National Library of Energy BETA

Sample records for management vulnerability assessment

  1. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  2. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  3. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  4. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  5. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  6. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  8. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  9. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  11. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  12. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  13. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  14. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  15. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  16. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  17. Sandia Energy - Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AssessmentsTara Camacho-Lopez2015-05-11T19:45:10+00:00 Digital Instrument and Control (I&C) is an integral part of the nuclear power industry in the United States. I&C...

  18. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  19. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  20. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  1. Int. J. Risk Assessment and Management, Vol. X, No. X, xxxx 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    McCarl, Bruce A.

    Int. J. Risk Assessment and Management, Vol. X, No. X, xxxx 1 Copyright © 200x Inderscience Enterprises Ltd. Risk assessment and management of animal disease- related biosecurity Yanhong Jin* Department threats; preparedness; prevention; recovery; response; risk assessment; risk management; vulnerability

  2. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  3. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  4. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  5. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  6. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  7. Consequential life cycle assessment of policy vulnerability to price effects

    E-Print Network [OSTI]

    Rajagopal, D

    2014-01-01

    Recent developments in life cycle assessment. Journal ofHalog. 2011. Consequential life cycle assessment: A review.Journal of Life Cycle Assessment 16(5): Edwards, R. , S.

  8. Consequential life cycle assessment of policy vulnerability to price effects

    E-Print Network [OSTI]

    Rajagopal, D

    2014-01-01

    Recent developments in life cycle assessment. Journal ofJournal of Life Cycle Assessment 15(1): Laborde, D. 2011.in consequential life-cycle assessment. Journal of Cleaner

  9. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  10. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  11. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  12. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  13. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  14. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  15. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  16. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  17. Method of assessing severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.; Okrent, D.; Jae, M.; Lim, H.; Milici, T.; Park, H.; Swider, J.; Xing, L.; Yu, D. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Accident management can be defined as the innovative use of existing and or alternative resources, systems, and actions to prevent or mitigate a severe accident. A significant number of probabilistic safety assessments (PSAs) have been completed that yield the principal plant vulnerabilities. These vulnerabilities can be categorized as (1) dominant sequences with respect to core-melt frequency. (2) dominant sequences with respect to various risk measures. (3) dominant threats that challenge safety functions. (4) dominant threats with respect to failure of safety systems. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainties in key phenomena, operator behavior, system availability and behavior, and available information. This paper presents a methodology for assessing severe accident management strategies given the key uncertainties delineated at two workshops held at the University of California, Los Angeles. Based on decision trees and influence diagrams, the methodology is currently being applied to two case studies: cavity flooding in a pressurized water reactor (PWR) to prevent vessel penetration or failure, and drywell flooding in a boiling water reactor to prevent vessel and/or containment failure.

  18. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  19. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  20. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  1. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  2. Health Assessment Requirements Candidate Waiver Request Health Assessment Management System

    E-Print Network [OSTI]

    Sin, Peter

    Health Assessment Requirements Candidate Waiver Request Health Assessment Management System Please: To Position #: Position Title: Environmental Health & Safety Use Only Reviewer Name: ___________________ Effective Date: _______________ Comments: Revised: May 14, 2012 #12;Health Assessment Requirements Candidate

  3. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  4. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  5. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  6. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  7. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  8. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J of Madras and Faculty of Environmental Studies, York University. Pages 451 ­ 464. SOLID WASTE MANAGEMENT the responsibility of solid waste management remains primarily with the municipal bodies, several other stakeholder

  9. Management Assessment and Independent Assessment Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-31

    The revision to this Guide reflects current assessment practices, international standards, and changes in the Department of Energy expectations. Cancels DOE G 414.1-1. Canceled by DOE G 414.1-1B.

  10. Environmental Management Assessment of the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Not Available

    1993-04-01

    This report documents the results of the Environmental Management Assessment performed at the Fernald Environmental Management Project (FEMP) in Fernald, Ohio. During this assessment, the activities conducted by the assessment team included review of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and FEMP contractor personnel; and inspection and observation of selected facilities and operations. The onsite portion of the assessment was conducted from March 15 through April 1, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). EH-24 carries out independent assessments of DOE facilities and activities as part of the EH-1 Environment, Safety, and Health (ES&H) Oversight Audit Program. The EH-24 program is designed to evaluate the status of DOE facilities and activities with respect to compliance with Federal, state, and local environmental laws and regulations; compliance with DOE Orders, Guidance and Directives; conformance with accepted industry practices and standards of performance; and the status and adequacy of management systems developed to address environmental requirements. The Environmental Management Assessment of FEMP focused on the adequacy of environmental management systems. Further, in response to requests by the Office of Environmental Restoration and Waste Management (EM) and Fernald Field Office (FN), Quality Assurance and Environmental Radiation activities at FEMP were evaluated from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section in this report.

  11. Supplier Management Self-Assessment Tool

    E-Print Network [OSTI]

    Lean Advancement Initiative

    This tool represents a framework that companies can utilize to conduct a self-assessment of how much progress they have made in developing lean supply chain management capabilities. In addition, it can be used to establish ...

  12. Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Federick T.; Schlicher, Bob G

    2015-01-01

    There are many influencing economic factors to weigh from the defender-practitioner stakeholder point-of-view that involve cost combined with development/deployment models. Some examples include the cost of countermeasures themselves, the cost of training and the cost of maintenance. Meanwhile, we must better anticipate the total cost from a compromise. The return on investment in countermeasures is essentially impact costs (i.e., the costs from violating availability, integrity and confidentiality / privacy requirements). The natural question arises about choosing the main risks that must be mitigated/controlled and monitored in deciding where to focus security investments. To answer this question, we have investigated the cost/benefits to the attacker/defender to better estimate risk exposure. In doing so, it s important to develop a sound basis for estimating the factors that derive risk exposure, such as likelihood that a threat will emerge and whether it will be thwarted. This impact assessment framework can provide key information for ranking cybersecurity threats and managing risk.

  13. Hanford Site Waste Management Area C Performance Assessment ...

    Office of Environmental Management (EM)

    Waste Management Area C Performance Assessment (PA) Current Status Hanford Site Waste Management Area C Performance Assessment (PA) Current Status Marcel Bergeron Washignton River...

  14. Senior Technical Safety Manager Qualification Program Self-Assessment...

    Office of Environmental Management (EM)

    Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of...

  15. Management and Independent Assessments Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-03-27

    The Guide reflects updated standards for assessment practices, international standards, and changes in DOE expectations related to quality assurance (QA). Supersedes DOE G 414.1-1B.

  16. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  17. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  18. Assessment of the Potential Effect of Climate Change on Hurricane Risk and Vulnerability in Florida 

    E-Print Network [OSTI]

    Ruiz, Michelle

    2014-12-05

    Hurricanes are a yearly threat to the eastern and Gulf coasts of the United States. An increase in frequency and intensity of hurricanes is a possible and dangerous consequence of future climate change. To assess the threat of more frequent...

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  20. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  1. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The Cisco Video Surveillance Manager (VSM) allows...

  2. NDE to Manage Atmospheric SCC in Canisters for Dry Storage of Spent Fuel: An Assessment

    SciTech Connect (OSTI)

    Meyer, Ryan M.; Pardini, Allan F.; Cuta, Judith M.; Adkins, Harold E.; Casella, Andrew M.; Qiao, Hong; Larche, Michael R.; Diaz, Aaron A.; Doctor, Steven R.

    2013-09-01

    This report documents efforts to assess representative horizontal (Transuclear NUHOMS®) and vertical (Holtec HI-STORM) storage systems for the implementation of non-destructive examination (NDE) methods or techniques to manage atmospheric stress corrosion cracking (SCC) in canisters for dry storage of used nuclear fuel. The assessment is conducted by assessing accessibility and deployment, environmental compatibility, and applicability of NDE methods. A recommendation of this assessment is to focus on bulk ultrasonic and eddy current techniques for direct canister monitoring of atmospheric SCC. This assessment also highlights canister regions that may be most vulnerable to atmospheric SCC to guide the use of bulk ultrasonic and eddy current examinations. An assessment of accessibility also identifies canister regions that are easiest and more difficult to access through the ventilation paths of the concrete shielding modules. A conceivable sampling strategy for canister inspections is to sample only the easiest to access portions of vulnerable regions. There are aspects to performing an NDE inspection of dry canister storage system (DCSS) canisters for atmospheric SCC that have not been addressed in previous performance studies. These aspects provide the basis for recommendations of future efforts to determine the capability and performance of eddy current and bulk ultrasonic examinations for atmospheric SCC in DCSS canisters. Finally, other important areas of investigation are identified including the development of instrumented surveillance specimens to identify when conditions are conducive for atmospheric SCC, characterization of atmospheric SCC morphology, and an assessment of air flow patterns over canister surfaces and their influence on chloride deposition.

  3. DOE's New Checklist Helps Plants Assess Energy Management Activities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assess Energy Management Activities May 14, 2014 - 11:40am Addthis DOE developed the Strategic Energy Management Checklist to help manufacturing facilities conduct a...

  4. Assessment of Latent Heat Reservoirs for Thermal Management of...

    Office of Scientific and Technical Information (OSTI)

    Assessment of Latent Heat Reservoirs for Thermal Management of QCW Laser Diodes Citation Details In-Document Search Title: Assessment of Latent Heat Reservoirs for Thermal...

  5. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  6. Bonneville - Hood River Vegetation Management Environmental Assessment

    SciTech Connect (OSTI)

    N /A

    1998-08-01

    To maintain the reliability of its electrical system, BPA, in cooperation with the U.S. Forest Service, needs to expand the range of vegetation management options used to clear unwanted vegetation on about 20 miles of BPA transmission line right-of-way between Bonneville Dam and Hood River; Oregon, within the Columbia Gorge National Scenic Area (NSA). We propose to continue controlling undesirable vegetation using a program of Integrated Vegetation Management (IVM) which includes manual, biological and chemical treatment methods. BPA has prepared an Environmental Assessment (EA) (DOE/EA-1257) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required and BPA is issuing this FONSI.

  7. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  8. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01

    risk assessment and management (RAM), Centre for Oil and GasRisk Assessment & Management (RAM), Centre for Oil and Gas

  9. Assessment of two BWR accident management strategies

    SciTech Connect (OSTI)

    Hodge, S.A.; Petek, M.

    1991-01-01

    Candidate mitigative strategies for management of in-vessel events during the late phase (after core degradation has occurred) of postulated BWR severe accidents were considered at Oak Ridge National Laboratory (ORNL) during 1990. The identification of new strategies was subject to the constraint that they should, to the maximum extent possible, make use of the existing equipment and water resources of the BWR facilities and not require major equipment modifications or additions. As a result of this effort, two of these candidate strategies were recommended for additional assessment. The first is a strategy for containment flooding to maintain the core and structural debris within the reactor vessel in the event that vessel injection cannot be restored to terminate a severe accident sequence. The second strategy pertains to the opposite case, for which vessel injection would be restored after control blade melting had begun; its purpose is to provide an injection source of borated water at the concentration necessary to preclude criticality upon recovering a damaged BWR core. Assessments of these two strategies have been performed during 1991 under the auspices of the Detailed Assessment of BWR In-Vessel Strategies Program. This paper provides a discussion of the motivation for and purpose of these strategies and the potential for their success. 33 refs., 9 figs.

  10. An Assessment of Integrated Health Management Frameworks

    SciTech Connect (OSTI)

    Lybeck, Nancy; Coble, Jamie B.; Tawfik, Magdy; Bond, Leonard J.

    2012-05-18

    In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging NPPs presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to better understanding and management of the challenges posed by aging NPPs. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of an NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of an NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

  11. Enterprise Assessments Targeted Review, Management of the Safety...

    Energy Savers [EERE]

    Volt Diesel Bus Battery-Backed Power System of the Idaho National Laboratory Advanced Test Reactor -October 2015 Enterprise Assessments Targeted Review, Management of the...

  12. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01

    useful is quantitative risk assessment? Risk Analysis Vol.172. Bea, R. G. (2001). "Risk Assessment and Management ofAchieving step change in risk assessment and management (

  13. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  14. Environmental Management Assessment of the National Renewable Energy Laboratory (NREL)

    SciTech Connect (OSTI)

    Not Available

    1993-09-01

    This report documents the results of the environmental management assessment performed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. The onsite portion of the assessment was conducted from September 14 through September 27, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). During this assessment, the activities conducted by the assessment team included reviews of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and NREL contractor personnel; and inspections and observations of selected facilities and operations. The environmental management assessment of NREL focused on the adequacy of environmental management systems and assessed the formality of programs employing an approach that recognizes the level of formality implementing environmental programs may vary commensurate with non-nuclear research and development operations. The Assessment Team evaluated environmental monitoring, waste management and National Environmental Policy Act (NEPA) activities at NREL, from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section of this report. The scope of the NREL Environmental Management Assessment was comprehensive and included all areas of environmental management. At the same time, environmental monitoring, waste management, and NEPA activities were evaluated to develop a programmatic understanding of these environmental disciplines, building upon the results of previous appraisals, audits, and reviews performed at the NREL.

