

444

Evaluation of Emerging Line Inspection Technologies: Results of 2012 Outdoor Laboratory Tests  

Science Conference Proceedings (OSTI)

This report describes outdoor laboratory testing performed in 2012 to evaluate different approaches to establish conductor temperature during a helicopter-based Lidar field survey of an existing overhead transmission line. Establishing conductor temperature during Lidar surveys is necessary to assemble a line model to determine line sags, and thus clearances, under full rating and specified environmental conditions. ...

2013-09-26T23:59:59.000Z

445

Stability of CIS/CIGS Modules at the Outdoor Test Facility over Two Decades: Preprint  

DOE Green Energy (OSTI)

This paper discusses examining the status and question of long-term stability of copper indium diselenide (CIS) photovoltaic (PV) module performance for numerous modules that are deployed in the array field, or on the roof of, the outdoor test facility (OTF) at NREL, acquired from two manufacturers.

del Cueto, J. A.; Rummel, S.; Kroposki, B.; Osterwald, C.; Anderberg, A.

2008-05-01T23:59:59.000Z

446

Many exterior entry and walkway lights in residential and commercial  

E-Print Network (OSTI)

. E N V I R O N M E N T A L L Y S O U N D A N D E N E R G Y E F F I C I E N T #12;Hotel/motel staff, contractors, and utility staff can use the information on this system. Key next steps include: · Building Owners/Managers and Lighting Specifiers--Specify the LED Hybrid Outdoor Fixture. · Utility Staff

447

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

448

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

449

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

450

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

451

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

452

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

453

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Planning and Management DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011,...

454

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

455

Security_Walls_VPP_Award  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Force Recognized for Outstanding Safety CARLSBAD, N.M., May 10, 2013 - The U.S. Department of Energy (DOE) has awarded Security Walls, LLC, the Waste Isolation Pilot...

456

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

457

Design and Simulation of a Four-channel Security System of Rocket Fuze  

Science Conference Proceedings (OSTI)

The light armored equipment has been widely used in modern wars, but it is vulnerable to be destroyed by the incoming projectile, so its battlefield survivability can not be guaranteed. In this paper, a four-channel security system has been designed ... Keywords: rocket fuse, security system, multi-point detonation, directional detonation

Shao-Jie Ma; Hao Qin; He Zhang; Hui Li

2010-06-01T23:59:59.000Z

458

Lighting Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

corridors. The overall range of savings was six to 80 percent. The Advanced Lighting Guidelines On-Line Edition New Buildings Institute 2011 presents a table of lighting energy...

459

FOIA | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

460

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

462

Pollux | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

463

Testimonials | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

464

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

465

Counterterrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

466

Vocabulary | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

467

Pantex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

468

Awards | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

469

Policy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

470

Supercomputers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

471

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

472

Contacts | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

473

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

474

Preparedness | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

475

Public | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

476

Recovery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

477

Nonproliferation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

478

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

479

Mission | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

480

Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "lighting outdoor security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Conferences | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

482

Planning | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

483

5.6 Security Monitoring  

Science Conference Proceedings (OSTI)

... monitoring of the cloud-provider infrastructure to demonstrate compliance with cloud-subscriber security policies and auditing requirements. ...

2010-11-02T23:59:59.000Z

484

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

485

Convert | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

486

Protect | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

487

Leave | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

488

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

489

Remove | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

490

Interdiction | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

491

Features | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

492

Security Aspects of Electronic Voting  

Science Conference Proceedings (OSTI)

Security Aspects of Electronic Voting. Summary: The Help America Vote Act (HAVA) of 2002 was passed by Congress to ...

2013-08-01T23:59:59.000Z

493

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z

494

X-ray Security Screening  

Science Conference Proceedings (OSTI)

National and International Standards for X-ray Security Screening Applications. Summary: The primary objective of this ...

2013-03-13T23:59:59.000Z

495

Model Driven Security Functional Testing  

Science Conference Proceedings (OSTI)

Model Driven Security Functional Testing. Summary: Model-Driven Engineering (MDE) is emerging as a promising approach ...

2013-01-15T23:59:59.000Z

496

Presented by National Security College  

E-Print Network (OSTI)

of maritime security, the Taiwan question, and the US-China nuclear balance and extended deterrence. HePresented by National Security College Japan Institute Strategic and Defence Studies Centre Department of Political and Social Change ARC Centre of Excellence in Policing and Security Pivotal Alliance

497

Security for wireless sensor networks  

Science Conference Proceedings (OSTI)

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure ... Keywords: WSN, security, sensor networks, wireless

Sasikanth Avancha; Jeffrey Undercoffer; Anupam Joshi; John Pinkston

2004-01-01T23:59:59.000Z

498

Secure collaborations over message boards  

Science Conference Proceedings (OSTI)

We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and ... Keywords: collaborative systems, cryptography, key predistribution, message boards, networks, secure collaboration, security, service attacks, trust modules

Mahalingam Ramkumar; Nasir Memon

2006-09-01T23:59:59.000Z

499

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10 we can think about generating greater security and prosperity through systemic change that arises, then providing security is paramount consideration along that path. Using frames of collective, national

Young, Paul Thomas

500

CALENDAR YEAR 2011 ANNUAL SECURITY  

E-Print Network (OSTI)

CALENDAR YEAR 2011 ANNUAL SECURITY FIRE SAFETY REPORT& #12;University of North Dakota Annual Security & Fire Safety Report: Calendar Year 2011 n Page 1 Dear Community Member: I am pleased to introduce the 2011 Annual Security and Fire Safety Report for the University of North Dakota. This report

Delene, David J.