  15. Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty and managing risk. After

    E-Print Network [OSTI]

    Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty in this power plan require an analytical approach that addresses such rare but extreme events. Risk assessment favor going ahead. In this plan, the Council further integrates risk assessment and management into its

  16. An Application of Qualitative Risk Assessment in Park Management

    E-Print Network [OSTI]

    Burgman, Mark

    An Application of Qualitative Risk Assessment in Park Management Janet M. Carey, Mark A. Burgman of the risk analysis protocol from the Australian Standard for Risk Management, AS/NZS 4360, was used value (SA/SNZ 2000). It provides a basis for comparing and ranking risks, so that managers can focus

  17. Defining Change Management Properties for Component Interoperability Assessment

    E-Print Network [OSTI]

    Gamble, R. F.

    1 Defining Change Management Properties for Component Interoperability Assessment T. Gamble R In this paper, we leverage software architecture analysis techniques to codify change management properties is to extend component-based systems analysis to include change management concerns so that clearer designs

  18. Probabilistic Risk Assessment for dairy waste management systems 

    E-Print Network [OSTI]

    Leigh, Edward Marshall

    1993-01-01

    Probabilistic Risk Assessment (PRA) techniques were used to evaluate the risk of contamination of surface and ground water with wastewater from an open lot dairy in Erath County, Texas. The dairy supported a complex waste management system...

  19. Assessment of light water reactor accident management programs and experience

    SciTech Connect (OSTI)

    Hammersley, R.J. [Fauske and Associates, Inc., Burr Ridge, IL (United States)

    1992-03-01

    The objective of this report is to provide an assessment of the current light water reactor experience regarding accident management programs and associated technology developments. This assessment for light water reactor (LWR) designs is provided as a resource and reference for the development of accident management capabilities for the production reactors at the Savannah River Site. The specific objectives of this assessment are as follows: 1. Perform a review of the NRC, utility, and industry (NUMARC, EPRI) accident management programs and implementation experience. 2. Provide an assessment of the problems and opportunities in developing an accident management program in conjunction or following the Individual Plant Examination process. 3. Review current NRC, utility, and industry technological developments in the areas of computational tools, severe accident predictive tools, diagnostic aids, and severe accident training and simulation.

  20. Water Resource Infrastructure in New York: Assessment, Management, & Planning Year 3

    E-Print Network [OSTI]

    Walter, M.Todd

    Water Resource Infrastructure in New York: Assessment, Management, & Planning & Srinagesh Gavirneni NEW YORK STATE WATER RESOURCES INSTITUTE Resource Infrastructure in New York: Assessment, Management, & Planning ­ Year 3

  1. Developing and assessing accident management plans for nuclear power plants

    SciTech Connect (OSTI)

    Hanson, D.J.; Johnson, S.P.; Blackman, H.S.; Stewart, M.A. (EG and G Idaho, Inc., Idaho Falls, ID (United States))

    1992-07-01

    This document is the second of a two-volume NUREG/CR that discusses development of accident management plans for nuclear power plants. The first volume (a) describes a four-phase approach for developing criteria that could be used for assessing the adequacy of accident management plans, (b) identifies the general attributes of accident management plans (Phase 1), (c) presents a prototype process for developing and implementing severe accident management plans (Phase 2), and (d) presents criteria that can be used to assess the adequacy of accident management plans. This volume (a) describes results from an evaluation of the capabilities of the prototype process to produce an accident management plan (Phase 3) and (b), based on these results and preliminary criteria included in NUREG/CR-5543, presents modifications to the criteria where appropriate.

  2. Risk assessment and management of radiofrequency radiation exposure

    SciTech Connect (OSTI)

    Dabala, Dana; Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia

    2013-11-13

    Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.

  3. An Ecological Risk Assessment for Insecticides Used in Adult Mosquito Management

    E-Print Network [OSTI]

    Peterson, Robert K. D.

    An Ecological Risk Assessment for Insecticides Used in Adult Mosquito Management Ryan S Davis: Risk assessment Mosquito management Insecticides Synergists Nontarget receptors INTRODUCTION West Nile the largest arboviral encephalitis epidemic in US history. Vector control management programs have been

  4. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  5. Environmental Assessment : Squawfish Management Program : Final.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    1992-05-01

    Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  7. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  8. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  9. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  10. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram

  11. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  12. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  13. Management and organizational assessments: a review of selected organizations

    SciTech Connect (OSTI)

    Nadel, M.V.; Kerwin, C.M.

    1984-02-01

    This report is part of a larger project designed to assist the NRC in its responsibilities for assessing the management and organization of utilities applying for an operating license for a nuclear power plant. This report reviews the processes and criteria used by other organizations that conduct management and organization audits and evaluations. It was undertaken in order to provide data and a basis for future analysis by taking a comparative perspective. When considering changes in criteria and procedures as the NRC is doing, a standard benchmark is the performance of other organizations that are similarly situated. It was our goal to directly inform the NRC about the activities of other organizations so that a reconsideration of NRC activities could benefit from the perspective of organizations with a longer, broader, and different experience than the NRC has in the management and organization area. Data collected for this report has provided useful information in designing organization and administration guidelines and assessment procedures for consideration by the NRC.

  14. The Paradoxes of Military Risk Assessment: Will the Enterprise Risk Assessment Model, Composite Risk Management and Associated

    E-Print Network [OSTI]

    Johnson, Chris

    Risk Management and Associated Techniques Provide the Predicted Benefits? Chris. W. Johnson, Glasgow: Johnson@dcs.gla.ac.uk; http://www.dcs.gla.ac.uk/~johnson Keywords: Safety; Composite Risk Management, ERAM, Risk Assessment; Military Systems Engineering. Abstract Risk management provides the most important

  15. Outcomes Assessment and Program Improvement Master of Science in Technology Management

    E-Print Network [OSTI]

    Liberzon, Daniel

    Outcomes Assessment and Program Improvement Master of Science in Technology Management SECTION 1 ­ PAST ASSESSMENT RESULTS The M.S. Technology Management is a new program. The first cohort began in fall conceived Master of Science in Technology Management Program. As part of the campus approval process for new

  16. Handbook of five methodologies for the assessment of load management

    SciTech Connect (OSTI)

    Not Available

    1980-02-01

    This report provides a summary description and evaluation of five methodologies that have been developed for the assessment of utility costs and benefits of load-management programs, including marginal-costing methodologies and an integrated set of utility-system planning and production costing models. Of the two basic methods, the first uses marginal-cost data to compute the cumulative reduction in utility-system costs realized in moving units of load from periods of high marginal cost to periods of low marginal cost. The present value of these cost savings may be compared directly with the costs of implementing the load-management program. The second method relies on an evaluation of future total-system costs. System planning and production-costing models are used to calculate the total fixed and variable costs of meeting baseline and alternative-load configurations. The difference between baseline system costs and the costs with load management may then be compared to the costs of implementing the program. The advantages and disadvantages of each method are summarized briefly.

  17. FLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT MEASURES FOR FLOOD MANAGEMENT SYSTEMS1

    E-Print Network [OSTI]

    Tullos, Desiree

    of information technology, manufacturing, management, and adaptive social-ecological systems. We identify fiveFLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT MEASURES FOR FLOOD MANAGEMENT SYSTEMS1 Kara N. DiFrancesco and Desiree D. Tullos2 ABSTRACT: Discussions

  18. An Assessment of Integrated Health Management (IHM) Frameworks

    SciTech Connect (OSTI)

    N. Lybeck; M. Tawfik; L. Bond; J. Coble

    2012-05-01

    In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging nuclear power plants presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to the better understanding and management of the challenges posed by aging nuclear power plants. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of a NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of a NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

  19. Self-perceptions of volunteer management:: a texas 4-h volunteer needs assessment 

    E-Print Network [OSTI]

    Torock, Jodi Lynn

    2009-05-15

    The purpose of this study was to assess the management of volunteers through self-perceptions of Texas 4-H volunteers. This research was an on-line questionnaire designed to assess volunteers’ attitudes toward recruitment, ...

  20. Waste Management Recommendations in the Texas A&M University Industrial Assessment Center Program 

    E-Print Network [OSTI]

    Eggebrecht, J. A.; Heffington, W. M.

    1996-01-01

    The Texas A&M University Industrial Assessment Center (IAC) was one of the four Energy Analysis & Diagnostic Centers (EADC) that began providing waste management, in addition to energy and demand conservation, assessments ...

  1. A mathematically guided strategy for risk assessment and management.

    SciTech Connect (OSTI)

    Cooper, James Arlin

    2005-03-01

    Strategies for risk assessment and management of high consequence operations are often based on factors such as physical analysis, analysis of software and other logical processing, and analysis of statistically determined human actions. Conventional analysis methods work well for processing objective information. However, in practical situations, much or most of the data available are subjective. Also, there are potential resultant pitfalls where conventional analysis might be unrealistic, such as improperly using event tree and fault tree failure descriptions where failures or events are soft (partial) rather than crisp (binary), neglecting or misinterpreting dependence (positive, negative, correlation), and aggregating nonlinear contributions linearly. There are also personnel issues that transcend basic human factors statistics. For example, sustained productivity and safety in critical operations can depend on the morale of involved personnel. In addition, motivation is significantly influenced by 'latent effects', which are pre-occurring influences. This paper addresses these challenges and proposes techniques for subjective risk analysis, latent effects risk analysis and a hybrid analysis that also includes objective risk analysis. The goal is an improved strategy for risk management.

  2. Final Environmental assessment for the Uranium Lease Management Program

    SciTech Connect (OSTI)

    1995-07-01

    The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

  3. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

  4. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  5. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  6. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  7. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  8. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  9. Environment, safety and health progress assessment of the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Not Available

    1991-11-01

    This report documents the results of the Environment, Safety, and Health (ES&H) Progress Assessment of the Fernald Environmental Management Project (FEMP), Fernald, Ohio, conducted from October 15 through October 25, 1991. The Secretary of Energy directed that small, focused, ES&H Progress Assessments be performed as part of the continuing effort to institutionalize line management accountability and the self-assessment process in the areas of ES&H. The FEMP assessment is the pilot assessment for this new program. The objectives for the FEMP ES&H Progress Assessment were to assess: (1) how the FEMP has progressed since the 1989 Tiger Assessment; (2) how effectively the FEMP has corrected specific deficiencies and associated root causes identified by that team; and (3) whether the current organization, resources, and systems are sufficient to proactively manage ES&H issues.

  10. Assessment of Brine Management for Geologic Carbon Sequestration

    E-Print Network [OSTI]

    Breunig, Hanna M.

    2014-01-01

    water  management  options,  including:  geothermal  energy   extraction,  desalination,  salt  and  mineral   harvesting,  

  11. Utility of geo-informatics for disaster risk management: linking structural damage

    E-Print Network [OSTI]

    Utility of geo-informatics for disaster risk management: linking structural damage assessment) Geoinformatics for disaster risk management (hazard/risk/vulnerability/damage) www.unu-drm.nl Training of disaster risk management (my focus is on post-disaster response/ recovery) Use of object-oriented image

  12. Office of Emergency Management Assessments | Department of Energy

    Office of Environmental Management (EM)

    requiring a quantitative Emergency Planning Hazards Assessment. Works closely with other IEA offices and DOE line organizations to schedule and undertake assessments. Evaluates the...

  13. New Dimensions of Visual Landscape Assessment Wildlands Management for Wildlife Viewing1

    E-Print Network [OSTI]

    Standiford, Richard B.

    preservation and other activities associated with traditional game management. Fortunately, much of the knowledge and techniques developed for game #12;management can be transferred to considerations of wildlifeNew Dimensions of Visual Landscape Assessment Wildlands Management for Wildlife Viewing1 Tamsie

  14. An Open-Source Learning Content Management and Assessment System

    E-Print Network [OSTI]

    and Émerson Cruz Michigan State University #12;Michigan State University · Public university · About 44 module about energy conservation Writes module about momentum conservation Compiles module about communications calendar/scheduling access rights management portfolio space #12;Course Management · Course

  15. A National Assessment of the Intrastructure for Urban Wildlife Management 

    E-Print Network [OSTI]

    Murphy, Michaela Rene

    2014-08-01

    ecosystems. Universities and state wildlife agencies are the main driving forces for research and management, and it is crucial that these institutions provide support for managing wildlife in urban environments. Universities (n = 73) and state wildlife...

  16. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  17. Enterprise Assessments Review of the Pantex Plant Emergency Management...

    Broader source: Energy.gov (indexed) [DOE]

    and contractor line management performance in safety and security and other critical functions as directed by the Secretary of Energy. The EA review program is described in and...

  18. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    management program and provided new ideas for energy efficiency. * By optimizing boiler sequencing, installing waste heat exchangers and an economizer, and de-scaling boiler...

  19. Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Office of Civilian Radioactive Waste Management Fee Adequacy Assessment Report is to present an analysis of the adequacy of the fee being paid by nuclear power utilities...

  20. Environmental management assessment of the Waste Isolation Pilot Plant (WIPP), Carlsbad, New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This document contains the results of the Environmental Management Assessment of the Waste Isolation Pilot Plant (WIPP). This Assessment was conducted by EH-24 from July 19 through July 30, 1993 to advise the Secretary of Energy of the adequacy of management systems established at WIPP to ensure the protection of the environment and compliance with Federal, state, and DOE environmental requirements. The mission of WIPP is to demonstrate the safe disposal of transuranic (TRU) waste. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the management and operating contractors. This assessment revealed that WIPP`s environmental safety and health programs are satisfactory, and that all levels of the Waste Isolation Division (WID) management and staff consistently exhibit a high level of commitment to achieve environmental excellence.

  1. Save Energy Now Assessment Helps Expand Energy Management Program...

    Broader source: Energy.gov (indexed) [DOE]

    Documents & Publications Terra Nitrogen Company, L.P.: Ammonia Plant Greatly Reduces Natural Gas Consumption After Energy Assessment Goodyear Tire Plant Gains Traction on Energy...

  2. Environmental management assessment of the National Institute for Petroleum and Energy Research

    SciTech Connect (OSTI)

    NONE

    1994-08-01

    This report documents the results of the environmental management assessment of the National Institute for Petroleum and Energy Research (NIPER), located in Bartlesville, Oklahoma. The assessment was conducted August 15-26, 1994, by the DOE Office of Environmental Audit (EH-24), located within the Office of Environment, Safety and Health. The assessment included reviews of documents and reports, as well as inspections and observations of selected facilities and operations. Further, the team conducted interviews with management and staff from the Bartlesville Project Office (BPO), the Office of Fossil Energy (FE), the Pittsburgh Energy Technology Center (PETC), state and local regulatory agencies, and BDM Oklahoma (BDM-OK), which is the management and operating (M&O) contractor for NIPER. Because of the transition from a cooperative agreement to an M&O contract in January 1994, the scope of the assessment was to evaluate (1) the effectiveness of BDM-OK management systems being developed and BPO systems in place and under development to address environmental requirements; (2) the status of compliance with DOE Orders, guidance, and directives; and (3) conformance with accepted industry management practices. An environmental management assessment was deemed appropriate at this time in order to identify any systems modifications that would provide enhanced effectiveness of the management systems currently under development.

  3. Manager's Signature Log Privacy Impact Assessment, Office of Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars8-2011. Management's1-25-2013.Manager

  4. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  5. Hanford Site Waste Management Area C Performance Assessment

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation from the 2015 Annual Performance and Risk Assessment (P&RA) Community of Practice (CoP) Technical Exchange Meeting held in Richland, Washington on December 15-16, 2015.

  6. United States Environmental Protection Agency: Use of risk assessment and risk management methodologies. Master's thesis

    SciTech Connect (OSTI)

    Lamuro, R.J.

    1992-09-30

    Make a full investigation of the policy implications and appropriate uses of risk assessment and risk management in regulatory programs under various Federal laws to prevent cancer and other chronic health effects which may result from exposure to hazardous substances. This is the primary mission of the Risk Assessment and Management Commission (Risk Commission). The Clean Air Act Amendments of 1990 (CAAA), created the Risk Commission reflecting Congress' concern over agency use of risk assessment and risk management techniques and methodologies to implement federal laws protective of human health. The Risk Commission is to consider: methods for measuring and describing risks of chronic health effects from hazardous substances; methods to reflect uncertainties associated with estimation techniques, and whether it is possible or desirable to develop a consistent risk assessment methodology or a consistent standard of acceptable risk for various federal programs.

  7. A framework for the assessment of severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E. [ed.; Apostolakis, G.; Dhir, V.K. [California Univ., Los Angeles, CA (United States). Dept. of Mechanical, Aerospace and Nuclear Engineering] [and others

    1993-09-01

    Severe accident management can be defined as the use of existing and/or altemative resources, systems and actors to prevent or mitigate a core-melt accident. For each accident sequence and each combination of severe accident management strategies, there may be several options available to the operator, and each involves phenomenological and operational considerations regarding uncertainty. Operational uncertainties include operator, system and instrumentation behavior during an accident. A framework based on decision trees and influence diagrams has been developed which incorporates such criteria as feasibility, effectiveness, and adverse effects, for evaluating potential severe accident management strategies. The framework is also capable of propagating both data and model uncertainty. It is applied to several potential strategies including PWR cavity flooding, BWR drywell flooding, PWR depressurization and PWR feed and bleed.

  8. Assessment of public perception of radioactive waste management in Korea.

    SciTech Connect (OSTI)

    Trone, Janis R.; Cho, SeongKyung; Whang, Jooho; Lee, Moo Yul

    2011-11-01

    The essential characteristics of the issue of radioactive waste management can be conceptualized as complex, with a variety of facets and uncertainty. These characteristics tend to cause people to perceive the issue of radioactive waste management as a 'risk'. This study was initiated in response to a desire to understand the perceptions of risk that the Korean public holds towards radioactive waste and the relevant policies and policy-making processes. The study further attempts to identify the factors influencing risk perceptions and the relationships between risk perception and social acceptance.

  9. An Open-Source Learning Content Management and Assessment System

    E-Print Network [OSTI]

    .e., GNU General Public License while ($line=) { chomp($line); $line=~s/\\s+$//s; $line=~s/\\"//g; $line o saber: um por todos e todos por um ) #12;Resource Assembly Writes module about energy conservation the material grade book communications calendar/scheduling access rights management portfolio space #12

  10. Construction Management Program Public Information, Outcomes Assessment and Continuing

    E-Print Network [OSTI]

    , Urban Planning, Landscape Architecture and Interior Design. The CM undergraduate major operates within such as a project or field engineer and then advance into project management. Other recent graduates may start in office positions such as a junior estimator or scheduler position. Many companies have planned approaches

  11. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  12. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  13. V-180: IBM Application Manager For Smart Business Multiple Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (GSKit). 8) Multiple vulnerabilities are caused due to a bundled vulnerable version of Java. IMPACT: IBM Application Manager For Smart Business can be exploited by malicious...

  14. Integrating impact assessment and conflict management in urban planning: Experiences from Finland

    SciTech Connect (OSTI)

    Peltonen, Lasse; Sairinen, Rauno

    2010-09-15

    The article examines the interlinkages between recent developments in conflict management and impact assessment procedures in the context of urban planning in Finland. It sets out by introducing the fields of impact assessment and conflict mediation. It then proceeds to discuss the development of impact assessment practices and the status of conflict mediation in Finnish land use planning. The case of Korteniitty infill development plan in Jyvaeskylae is used to demonstrate how the Finnish planning system operates in conflict situations - and how social impact assessment can contribute to managing planning conflicts. The authors ask how the processes of impact assessment contribute to conflict management. Based on the Finnish experience, it is argued that social impact assessment of land use plans can contribute to conflict management, especially in the absence of institutionalised conflict mediation processes. In addition, SIA may acquire features of conflict mediation, depending on extent and intensity of stakeholder participation in the process, and the quality of linkages it between knowledge production and decision-making. Simultaneously, conflict mediation practices and theoretical insights can inform the application of SIA to help it address land use conflicts more consciously.

  15. Chicago Office Manager's Signature Log Privacy Impact Assessment

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And StatisticsProgram ManagerCorridor6Yellowstone National Park6:0.it Easier. | Department

  16. Office of Project Management Oversight & Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvesting inServices » NEPANewsOffice of Project Management

  17. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Broader source: Energy.gov [DOE]

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  18. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  19. Developing and assessing accident management plans for nuclear power plants, Development process and criteria. Volume 1

    SciTech Connect (OSTI)

    Hanson, D.J.; Blackman, H.S.; Meyer, O.R.; Ward, L.W. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1992-08-01

    This document is the first volume of a two-volume NUREG/CR. It describes a four-phase approach for developing criteria that can be used for assessing the adequacy of severe accident management plans for nuclear power plants. The general attributes of accident management plans (Phase 1) are identified, and a process for developing and implementing severe accident management plans (Phase 2) is described. This process is based on a prototype process described in NUREG/CR-5543. The prototype process was revised using results from an evaluation of this process (Phase 3), which is documented in Volume 2. General criteria for assessing the adequacy of accident management plans are also presented (Phase 4). These criteria were based on process specific criteria presented in Volume 2 and NUREG/CR-5543.

  20. Developing and assessing accident management plans for nuclear power plants, Development process and criteria

    SciTech Connect (OSTI)

    Hanson, D.J.; Blackman, H.S.; Meyer, O.R.; Ward, L.W. (Idaho National Engineering Lab., Idaho Falls, ID (United States))

    1992-08-01

    This document is the first volume of a two-volume NUREG/CR. It describes a four-phase approach for developing criteria that can be used for assessing the adequacy of severe accident management plans for nuclear power plants. The general attributes of accident management plans (Phase 1) are identified, and a process for developing and implementing severe accident management plans (Phase 2) is described. This process is based on a prototype process described in NUREG/CR-5543. The prototype process was revised using results from an evaluation of this process (Phase 3), which is documented in Volume 2. General criteria for assessing the adequacy of accident management plans are also presented (Phase 4). These criteria were based on process specific criteria presented in Volume 2 and NUREG/CR-5543.

  1. Natural resource management activities at the Savannah River Site. Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This environmental assessment (EA) reviews the environmental consequences of ongoing natural resource management activities on the Savannah River Site (SRS). Appendix A contains the Natural Resources Management Plant (NRMP). While several SRS organizations have primary responsibilities for different elements of the plan, the United States Department of Agriculture (USDA), Forest Service, Savannah River Forest Station (SRFS) is responsible for most elements. Of the river scenarios defined in 1985, the High-Intensity Management alternative established the upper bound of environmental consequences; it represents a more intense level of resource management than that being performed under current resource management activities. This alternative established compliance mechanisms for several natural resource-related requirements and maximum practical timber harvesting. Similarly, the Low-Intensity Management alternative established the lower bound of environmental consequences and represents a less intense level of resource management than that being performed under current resource management activities. This alternative also established compliance mechanisms, but defined a passively managed natural area. The Proposed Action of this EA describes the current level of multiple-natural resource management. This EA reviews the proposed action, and the high and low intensity alternative scenarios.

  2. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  3. RCRA Assessment Plan for Single-Shell Tank Waste Management Area A-AX at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.; Chou, Charissa J.

    2006-03-03

    This document describes a groundwater assessment plan for the single-shell tank systems in Waste Management Area A-AX at the Hanford Site.

  4. Office of Emergency Management Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity Assessments is responsible

  5. Office of Project Management Oversight & Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity Assessments

  6. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  7. Ann Williamson, Deputy Director, Office of Environmental Assessment Mike Cox, Manager, Risk Assessment Unit, Office of Environmental Assessment

    E-Print Network [OSTI]

    Assessment Unit, Office of Environmental Assessment U.S. Environmental Protection Agency ­ Region 10 Greg to the Northwest Power and Conservation Council on June 11, 2008, to provide an update on EPA's national commitment Report for review. This letter will provide some compelling information from that working draft which we

  8. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment - April 2003

    SciTech Connect (OSTI)

    Irving, J.S.

    2003-04-30

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  9. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  10. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  11. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    management assessments. Management assessment results mustbe documented. WMG management must take prompt action tolegal advice to Laboratory management, periodically conducts

  12. Assessing Patient Case Management Services with Adult Congenital Heart Disease Sensed Data

    E-Print Network [OSTI]

    Roussos, George

    1 Assessing Patient Case Management Services with Adult Congenital Heart Disease Sensed Data · Clinicians: Doctors & Nurses 7 How do Patients use Panaceia-iTV? Follow a treatment plan that includes-iTV Pilot Sites Brompton Hospital, London Adult Congenital Heart Center, Congenital Heart Disease Patients

  13. ASSESSING AND MANAGING SOIL QUALITY FOR URBAN AGRICULTURE IN A DEGRADED VACANT LOT SOIL

    E-Print Network [OSTI]

    (OM) amendments produced from yard wastes and the use of raised beds on soil properties and vegetable wastes can improve soil quality at previously degraded sites and increase crop yields for urban; compost; Soil Management Assessment Framework; vacant land; shrinking cities; soil compaction INTRODUCTION

  14. Vulnerability Assessment for Hood County, TX 

    E-Print Network [OSTI]

    Aldalbahi, Farisal; Cousins, Tiffany; Franks, Kristie; Hamidah, Nur; Herring, Kalen; Kirimli, Ridvan; Rojas, Ricardo Maga; McCharen, Robert; Paiz-Tabash, William; Phillips, Ellen; Thapa, Jeewasmi; Wallick, Andrew; Yan, Wenqian; Zhang, Yixun

    2015-01-01

    Looking forward, we mapped the 100-year and 500-year floodplains in the County. A 100-year floodplain indicates areas that have a 1% chance each year of flooding. The majority of the floodplain follows the Brazos River, as would be expected, and its...

  15. Comments on: Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E

  16. Sandia Energy - Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumniProjectsCyber Engineering Research

  17. Environmental Restoration and Waste Management manpower needs assessment: US Department of Energy complex

    SciTech Connect (OSTI)

    Holmes, C.W.; Lewis, R.E.; Hunt, S.T. (Pacific Northwest Lab., Richland, WA (United States)); Finn, M.G. (Oak Ridge Associated Universities, Inc., TN (United States))

    1992-06-01

    A study was conducted Pacific Northwest Laboratory and Oak Ridge Associated Universities, Inc. to assess the supply and demand for 53 scientific, engineering, and technical occupations relevant to the US Department of Energy's (DOE's) Office of Environmental Restoration and Waste management (EM). These assessments were made by examining budget projections and the input of program/project and human resources managers throughout the DOE complex. Quantitative projections of full-time equivalent employees slots for each occupation have been developed for the 1993--1997 time frame. Qualitative assessments of the factors that affect recruitment, staffing, and retention are also reported. The implications of the study are discussed within the likely skills mix of the future workforce and the education and organization interventions most likely to address the needs of the DOE complex.

  18. Environmental Restoration and Waste Management manpower needs assessment: US Department of Energy complex

    SciTech Connect (OSTI)

    Holmes, C.W.; Lewis, R.E.; Hunt, S.T. [Pacific Northwest Lab., Richland, WA (United States); Finn, M.G. [Oak Ridge Associated Universities, Inc., TN (United States)

    1992-06-01

    A study was conducted Pacific Northwest Laboratory and Oak Ridge Associated Universities, Inc. to assess the supply and demand for 53 scientific, engineering, and technical occupations relevant to the US Department of Energy`s (DOE`s) Office of Environmental Restoration and Waste management (EM). These assessments were made by examining budget projections and the input of program/project and human resources managers throughout the DOE complex. Quantitative projections of full-time equivalent employees slots for each occupation have been developed for the 1993--1997 time frame. Qualitative assessments of the factors that affect recruitment, staffing, and retention are also reported. The implications of the study are discussed within the likely skills mix of the future workforce and the education and organization interventions most likely to address the needs of the DOE complex.

  19. Scientific basis for risk assessment and management of uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1986-01-01

    A National Research Council study panel, convened by the Board on Radioactive Waste Management, has examined the scientific basis for risk assessment and management of uranium mill tailings and issued this final report containing a number of recommendations. Chapter 1 provides a brief introduction to the problem. Chapter 2 examines the processes of uranium extraction and the mechanisms by which radionuclides and toxic chemicals contained in the ore can enter the environment. Chapter 3 is devoted to a review of the evidence on health risks associated with radon and its decay products. Chapter 4 provides a consideration of conventional and possible new technical alternatives for tailings management. Chapter 5 explores a number of issues of comparative risk, provides a brief history of uranium mill tailings regulation, and concludes with a discussion of choices that must be made in mill tailing risk management. 211 refs., 30 figs., 27 tabs.

  20. Kompetanseprosjekt for nringslivet, mal for prosjektbeskrivelse 07.12.2010 Project description AGRA: Aggregated risk assessment and management

    E-Print Network [OSTI]

    Stølen, Ketil

    description AGRA: Aggregated risk assessment and management PART 1: Knowledge needs 1. Knowledge needs Managing risk is so important that in many cases, laws and regulations impose explicit requirements risk picture for the whole organization that is needed by the senior management and expected

  1. LCA-IWM: A decision support tool for sustainability assessment of waste management systems

    SciTech Connect (OSTI)

    Boer, J. den [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)], E-mail: j.denboer@iwar.tu-darmstadt.de; Boer, E. den; Jager, J. [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)

    2007-07-01

    The paper outlines the most significant result of the project 'The use of life cycle assessment tools for the development of integrated waste management strategies for cities and regions with rapid growing economies', which was the development of two decision-support tools: a municipal waste prognostic tool and a waste management system assessment tool. The article focuses on the assessment tool, which supports the adequate decision making in the planning of urban waste management systems by allowing the creation and comparison of different scenarios, considering three basic subsystems: (i) temporary storage; (ii) collection and transport and (iii) treatment, disposal and recycling. The design and analysis options, as well as the assumptions made for each subsystem, are shortly introduced, providing an overview of the applied methodologies and technologies. The sustainability assessment methodology used in the project to support the selection of the most adequate scenario is presented with a brief explanation of the procedures, criteria and indicators applied on the evaluation of each of the three sustainability pillars.

  2. Assessment of External Hazards at Radioactive Waste and Used Fuel Management Facilities - 13505

    SciTech Connect (OSTI)

    Gerchikov, Mark; Schneider, Glenn; Khan, Badi; Alderson, Elizabeth [AMEC NSS, 393 University Ave., Toronto, ON (Canada)] [AMEC NSS, 393 University Ave., Toronto, ON (Canada)

    2013-07-01

    One of the key lessons from the Fukushima accident is the importance of having a comprehensive identification and evaluation of risks posed by external events to nuclear facilities. While the primary focus has been on nuclear power plants, the Canadian nuclear industry has also been updating hazard assessments for radioactive waste and used fuel management facilities to ensure that lessons learnt from Fukushima are addressed. External events are events that originate either physically outside the nuclear site or outside its control. They include natural events, such as high winds, lightning, earthquakes or flood due to extreme rainfall. The approaches that have been applied to the identification and assessment of external hazards in Canada are presented and analyzed. Specific aspects and considerations concerning hazards posed to radioactive waste and used fuel management operations are identified. Relevant hazard identification techniques are described, which draw upon available regulatory guidance and standard assessment techniques such as Hazard and Operability Studies (HAZOPs) and 'What-if' analysis. Consideration is given to ensuring that hazard combinations (for example: high winds and flooding due to rainfall) are properly taken into account. Approaches that can be used to screen out external hazards, through a combination of frequency and impact assessments, are summarized. For those hazards that cannot be screened out, a brief overview of methods that can be used to conduct more detailed hazard assessments is also provided. The lessons learnt from the Fukushima accident have had a significant impact on specific aspects of the approaches used to hazard assessment for waste management. Practical examples of the effect of these impacts are provided. (authors)

  3. Use of probabilistic risk assessment (PRA) in expert systems to advise nuclear plant operators and managers

    SciTech Connect (OSTI)

    Uhrig, R.E.

    1988-01-01

    The use of expert systems in nuclear power plants to provide advice to managers, supervisors and/or operators is a concept that is rapidly gaining acceptance. Generally, expert systems rely on the expertise of human experts or knowledge that has been modified in publications, books, or regulations to provide advice under a wide variety of conditions. In this work, a probabilistic risk assessment (PRA)/sup 3/ of a nuclear power plant performed previously is used to assess the safety status of nuclear power plants and to make recommendations to the plant personnel. 5 refs., 1 fig., 2 tabs.

  4. An assessment of potential for benefit from integrating geographic information systems technology into life-cycle management of infrastructures a focus for infrastructure management practice 

    E-Print Network [OSTI]

    Millegan, Harold Lynn

    1997-01-01

    AN ASSESSMENT OF POTE~ FOR BENEFIT FROM INTEGRATING GEOGRAPHIC INFORMATION SYSTEMS TECHNOLOGY INTO LIFE-CYCLE MANAGEMENT OF INFRASTRUCTURES A FOCUS FOR INFRASTRUCTURE MANAGEMENT PRACTICE A Thesis HAROLD LYNN MILLEGAN Submitted to the OIIIce.... Congress, Office of Technology Assessment 1991), This technology is not presently used to its potential and should be used more extensively by civil engineers. A proper focus is needed to integrate this spatially oriented technology to life-cycle...

  5. Waste management project's alternatives: A risk-based multi-criteria assessment (RBMCA) approach

    SciTech Connect (OSTI)

    Karmperis, Athanasios C.; Sotirchos, Anastasios; Aravossis, Konstantinos; Tatsiopoulos, Ilias P.

    2012-01-15

    Highlights: Black-Right-Pointing-Pointer We examine the evaluation of a waste management project's alternatives. Black-Right-Pointing-Pointer We present a novel risk-based multi-criteria assessment (RBMCA) approach. Black-Right-Pointing-Pointer In the RBMCA the evaluation criteria are based on the quantitative risk analysis of the project's alternatives. Black-Right-Pointing-Pointer Correlation between the criteria weight values and the decision makers' risk preferences is examined. Black-Right-Pointing-Pointer Preference to the multi-criteria against the one-criterion evaluation process is discussed. - Abstract: This paper examines the evaluation of a waste management project's alternatives through a quantitative risk analysis. Cost benefit analysis is a widely used method, in which the investments are mainly assessed through the calculation of their evaluation indicators, namely benefit/cost (B/C) ratios, as well as the quantification of their financial, technical, environmental and social risks. Herein, a novel approach in the form of risk-based multi-criteria assessment (RBMCA) is introduced, which can be used by decision makers, in order to select the optimum alternative of a waste management project. Specifically, decision makers use multiple criteria, which are based on the cumulative probability distribution functions of the alternatives' B/C ratios. The RBMCA system is used for the evaluation of a waste incineration project's alternatives, where the correlation between the criteria weight values and the decision makers' risk preferences is analyzed and useful conclusions are discussed.

  6. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  7. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  8. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

  9. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

  10. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  11. Integrated farm sustainability assessment for the environmental management of rural activities

    SciTech Connect (OSTI)

    Stachetii Rodrigues, Geraldo, E-mail: stacheti@cnpma.embrapa.b [Embrapa Labex Europe, Agropolis International, Avenue Agropolis, 34394, Montpellier (France); Aparecida Rodrigues, Izilda, E-mail: isis@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Almeida Buschinelli, Claudio Cesar de, E-mail: buschi@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Barros, Inacio de, E-mail: indebarros@antilles.inra.f [INRA, Unite de Recherche Agropedoclimatique da la Zone Caraibe, Domaine Duclos, 97170 Petit-Bourg (France)

    2010-07-15

    Farmers have been increasingly called upon to respond to an ongoing redefinition in consumers' demands, having as a converging theme the search for sustainable production practices. In order to satisfy this objective, instruments for the environmental management of agricultural activities have been sought out. Environmental impact assessment methods are appropriate tools to address the choice of technologies and management practices to minimize negative effects of agricultural development, while maximizing productive efficiency, sound usage of natural resources, conservation of ecological assets and equitable access to wealth generation means. The 'system for weighted environmental impact assessment of rural activities' (APOIA-NovoRural) presented in this paper is organized to provide integrated farm sustainability assessment according to quantitative environmental standards and defined socio-economic benchmarks. The system integrates sixty-two objective indicators in five sustainability dimensions - (i) Landscape ecology, (ii) Environmental quality (atmosphere, water and soil), (iii) Sociocultural values, (iv) Economic values, and (v) Management and administration. Impact indices are expressed in three integration levels: (i) specific indicators, that offer a diagnostic and managerial tool for farmers and rural administrators, by pointing out particular attributes of the rural activities that may be failing to comply with defined environmental performance objectives; (ii) integrated sustainability dimensions, that show decision-makers the major contributions of the rural activities toward local sustainable development, facilitating the definition of control actions and promotion measures; and (iii) aggregated sustainability index, that can be considered a yardstick for eco-certification purposes. Nine fully documented case studies carried out with the APOIA-NovoRural system, focusing on different scales, diverse rural activities/farming systems, and contrasting spatial/territorial contexts, attest to the malleability of the method and its applicability as an integrated farm environmental management tool.

  12. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  13. The Dempster-Schafer Theory of Belief Functions for Managing Uncertainties: An Introduction and Fraud Risk Assessment Illustration

    E-Print Network [OSTI]

    Srivastava, Rajendra P.; Mock, Theodore J.; Gao, Lei

    2011-01-01

    fraud risk assessment formula for a simplified version of a model developed by Srivastava, Mock, and Turner (2007). In our formulation, fraud risk is the normalized product of four risks: risk that management has incentives to commit fraud, risk...

  14. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  15. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  16. RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY

    SciTech Connect (OSTI)

    Horton, Duane G.

    2007-03-26

    WMA TX-TY contains underground, single-shell tanks that were used to store liquid waste that contained chemicals and radionuclides. Most of the liquid has been removed, and the remaining waste is regulated under the RCRA as modi¬fied in 40 CFR Part 265, Subpart F and Washington State’s Hazardous Waste Management Act . WMA TX-TY was placed in assessment monitoring in 1993 because of elevated specific conductance. A groundwater quality assessment plan was written in 1993 describing the monitoring activities to be used in deciding whether WMA TX-TY had affected groundwater. That plan was updated in 2001 for continued RCRA groundwater quality assessment as required by 40 CFR 265.93 (d)(7). This document further updates the assessment plan for WMA TX-TY by including (1) information obtained from ten new wells installed at the WMA after 1999 and (2) information from routine quarterly groundwater monitoring during the last five years. Also, this plan describes activities for continuing the groundwater assessment at WMA TX TY.

  17. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  18. Developing and assessing accident management plans for nuclear power plants. Evaluation of a prototype process: Volume 2

    SciTech Connect (OSTI)

    Hanson, D.J.; Johnson, S.P.; Blackman, H.S.; Stewart, M.A. [EG and G Idaho, Inc., Idaho Falls, ID (United States)

    1992-07-01

    This document is the second of a two-volume NUREG/CR that discusses development of accident management plans for nuclear power plants. The first volume (a) describes a four-phase approach for developing criteria that could be used for assessing the adequacy of accident management plans, (b) identifies the general attributes of accident management plans (Phase 1), (c) presents a prototype process for developing and implementing severe accident management plans (Phase 2), and (d) presents criteria that can be used to assess the adequacy of accident management plans. This volume (a) describes results from an evaluation of the capabilities of the prototype process to produce an accident management plan (Phase 3) and (b), based on these results and preliminary criteria included in NUREG/CR-5543, presents modifications to the criteria where appropriate.

  19. Alchemy to reason: Effective use of Cumulative Effects Assessment in resource management

    SciTech Connect (OSTI)

    Hegmann, George, E-mail: george.hegmann@stantec.com [Principal, Environmental Management, Stantec Consulting Ltd., 805 - 8th Avenue SW Suite 300, Calgary, Alberta, T2P 1H7 (Canada); Yarranton, G.A., E-mail: yarran@shaw.ca [121 Artists View Way, Calgary, Alberta, T3Z 3N1 (Canada)

    2011-09-15

    Cumulative Effects Assessment (CEA) is a tool that can be useful in making decisions about natural resource management and allocation. The decisions to be made include those (i) necessary to construct planning and regulatory frameworks to control development activity so that societal goals will be achieved and (ii) whether or not to approve individual development projects, with or without conditions. The evolution of CEA into a more successful tool cannot occur independently of the evolution of decision making processes. Currently progress is painfully slow on both fronts. This paper explores some opportunities to accelerate improvements in decision making in natural resource management and in the utility of CEA as a tool to assist in making such decisions. The focus of the paper is on how to define the public interest by determining what is acceptable.

  20. Baseline Risk Assessment Supporting Closure at Waste Management Area C at the Hanford Site Washington - 15332

    SciTech Connect (OSTI)

    Singleton, Kristin M.

    2015-01-07

    The Office of River Protection under the U.S. Department of Energy is pursuing closure of the Single-Shell Tank (SST) Waste Management Area (WMA) C under the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO). A baseline risk assessment (BRA) of current conditions is based on available characterization data and information collected at WMA C. The baseline risk assessment is being developed as a part of a Resource Conservation and Recovery Act (RCRA) Facility Investigation (RFI)/Corrective Measures Study (CMS) at WMA C that is mandatory under Comprehensive Environmental Response, Compensation, and Liability Act and RCRA corrective action. The RFI/CMS is needed to identify and evaluate the hazardous chemical and radiological contamination in the vadose zone from past releases of waste from WMA C. WMA C will be under Federal ownership and control for the foreseeable future, and managed as an industrial area with restricted access and various institutional controls. The exposure scenarios evaluated under these conditions include Model Toxics Control Act (MTCA) Method C, industrial worker, maintenance and surveillance worker, construction worker, and trespasser scenarios. The BRA evaluates several unrestricted land use scenarios (residential all-pathway, MTCA Method B, and Tribal) to provide additional information for risk management. Analytical results from 13 shallow zone (0 to 15 ft. below ground surface) sampling locations were collected to evaluate human health impacts at WMA C. In addition, soil analytical data were screened against background concentrations and ecological soil screening levels to determine if soil concentrations have the potential to adversely affect ecological receptors. Analytical data from 12 groundwater monitoring wells were evaluated between 2004 and 2013. A screening of groundwater monitoring data against background concentrations and Federal maximum concentration levels was used to determine vadose zone contamination impacts on groundwater. Waste Management Area C is the first of the Hanford tank farms to begin the closure planning process. The current baseline risk assessment will provide valuable information for making corrective actions and closure decisions for WMA C, and will also support the planning for future tank farm soil investigation and baseline risk assessments.

  1. Assessment of national systems for obtaining local acceptance of waste management siting and routing activities

    SciTech Connect (OSTI)

    Paige, H.W.; Lipman, D.S.; Owens, J.E.

    1980-07-01

    There is a rich mixture of formal and informal approaches being used in our sister nuclear democracies in their attempts to deal with the difficulties of obtaining local acceptance for siting of waste management facilities and activities. Some of these are meeting with a degree of success not yet achieved in the US. Although this survey documents and assesses many of these approaches, time did not permit addressing in any detail their relevance to common problems in the US. It would appear the US could benefit from a periodic review of the successes and failures of these efforts, including analysis of their applicability to the US system. Of those countries (Germany, Sweden, Switzerland, Japan, Belgium, and the US) who are working to a time table for the preparation of a high-level waste (HLW) repository, Germany is the only country to have gained local siting acceptance for theirs. With this (the most difficult of siting problems) behind them they appear to be in the best overall condition relative to waste management progress and plans. This has been achieved without a particularly favorable political structure, made up for by determination on the part of the political leadership. Of the remaining three countries studied (France, UK and Canada) France, with its AVM production facility, is clearly the world leader in the HLW immobilization aspect of waste management. France, Belgium and the UK appear to have the least favorable political structures and environments for arriving at waste management decisions. US, Switzerland and Canada appear to have the least favorable political structures and environments for arriving at waste management decisions.

  2. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  3. Frey, H.C., and B. Hubbell, "A Risk-based Assessment And Management Framework For Multipollutant Air Quality," Paper 2009-A-235-AWMA, Proceedings, 102nd Annual Conference and Exhibition, Air & Waste Management Association, Detroit,

    E-Print Network [OSTI]

    Frey, H. Christopher

    Frey, H.C., and B. Hubbell, "A Risk-based Assessment And Management Framework For Multipollutant Air Quality," Paper 2009-A-235-AWMA, Proceedings, 102nd Annual Conference and Exhibition, Air & Waste Management Association, Detroit, Michigan, June 16-19, 2009. A Risk-based Assessment And Management Framework

  4. MANAGEMENT OF RESEARCH AND TEST REACTOR ALUMINUM SPENT NUCLEAR FUEL - A TECHNOLOGY ASSESSMENT

    SciTech Connect (OSTI)

    Vinson, D.

    2010-07-11

    The Department of Energy's Environmental Management (DOE-EM) Program is responsible for the receipt and storage of aluminum research reactor spent nuclear fuel or used fuel until ultimate disposition. Aluminum research reactor used fuel is currently being stored or is anticipated to be returned to the U.S. and stored at DOE-EM storage facilities at the Savannah River Site and the Idaho Nuclear Technology and Engineering Center. This paper assesses the technologies and the options for safe transportation/receipt and interim storage of aluminum research reactor spent fuel and reviews the comprehensive strategy for its management. The U.S. Department of Energy uses the Appendix A, Spent Nuclear Fuel Acceptance Criteria, to identify the physical, chemical, and isotopic characteristics of spent nuclear fuel to be returned to the United States under the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program. The fuel is further evaluated for acceptance through assessments of the fuel at the foreign sites that include corrosion damage and handleability. Transport involves use of commercial shipping casks with defined leakage rates that can provide containment of the fuel, some of which are breached. Options for safe storage include wet storage and dry storage. Both options must fully address potential degradation of the aluminum during the storage period. This paper focuses on the various options for safe transport and storage with respect to technology maturity and application.

  5. Identification and initial assessment of candidate BWR late-phase in-vessel accident management strategies

    SciTech Connect (OSTI)

    Hodge, S.A.

    1991-04-15

    Work sponsored by the United States Nuclear Regulatory Commission (USNRC) to identify and perform preliminary assessments of candidate BWR (boiling water reactor) in-vessel accident management strategies was completed at Oak Ridge National Laboratory (ORNL) during fiscal year 1990. Mitigative strategies for containment events have been the subject of a companion study at Brookhaven National Laboratory. The focus of this Oak Ridge effort was the development of new strategies for mitigation of the late phase events, that is, the events that would occur in-vessel after the onset of significant core damage. The work began with an investigation of the current status of BWR in-vessel accident management procedures and proceeded through a preliminary evaluation of several candidate new strategies. The steps leading to the identification of the candidate strategies are described. The four new candidate late-phase (in-vessel) accident mitigation strategies identified by this study and discussed in the report are: (1) keep the reactor vessel depressurized; (2) restore injection in a controlled manner; (3) inject boron if control blade damage has occurred; and (4) containment flooding to maintain core and structural debris in-vessel. Additional assessments of these strategies are proposed.

  6. Management assessment of tank waste remediation system contractor readiness to proceed with phase 1B privatization

    SciTech Connect (OSTI)

    Honeyman, J.O.

    1998-01-09

    This Management Assessment of Tank Waste Remediation System (TWRS) Contractor Readiness to Proceed With Phase 1B Privatization documents the processes used to determine readiness to proceed with tank waste treatment technologies from private industry, now known as TWRS privatization. An overall systems approach was applied to develop action plans to support the retrieval and disposal mission of the TWRS Project. The systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. Since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farms organizational structure and configurations, work scope, and costs has become part of the culture within the TWRS Project. An analysis of the programmatic, management, and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, personnel, and hardware will be on-line and ready to support the private contractors. The systems approach included defining the retrieval and disposal mission requirements and evaluating the readiness of the Project Hanford Management Contract (PHMC) team to support initiation of waste processing by the private contractors in June 2002 and to receive immobilized waste shortly thereafter. The Phase 1 feed delivery requirements from the private contractor Requests for Proposal were reviewed. Transfer piping routes were mapped, existing systems were evaluated, and upgrade requirements were defined.

  7. Hawaii demand-side management resource assessment. Final report: DSM opportunity report

    SciTech Connect (OSTI)

    1995-08-01

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. 10 figs., 55 tabs.

  8. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01

    Conditions in a Project." Risk Management: An Internationalan Approach to Risk Management. ” J. of Hazardous Materials,URS). (2009a). “Delta risk management strategy, Phase 1:

  9. Identification and assessment of containment and release management strategies for a BWR Mark I containment

    SciTech Connect (OSTI)

    Lin, C.C.; Lehner, J.R. (Brookhaven National Lab., Upton, NY (United States))

    1991-09-01

    This report identifies and assesses accident management strategies which could be important for preventing containment failure and/or mitigating the release of fission products during a severe accident in a BWR plant with a Mark 1 type of containment. Based on information available from probabilistic risk assessments and other existing severe accident research, and using simplified containment and release event trees, the report identifies the challenges a Mark 1 containment could face during the course of a severe accident, the mechanisms behind these challenges, and the strategies that could be used to mitigate the challenges. A safety objective tree is developed which provides the connection between the safety objectives, the safety functions, the challenges, and the strategies. The strategies were assessed by applying them to certain severe accident sequence categories which have one or more of the following characteristics: have high probability of core damage or high consequences, lead to a number of challenges, and involve the failure of multiple systems. 59 refs., 55 figs., 27 tabs.

  10. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  11. Management Challenges in Developing Performance Assessments and Effectively Communicating Their Results - 13612

    SciTech Connect (OSTI)

    Thomas, Steve; Mahoney, Mark [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)] [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)

    2013-07-01

    The end of the Cold War has left a legacy of approximately 37 million gallons of radioactive waste in the aging waste tanks at the Department of Energy's Savannah River Site (SRS). A robust program is in place to remove waste from these tanks, treat the waste to separate into a relatively small volume of high level waste and a large volume of low-level waste, and to actively dispose of the low-level waste on-site and close the cleaned waste tanks and associated ancillary structures. To support performance-based, risk-informed decision making, performance assessments have been developed for the low-level waste disposal facility and for the SRS Tank Farms. Although these performance assessments share many similar features, the nature of the hazards and associated containments differ. As a management team, we are challenged to effectively communicate both the similarities and differences of these performance assessments, how they should be used to support sound decision making for treatment, disposal and waste tank cleaning decisions, and in defending their respective assumptions to the regulatory community and the public but, equally important, to our own corporate decision makers and operations personnel. Effective development and defense of these performance assessments, and effective interpretation and communication of the results are key to making cost-effective, pragmatic decisions for the safe disposal of the low-level waste and stabilization and operational closure of the cleaned tanks and associated structures. This paper will focus on the importance and challenges in communicating key attributes, conclusions and operational implications within a company. (authors)

  12. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  13. U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities PLATFORM: IBM Tivoli Provisioning Manager Express for Software Distribution 4.x ABSTRACT:...

  14. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessment Methods for SCADA Security Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  15. Radioactive Waste Management Complex low-level waste radiological performance assessment

    SciTech Connect (OSTI)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  16. Use of Comprehensive Utility Software for Optimal Energy Management and Electric Grid Failure Assessment in an Oil Refinery 

    E-Print Network [OSTI]

    Bedard, S.; Hammache, A.; Poulin, B.; Ayotte-Sauve, A.

    2015-01-01

    software for optimal energy management and electric grid failure assessment in an oil refinery New Orleans – IETC Conference June 3, 2015 Serge Bédard M. Eng. Senior Project Manager CanmetENERGY - Industrial Optimization Systems ESL-IE-15...-06-18 Proceedings of the Thrity-Seventh Industrial Energy Technology Conference New Orleans, LA. June 2-4, 2015 ? Who is CanmetENERGY ? Project objectives ? Description of the refinery ? COGEN software ? Modeling strategy ? Energy saving projects ? Savings...

  17. Assessment of medical waste management at a primary health-care center in Sao Paulo, Brazil

    SciTech Connect (OSTI)

    Moreira, A.M.M.; Guenther, W.M.R.

    2013-01-15

    Highlights: Black-Right-Pointing-Pointer Assessment of medical waste management at health-care center before/after intervention. Black-Right-Pointing-Pointer Qualitative and quantitative results of medical waste management plan are presented. Black-Right-Pointing-Pointer Adjustments to comply with regulation were adopted and reduction of waste was observed. Black-Right-Pointing-Pointer The method applied could be useful for similar establishments. - Abstract: According to the Brazilian law, implementation of a Medical Waste Management Plan (MWMP) in health-care units is mandatory, but as far as we know evaluation of such implementation has not taken place yet. The purpose of the present study is to evaluate the improvements deriving from the implementation of a MWMP in a Primary Health-care Center (PHC) located in the city of Sao Paulo, Brazil. The method proposed for evaluation compares the first situation prevailing at this PHC with the situation 1 year after implementation of the MWMP, thus allowing verification of the evolution of the PHC performance. For prior and post-diagnosis, the method was based on: (1) application of a tool (check list) which considered all legal requirements in force; (2) quantification of solid waste subdivided into three categories: infectious waste and sharp devices, recyclable materials and non-recyclable waste; and (3) identification of non-conformity practices. Lack of knowledge on the pertinent legislation by health workers has contributed to non-conformity instances. The legal requirements in force in Brazil today gave origin to a tool (check list) which was utilized in the management of medical waste at the health-care unit studied. This tool resulted into an adequate and simple instrument, required a low investment, allowed collecting data to feed indicators and also conquered the participation of the unit whole staff. Several non-conformities identified in the first diagnosis could be corrected by the instrument utilized. Total waste generation increased 9.8%, but it was possible to reduce the volume of non-recyclable materials (11%) and increase the volume of recyclable materials (4%). It was also possible to segregate organic waste (7%), which was forwarded for production of compost. The rate of infectious waste generation in critical areas decreased from 0.021 to 0.018 kg/procedure. Many improvements have been observed, and now the PHC complies with most of legal requirements, offers periodic training and better biosafety conditions to workers, has reduced the volume of waste sent to sanitary landfills, and has introduced indicators for monitoring its own performance. This evaluation method might subsidize the creation and evaluation of medical waste management plans in similar heath institutions.

  18. Pollution prevention opportunity assessment for the SNL/California waste management facilities

    SciTech Connect (OSTI)

    Braye, S.; Phillips, N.M.

    1995-01-01

    SNL/California`s waste management facilities, Bldgs. 961 and 962-2, generate a secondary stream of hazardous and radioactive waste. This waste stream is generated mainly during the processing and handling of hazardous, radioactive, and mixed wastes (primary waste stream), which are generated by the laboratories, and when cleaning up spills. The secondary waste stream begins with the removal of a generator`s hazardous, radioactive, and mixed waste from specified collection areas. The waste stream ends when the containers of processed waste are loaded for shipment off-site. The total amount of secondary hazardous waste generated in the waste management facilities from January 1993 to July 1994 was 1,160.6 kg. The total amount of secondary radioactive waste generated during the same period was 1,528.8 kg (with an activity of 0.070 mCi). Mixed waste usually is not generated in the secondary waste stream. This pollution prevention opportunity assessment (PPOA) was conducted using the graded approach methodology developed by the Department of Energy (DOE) PPOA task group. The original method was modified to accommodate the needs of Sandia`s site-specific processes. The options generated for potential hazardous waste minimization, cost savings, and environmental health and safety were the result of a waste minimization team effort. The results of the team efforts are summarized.

  19. Assessment of thermal analysis software for the DOE Office of Civilian Radioactive Waste Management

    SciTech Connect (OSTI)

    Williams, P.T.; Graham, R.F.; Lagerberg, G.N.; Chung, T.C.

    1989-07-01

    This assessment uses several recent assessments and the more general code compilations that have been completed to produce a list of 116 codes that can be used for thermal analysis. This list is then compared with criteria prepared especially for the Department of Energy Office of Civilian Radioactive Waste Management (DOE/OCRWM). Based on these criteria, fifteen codes are narrowed to three primary codes and four secondary codes for use by the OCRWM thermal analyst. The analyst is cautioned that since no single code is sufficient for all applications, a code must be selected based upon the predominate heat transfer mode of the problem to be solved, but the codes suggested in this report have been used successfully for a range of OCRWM applications. The report concludes with a series of recommendations for additional work of which the major points include the following: The codes suggested by this report must be benchmarked with the existing US and international problems and validated when possible; An interactive code selection tool could be developed or, perhaps even more useful, a users group could be supported to ensure the proper selection of thermal codes and dissemination of information on the latest version; The status of the 116 codes identified by this report should be verified, and methods for maintaining the still active codes must be established; and special capabilities of each code in phase change, convection and radiation should be improved to better enable the thermal analyst to model OCRWM applications. 37 refs., 3 figs., 12 tabs.

  20. One size fits all? An assessment tool for solid waste management at local and national levels

    SciTech Connect (OSTI)

    Broitman, Dani; Ayalon, Ofira; Kan, Iddo

    2012-10-15

    Highlights: Black-Right-Pointing-Pointer Waste management schemes are generally implemented at national or regional level. Black-Right-Pointing-Pointer Local conditions characteristics and constraints are often neglected. Black-Right-Pointing-Pointer We developed an economic model able to compare multi-level waste management options. Black-Right-Pointing-Pointer A detailed test case with real economic data and a best-fit scenario is described. Black-Right-Pointing-Pointer Most efficient schemes combine clear National directives with local level flexibility. - Abstract: As environmental awareness rises, integrated solid waste management (WM) schemes are increasingly being implemented all over the world. The different WM schemes usually address issues such as landfilling restrictions (mainly due to methane emissions and competing land use), packaging directives and compulsory recycling goals. These schemes are, in general, designed at a national or regional level, whereas local conditions and constraints are sometimes neglected. When national WM top-down policies, in addition to setting goals, also dictate the methods by which they are to be achieved, local authorities lose their freedom to optimize their operational WM schemes according to their specific characteristics. There are a myriad of implementation options at the local level, and by carrying out a bottom-up approach the overall national WM system will be optimal on economic and environmental scales. This paper presents a model for optimizing waste strategies at a local level and evaluates this effect at a national level. This is achieved by using a waste assessment model which enables us to compare both the economic viability of several WM options at the local (single municipal authority) level, and aggregated results for regional or national levels. A test case based on various WM approaches in Israel (several implementations of mixed and separated waste) shows that local characteristics significantly influence WM costs, and therefore the optimal scheme is one under which each local authority is able to implement its best-fitting mechanism, given that national guidelines are kept. The main result is that strict national/regional WM policies may be less efficient, unless some type of local flexibility is implemented. Our model is designed both for top-down and bottom-up assessment, and can be easily adapted for a wide range of WM option comparisons at different levels.

  1. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    SciTech Connect (OSTI)

    NSTec Radioactive Waste

    2010-10-12

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

  2. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  3. Vulnerable Strong Farm Finance Scorecard

    E-Print Network [OSTI]

    risk and borrowing capacity of the business. 9. Rate of return on farm equity - represents the interest farm income - represents return to 3 things, · Your labor, · Your management and · Your equity, that you have invested in the business. It is the reward for investing your unpaid family labor, management

  4. Evaluating self-reported pressure ulcer prevention measures in persons with1 spinal cord injury using the revised Skin Management Needs Assessment2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    using the revised Skin Management Needs Assessment2 Checklist : reliability study3 Gélis Anthony, MD 1, Centre Hospitalier Universitaire de20 Bordeaux, France21 22 Corresponding author:23 Dr. Anthony GELIS, M: to translate, evaluate the reliability and cross-culturally adapt the Skin2 Management Needs Assessment

  5. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  7. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  8. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  9. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  10. Burlington Bottoms Wildlife Mitigation Project. Final Environmental Assessment/Management Plan and Finding of No Significant Impact.

    SciTech Connect (OSTI)

    Not Available

    1994-12-01

    Bonneville Power Administration (BPA) proposes to fund wildlife management and enhancement activities for the Burlington bottoms wetlands mitigation site. Acquired by BPA in 1991, wildlife habitat at Burlington bottoms would contribute toward the goal of mitigation for wildlife losses and inundation of wildlife habitat due to the construction of Federal dams in the lower Columbia and Willamette River Basins. Target wildlife species identified for mitigation purposes are yellow warbler, great blue heron, black-capped chickadee, red-tailed hawk, valley quail, spotted sandpiper, wood duck, and beaver. The Draft Management Plan/Environmental Assessment (EA) describes alternatives for managing the Burlington Bottoms area, and evaluates the potential environmental impacts of the alternatives. Included in the Draft Management Plan/EA is an implementation schedule, and a monitoring and evaluation program, both of which are subject to further review pending determination of final ownership of the Burlington Bottoms property.

  11. Environmental assessment for the Radioactive and Mixed Waste Management Facility: Sandia National Laboratories/New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-06-01

    The Department of Energy (DOE) has prepared an environmental assessment (EA) (DOE/EA-0466) under the National Environmental Policy Act (NEPA) of 1969 for the proposed completion of construction and subsequent operation of a central Radioactive and Mixed Waste Management Facility (RMWMF), in the southeastern portion of Technical Area III at Sandia National Laboratory, Albuquerque (SNLA). The RMWMF is designed to receive, store, characterize, conduct limited bench-scale treatment of, repackage, and certify low-level waste (LLW) and mixed waste (MW) (as necessary) for shipment to an offsite disposal or treatment facility. The RMWMF was partially constructed in 1989. Due to changing regulatory requirements, planned facility upgrades would be undertaken as part of the proposed action. These upgrades would include paving of road surfaces and work areas, installation of pumping equipment and lines for surface impoundment, and design and construction of air locks and truck decontamination and water treatment systems. The proposed action also includes an adjacent corrosive and reactive metals storage area, and associated roads and paving. LLW and MW generated at SNLA would be transported from the technical areas to the RMWMF in containers approved by the Department of Transportation. The RMWMF would not handle nonradioactive hazardous waste. Based on the analysis in the EA, the proposed completion of construction and operation of the RMWMF does not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of NEPA. Therefore, preparation of an environmental impact statement for the proposed action is not required.

  12. Pilot study risk assessment for selected problems at the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Hamilton, L.D.; Meinhold, A.F.; Baxter, S.L.; Holtzman, S.; Morris, S.C.; Pardi, R.; Rowe, M.D.; Sun, C. [Brookhaven National Lab., Upton, NY (United States); Anspaugh, L.; Layton, D. [Lawrence Livermore National Lab., CA (United States)

    1993-03-01

    Two important environmental problems at the USDOE Fernald Environmental Management Project (FEMP) facility in Fernald, Ohio were studied in this human health risk assessment. The problems studied were radon emissions from the K-65 waste silos, and offsite contamination of ground water with uranium. Waste from the processing of pitchblende ore is stored in the K-65 silos at the FEMP. Radium-226 in the waste decays to radon gas which escapes to the outside atmosphere. The concern is for an increase in lung cancer risk for nearby residents associated with radon exposure. Monitoring data and a gaussian plume transport model were used to develop a source term and predict exposure and risk to fenceline residents, residents within 1 and 5 miles of the silos, and residents of Hamilton and Cincinnati, Ohio. Two release scenarios were studied: the routine release of radon from the silos and an accidental loss of one silo dome integrity. Exposure parameters and risk factors were described as distributions. Risks associated with natural background radon concentrations were also estimated.

  13. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  14. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  15. Petroleum Resource Management and Assessment project for the Western Siberian Administration Russia. TDA feasibility study. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1993-01-01

    The objective of the study is: (1) To determine the nature and availability of the information necessary for Resource Assessment in oil fields to be open to foreign investment; (2) To determine what resources are required to implement the 'Alberta Model' of Resource Management in Siberia; (3) To establish a pilot Data Collection and Information System, including software, hardware and technology; (4) To indicate whether the studied database model and related software can meet Russia's long term requirements for information management in the petroleum sector; (5) The transfer of information techniques to the Russian implementation teams; and (6) To define the requirements for a resource/economic study.

  16. TOWARDS SUSTAINABLE LAND MANAGEMENT IN THE DRYLANDS: SCIENTIFIC CONNECTIONS IN MONITORING AND ASSESSING DRYLAND

    E-Print Network [OSTI]

    Lehmann, Johannes

    ; Accepted 29 November 2010 ABSTRACT The United Nations Convention to Combat Desertification and its sister in land management undertaken to address dryland degradation and desertification can simultaneously reduce words: resilience; sustainable land management; desertification; land degradation; climate change

  17. Cedar River, Cedar Rapids, Iowa Flood Risk Management Feasibility Study Report with Integrated Environmental Assessment

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Cedar River, Cedar Rapids, Iowa Flood Risk Management Feasibility Study Report with Integrated for the Public Review Draft of the Cedar River, Cedar Rapids, Iowa Flood Risk Management Feasibility Study of Engineers (USACE) has developed a plan for the flood risk management for the Cedar River, Cedar Rapids, Iowa

  18. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K.; Peters, Scott

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  19. Hawaii demand-side management resource assessment. Final report, Reference Volume 1: Building prototype analysis

    SciTech Connect (OSTI)

    1995-04-01

    This report provides a detailed description of, and the baseline assumptions and simulation results for, the building prototype simulations conducted for the building types designated in the Work Plan for Demand-side Management Assessment of Hawaii`s Demand-Side Resources (HES-4, Phase 2). This report represents the second revision to the initial building prototype description report provided to DBEDT early in the project. Modifications and revisions to the prototypes, based on further calibration efforts and on comments received from DBEDT Staff have been incorporated into this final version. These baseline prototypes form the basis upon which the DSM measure impact estimates and the DSM measure data base were developed for this project. This report presents detailed information for each of the 17 different building prototypes developed for use with the DOE-21E program (23 buildings in total, including resorts and hotels defined separately for each island) to estimate the impact of the building technologies and measures included in this project. The remainder of this section presents some nomenclature and terminology utilized in the reports, tables, and data bases developed from this project to denote building type and vintage. Section 2 contains a more detailed discussion of the data sources, the definition of the residential sector building prototypes, and results of the DOE-2 analysis. Section 3 provides a similar discussion for the commercial sector. The prototype and baseline simulation results are presented in a separate section for each building type. Where possible, comparison of the baseline simulation results with benchmark data from the ENERGY 2020 model or other demand forecasting models specific to Hawaii is included for each building. Appendix A contains a detailed listing of the commercial sector baseline indoor lighting technologies included in the existing and new prototypes by building type.

  20. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  1. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  2. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  3. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Broader source: Energy.gov (indexed) [DOE]

    Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

  4. RCRA Assessment Plan for Single-Shell Tank Waste Management Area T

    SciTech Connect (OSTI)

    Horton, Duane G.

    2006-01-15

    This plan describes the data quality objectives process used to guide information gathering to further the assessment at WMA T.

  5. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  6. Assessment of Disposal Options for DOE-Managed High-Level Radioactive...

    Energy Savers [EERE]

    of Options for Permanent Geologic Disposal of Spent NuclearFuel and High-Level Radioactive Waste Repository Reference Disposal Concepts and Thermal Load Management Analysis...

  7. Post-Project Assessment of the 2003 Cerrito Creek Restoration and Recommendations for Additional Stormwater Management

    E-Print Network [OSTI]

    Adlong, Michelle; Cook, Michael; Kennedy, Matthew

    2011-01-01

    Environmental Services. 2008. Stormwater Management Manual.47952 Contra Costa Clean Water Program. 2010. Stormwater C.3Guidebook: Stormwater Quality Requirements for Development

  8. Program management assessment of Federal Facility Compliance Agreement regarding CAA-40 C.F.R. Part 61, Subpart H at the Los Alamos National Laboratory

    SciTech Connect (OSTI)

    1997-01-01

    An assessment of Los Alamos National Laboratory`s management system related to facility compliance with an element of the Clean Air Act was performed under contract by a team from Northern Arizona University. More specifically, a Federal Facilities Compliance Agreement (FFCA) was established in 1996 to bring the Laboratory into compliance with emissions standards of radionuclides, commonly referred to as Rad/NESHAP. In the fall of 1996, the four-person team of experienced environmental managers evaluated the adequacy of relevant management systems to implement the FFCA provisions. The assessment process utilized multiple procedures including document review, personnel interviews and re-interviews, and facility observations. The management system assessment was completed with a meeting among team members, Laboratory officials and others on November 1, 1996 and preparation of an assessment report.

  9. Pacific Gas and Electric Company's Compressed Air Management Program: A Performance Assessment Approach to Improving Industrial Compressed Air System Operation and Maintenance 

    E-Print Network [OSTI]

    Qualmann, R. L.; Zeller, W.; Baker, M.

    2002-01-01

    The Compressed Air Management Program (CAMP) provides Pacific Gas and Electric's (PG&E's) large industrial customers with measurement-based performance assessments of their compressed air systems. Under this program, the customer's system...

  10. Organizational Assessment Of Integrating CAD And Product Data Management Tools In The Furniture Industry

    E-Print Network [OSTI]

    Industry Furniture Manufacturing and Management Center Technical Report 1996-1997 Eric N. Wiebe Jennifer J of issues faced by furniture companies are given. The literature review closes by focusing on additional in manufacturing and design has popularized the concept of the virtual product database. Product Data Management

  11. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01

    Loss of life estimation in flood risk assessment: Theory andand flow velocity Because flood risk depends on uncertaintheir study: storm-based flood risk. The study is resource-

  12. RCRA Assessment Plan for Single-Shell Tank Waste Management Area B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.

    2006-09-29

    This document was prepared as a groundwater quality assessment plan revision for the single-shell tank systems in Waste Management Area B-BX-BY at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with 40 CFR Part 265, Subpart F. In FY 1996, the groundwater monitoring program was changed from detection-level indicator evaluation to a groundwater quality assessment program when elevated specific conductance in downgradient monitoring well 299 E33-32 was confirmed by verification sampling. During the course of the ensuing investigation, elevated technetium-99 and nitrate were observed above the drinking water standard at well 299-E33-41, a well located between 241-B and 241-BX Tank Farms. Earlier observations of the groundwater contamination and tank farm leak occurrences combined with a qualitative analysis of possible solutions, led to the conclusion that waste from the waste management area had entered the groundwater and were observed in this well. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

  13. Using social network and stakeholder analysis to help evaluate infectious waste management: A step towards a holistic assessment

    SciTech Connect (OSTI)

    Caniato, Marco; Vaccari, Mentore; Visvanathan, Chettiyappan; Zurbrügg, Christian

    2014-05-01

    Highlights: • Assessment of infectious waste management in Bangkok, in particular incineration. • Integration of social network and stakeholder analysis assessment methods. • Assessment of stakeholder characteristics, role, interaction and communication. • Interviewees self-evaluate their own characteristics and the system. • Non-technical aspects are important for system acceptability, and sustainability. - Abstract: Assessing the strengths and weaknesses of a solid waste management scheme requires an accurate analysis and integration of several determining features. In addition to the technical aspects, any such system shows a complex interaction of actors with varying stakes, decision-making power and influence, as well as a favourable or disabling environment. When capitalizing on the knowledge and experience from a specific case, it is also crucial that experts do not “forget” or underestimate the importance of such social determinants and that they are familiar with the methods and tools to assess them. Social network analysis (SNA) and stakeholder analysis (SA) methods can be successfully applied to better understand actors’ role and actions, analyse driving forces and existing coordination among stakeholders, as well as identify bottlenecks in communication which affect daily operations or strategic planning for the future way forward. SNA and SA, appropriately adjusted for a certain system, can provide a useful integration to methods by assessing other aspects to ensure a comprehensive picture of the situation. This paper describes how to integrate SNA and SA in order to survey a solid waste management system. This paper presents the results of an analysis of On-Nuch infectious waste incinerator in Bangkok, Thailand. Stakeholders were interviewed and asked to prioritize characteristics and relationships which they consider particularly important for system development and success of the scheme. In such a way, a large quantity of information about organization, communication between stakeholders and their perception about operation, environmental and health impact, and potential alternatives for the system was collected in a systematic way. The survey results suggest that stakeholders are generally satisfied with the system operation, though communication should be improved. Moreover, stakeholders should be strategically more involved in system development planning, according to their characteristics, to prevent negative reactions.

  14. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  15. Proceedings of the 1998 USCOLD Annual Lecture, Buffalo, New York. August 1998 PORTFOLIO RISK ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT

    E-Print Network [OSTI]

    Bowles, David S.

    ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT David S. Bowles1 , Loren R. Anderson2 , Terry F. Glover3 on to provide the basis for an effective and efficient program for managing and reducing dam safety risksProceedings of the 1998 USCOLD Annual Lecture, Buffalo, New York. August 1998 PORTFOLIO RISK

  16. Bull-switching in African Bovid Herds: Assessing Best Practices for Breeding Management in Waterbuck 

    E-Print Network [OSTI]

    Jones, Renee Crystal Michelle

    2011-10-21

    To implement sustainable ex-situ management of big ungulate herds such as African Waterbuck (Kobus ellipsiprymnus), one strategy is to place a vasectomized male with females during the sub-optimal season for breeding and ...

  17. Development and initial assessment of Texas Cooperative Extension's white-tailed dear management module 

    E-Print Network [OSTI]

    Bedgood, Mark Andrew

    2005-02-17

    The purpose of this study was to evaluate the development and initial use of Texas Cooperative Extension?s (TCE) White-tailed Deer Management Module (WDMM) delivered over the Internet. The results of this study will ...

  18. A QUANTITATIVE RISK ASSESSMENT MODEL FOR THE MANAGEMENT OF INVASIVE YELLOW PERCH IN

    E-Print Network [OSTI]

    management #12;iv Dedication To all those who have inspired me to make the world a better place #12;v am continually amazed by his dedication to education and research, as well as his commitment to his

  19. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  20. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  1. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco...

  2. The Challenges of Dynamic Water Management in the American West

    E-Print Network [OSTI]

    Doremus, Holly; Hanemann, Michael

    2008-01-01

    The Challenges of Dynamic Water Management in the AmericanWESTERN WATER PROJECTS ARE HIGHLY VULNERABLE TO GLOBALTO REDISTRIBUTING WATER . INSTITUTIONAL BARRIERS

  3. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  4. Valero: Houston Refinery Uses Plant-Wide Assessment to Develop an Energy Optimization and Management System

    SciTech Connect (OSTI)

    2005-08-01

    This Industrial Technologies Program case study describes an energy assessment team's recommendations for saving $5 million in energy, water, and other costs at an oil refinery in Houston, Texas.

  5. Semi-annual report of the Department of Energy Office of Environmental Management quality assessment program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1997-01-01

    This report presents the results from the soil inorganic analysis of the 45th set of environmental quality assessment samples (QAP XLV) that were received on or before December 2, 1996.

  6. Undergraduate business and management students’ experiences of being involved in assessment 

    E-Print Network [OSTI]

    Tai, Chunming

    2012-11-29

    This study aimed to explore university undergraduates’ experiences of student involvement in assessment (SIA). Based on Biggs’ 3P model of student learning, this study focused on students’ experiences prior to SIA, during ...

  7. Assessment of sludge management options in a waste water treatment plant

    E-Print Network [OSTI]

    Lim, Jong hyun, M. Eng. Massachusetts Institute of Technology

    2012-01-01

    This thesis is part of a larger project which began in response to a request by the Spanish water agengy, Cadagua, for advice on life cycle assessment (LCA) and environmental impacts of Cadagua operated wastewater treatment ...

  8. Methods for managing uncertainly in material selection decisions : robustness of early stage life cycle assessment

    E-Print Network [OSTI]

    Nicholson, Anna L. (Anna Louise)

    2009-01-01

    Utilizing alternative materials is an important tactic to improve the environmental performance of products. Currently a growing array of materials candidates confronts today's product designer. While life-cycle assessment ...

  9. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  10. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  11. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

  12. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  13. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  14. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  15. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  16. Nonpoint Source Pollution Assessment: Framework, Vulnerability Analysis, and Modeling

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    Regulating Water Pollution Sources Surface Water Quality Ground Water Quality Point Sources of Pollution Regulating Water Pollution Sources Surface Water Quality Ground Water Quality Point Sources of Pollution Quality Ground Water Quality Point Sources of Pollution Nonpoint Sources of Pollution 1970s now Clean

  17. Vulnerability Assessment In Cloud Computing Srujan Kotikela1,a

    E-Print Network [OSTI]

    Kavi, Krishna

    . Ontologies are widely used in artificial intelligence, semantic web, and library science where classification of the prominent techniques used to model and share a domain specific knowledge in the field of information science Gomathisankaran3,a a Department of Computer Science and Engineering, University of North Texas, Denton, Texas, USA

  18. Expert assessment of vulnerability of permafrost carbon to climate change

    E-Print Network [OSTI]

    2013-01-01

    of permafrost carbon to climate change E. A. G. Schuur & B.permafrost C feedback to climate change. We used a survey toof this feedback to climate change. However, the level of

  19. Expert assessment of vulnerability of permafrost carbon to climate change

    E-Print Network [OSTI]

    2013-01-01

    emissions and climate forcing. Abbreviations Pg Petagrams C Carbon Carbon dioxidecarbon dioxide (CO 2 ) or methane (CH 4 ) will determine the ultimate radiative-forcing potential of these emissions.

  20. Expert assessment of vulnerability of permafrost carbon to climate change

    E-Print Network [OSTI]

    Turetsky, Merritt

    to be the main source of C emissions and climate forcing. Abbreviations Pg Petagrams C Carbon CO2 Carbon dioxide be 19­45 Pg C by 2040, 162­288 Pg C by 2100, and 381­616 Pg C by 2300 in CO2 equivalent using 100-year of emissions proposed here are unlikely to overshadow the impact of fossil fuel burning, which will continue

  1. Expert assessment of vulnerability of permafrost carbon to climate change

    E-Print Network [OSTI]

    2013-01-01

    Climatic Change (2013) 119:359–374 DOI 10.1007/s10584-013-Canberra, Australia Climatic Change (2013) 119:359–374 ofStockholm, Sweden Climatic Change (2013) 119:359–374 result

  2. Assessing the Vulnerability of the Fiber Infrastructure to Disasters

    E-Print Network [OSTI]

    Cohen, Reuven

    , as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real-world events-optic, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by any- thing from Electromagnetic Pulse (EMP) attacks [14], [15], [31] to dragging anchors [8], [36

  3. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMatFermi Nationalannual reports,This| Department

  4. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,Coal TechnologiesClio Power LtdCounty Elec Coop,

  5. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,Coal TechnologiesClio Power LtdCounty Elec Coop,

  6. India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam:on Openei |source Historypub [ICO] NameOptions forChange |

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYork Jump|Line SitingOil andAshtabula -Askja

  8. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries

    SciTech Connect (OSTI)

    2008-07-01

    The Shaw Industries carpet manufacturing plant #20 in Dalton, Georgia, optimized boiler operation and installed waste heat exchangers on two processes in the dye house and an economizer on one boiler, for a payback of 1.7 years. These results prompted plant #4, also located in Dalton, to participate in an assessment.

  9. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  10. Range Con: a management evaluation system for assessing sucess of selected range improvement practices 

    E-Print Network [OSTI]

    Ekblad, Steven Linn

    1989-01-01

    technology does not offer a reductionist methodology for measurement of management skills and their impact on success of applied technology. Expert systems, a new software technology that has evolved through research and development in artificial... can be a description, referred to as a linguistic value, which can be used in pattern matching inference techniques of an expert system or a linguistic value that has a relative numeric value assigned and can be a member of a fuzzy set (Negoita...

  11. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting

  12. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartment ofDepartment

  13. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|ofSessions | Department

  14. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department|

  15. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers|

  16. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.; Pan, V.

    1995-07-03

    This report presents the results from the analysis of the 42st set of environmental quality assessment samples (QAP XLII) that were received on or before June 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  17. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.; Minick, S.K.

    1998-07-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. This report presents the results from the analysis of the 48th set of environmental quality assessment samples (QAP XLVIII) that were received on or before June 1, 1998.

  18. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1996-02-01

    This report presents the results from the analysis of the 43rd set of environmental quality assessment samples (QAP XLIII) that were received on or before December 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  19. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.

    1998-01-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 47th set of environmental quality assessment samples (QAP XLVII) that were received on or before December 1, 1997.

  20. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1996-07-01

    This report presents the results from the analysis of the 44th set of environmental quality assessment samples (QAP XLIV) that were received on or before June 3, 1996. The QAP is designed to test the quality of environmental measurements being reported to the Department of Energy by it`s contractors. Since 1976, samples have been prepared and analyzed by the Environmental measurements Laboratory.

  1. Sandia National Laboratories performance assessment methodology for long-term environmental programs : the history of nuclear waste management.

    SciTech Connect (OSTI)

    Marietta, Melvin Gary; Anderson, D. Richard; Bonano, Evaristo J.; Meacham, Paul Gregory

    2011-11-01

    Sandia National Laboratories (SNL) is the world leader in the development of the detailed science underpinning the application of a probabilistic risk assessment methodology, referred to in this report as performance assessment (PA), for (1) understanding and forecasting the long-term behavior of a radioactive waste disposal system, (2) estimating the ability of the disposal system and its various components to isolate the waste, (3) developing regulations, (4) implementing programs to estimate the safety that the system can afford to individuals and to the environment, and (5) demonstrating compliance with the attendant regulatory requirements. This report documents the evolution of the SNL PA methodology from inception in the mid-1970s, summarizing major SNL PA applications including: the Subseabed Disposal Project PAs for high-level radioactive waste; the Waste Isolation Pilot Plant PAs for disposal of defense transuranic waste; the Yucca Mountain Project total system PAs for deep geologic disposal of spent nuclear fuel and high-level radioactive waste; PAs for the Greater Confinement Borehole Disposal boreholes at the Nevada National Security Site; and PA evaluations for disposal of high-level wastes and Department of Energy spent nuclear fuels stored at Idaho National Laboratory. In addition, the report summarizes smaller PA programs for long-term cover systems implemented for the Monticello, Utah, mill-tailings repository; a PA for the SNL Mixed Waste Landfill in support of environmental restoration; PA support for radioactive waste management efforts in Egypt, Iraq, and Taiwan; and, most recently, PAs for analysis of alternative high-level radioactive waste disposal strategies including repositories deep borehole disposal and geologic repositories in shale and granite. Finally, this report summarizes the extension of the PA methodology for radioactive waste disposal toward development of an enhanced PA system for carbon sequestration and storage systems. These efforts have produced a generic PA methodology for the evaluation of waste management systems that has gained wide acceptance within the international community. This report documents how this methodology has been used as an effective management tool to evaluate different disposal designs and sites; inform development of regulatory requirements; identify, prioritize, and guide research aimed at reducing uncertainties for objective estimations of risk; and support safety assessments.

  2. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George; Skoulaxinou, Sotiria; Gakis, Nikos; Katsouros, Vassilis; Georgopoulou, Elena

    2013-09-15

    Highlights: • The multi-objective multi-period optimization model. • The solution approach for the generation of the Pareto front with mathematical programming. • The very detailed description of the model (decision variables, parameters, equations). • The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the application of the model in a Greek region.

  3. Risk assessment and optimization (ALARA) analysis for the environmental remediation of Brookhaven National Laboratory`s hazardous waste management facility

    SciTech Connect (OSTI)

    Dionne, B.J.; Morris, S. III; Baum, J.W. [and others

    1998-03-01

    The Department of Energy`s (DOE) Office of Environment, Safety, and Health (EH) sought examples of risk-based approaches to environmental restoration to include in their guidance for DOE nuclear facilities. Extensive measurements of radiological contamination in soil and ground water have been made at Brookhaven National Laboratory`s Hazardous Waste Management Facility (HWMF) as part of a Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) remediation process. This provided an ideal opportunity for a case study. This report provides a risk assessment and an {open_quotes}As Low as Reasonably Achievable{close_quotes} (ALARA) analysis for use at other DOE nuclear facilities as an example of a risk-based decision technique.

  4. Risk assessment and optimization (ALARA) analysis for the environmental remediation of Brookhaven National Laboratory`s hazardous waste management facility

    SciTech Connect (OSTI)

    Dionne, B.J.; Morris, S.C. III; Baum, J.W. [and others] [and others

    1998-01-01

    The Department of Energy`s (DOE) Office of Environment, Safety, and Health (EH) sought examples of risk-based approaches to environmental restoration to include in their guidance for DOE nuclear facilities. Extensive measurements of radiological contamination in soil and ground water have been made at Brookhaven National Laboratory`s Hazardous Waste Management Facility (HWMF) as part of a Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) remediation process. This provided an ideal opportunity for a case study. This report provides a risk assessment and an {open_quotes}As Low as Reasonably Achievable{close_quotes} (ALARA) analysis for use at other DOE nuclear facilities as an example of a risk-based decision technique. This document contains the Appendices for the report.

  5. Management assessment of tank waste remediation system contractor readiness to proceed with phase 1B privatization

    SciTech Connect (OSTI)

    Certa, P.J.

    1998-01-07

    Readiness to Proceed With Phase 1B Privatization documents the processes used to determine readiness to proceed with tank waste treatment technologies from private industry, now known as TWRS privatization. An overall systems approach was applied to develop action plans to support the retrieval and disposal mission of the TWRS Project. The systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. Since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farms organizational structure and configurations, work scope, and costs has become part of the culture within the TWRS Project. An analysis of the programmatic, management, and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, personnel, and hardware will be on line and ready to support the private contractors. The systems approach included defining the retrieval and disposal mission requirements and evaluating the readiness of the Project Hanford Management Contract (PHMC) team to support initiation of waste processing by the private contractors in June 2002 and to receive immobilized waste shortly thereafter. The Phase 1 feed delivery requirements from the private contractor Requests for Proposal were reviewed. Transfer piping routes were mapped, existing systems were evaluated, and upgrade requirements were defined.

  6. Material Aging and Degradation Detection and Remaining Life Assessment for Plant Life Management

    SciTech Connect (OSTI)

    Ramuhalli, Pradeep; Henager, Charles H.; Griffin, Jeffrey W.; Meyer, Ryan M.; Coble, Jamie B.; Pitman, Stan G.; Bond, Leonard J.

    2012-12-31

    One of the major factors that may impact long term operations is structural material degradation, Detecting materials degradation, estimating the remaining useful life (RUL) of the component, and determining approaches to mitigating the degradation are important from the perspective of long term operations. In this study, multiple nondestructive measurement and monitoring methods were evaluated for their ability to assess the material degradation state. Metrics quantifying the level of damage from these measurements were defined, and evaluated for their ability to provide estimates of remaining life of the component. An example of estimating the RUL from nondestructive measurements of material degradation condition is provided.

  7. Assessment of Latent Heat Reservoirs for Thermal Management of QCW Laser

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing Bacteria (Technical Report) | SciTech Connect Assessing the Role ofDiodes

  8. Assessment of Latent Heat Reservoirs for Thermal Management of QCW Laser

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing Bacteria (Technical Report) | SciTech Connect Assessing the Role ofDiodesDiodes

  9. Life cycle assessment of four municipal solid waste management scenarios in China

    SciTech Connect (OSTI)

    Hong Jinglan, E-mail: hongjing@sdu.edu.c [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China); Li Xiangzhi [Department of Pathology, University of Michigan, 1301 Catherine, Ann Arbor, MI 48109 (United States); Zhaojie Cui [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China)

    2010-11-15

    A life cycle assessment was carried out to estimate the environmental impact of municipal solid waste. Four scenarios mostly used in China were compared to assess the influence of various technologies on environment: (1) landfill, (2) incineration, (3) composting plus landfill, and (4) composting plus incineration. In all scenarios, the technologies significantly contribute to global warming and increase the adverse impact of non-carcinogens on the environment. The technologies played only a small role in the impact of carcinogens, respiratory inorganics, terrestrial ecotoxicity, and non-renewable energy. Similarly, the influence of the technologies on the way other elements affect the environment was ignorable. Specifically, the direct emissions from the operation processes involved played an important role in most scenarios except for incineration, while potential impact generated from transport, infrastructure and energy consumption were quite small. In addition, in the global warming category, highest potential impact was observed in landfill because of the direct methane gas emissions. Electricity recovery from methane gas was the key factor for reducing the potential impact of global warming. Therefore, increasing the use of methane gas to recover electricity is highly recommended to reduce the adverse impact of landfills on the environment.

  10. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  11. Reactor-Based Management of Used Nuclear Fuel: Assessment of Major Options

    SciTech Connect (OSTI)

    Phillip J. Finck; Roald A. Wigeland; Robert N. Hill

    2011-01-01

    This paper discusses the current status of the ongoing Advanced Fuel Cycle Initiative (AFCI) program in the U.S. Department of Energy that is investigating the potential for using the processing and recycling of used nuclear fuel to improve radioactive waste management, including used fuel. A key element of the strategies is to use nuclear reactors for further irradiation of recovered chemical elements to transmute certain long-lived highly-radioactive isotopes into less hazardous isotopes. Both thermal and fast neutron spectrum reactors are being studied as part of integrated nuclear energy systems where separations, transmutation, and disposal are considered. Radiotoxicity is being used as one of the metrics for estimating the hazard of used fuel and the processing of wastes resulting from separations and recycle-fuel fabrication. Decay heat from the used fuel and/or wastes destined for disposal is used as a metric for use of a geologic repository. Results to date indicate that the most promising options appear to be those using fast reactors in a repeated recycle mode to limit buildup of higher actinides, since the transuranic elements are a key contributor to the radiotoxicity and decay heat. Using such an approach, there could be much lower environmental impact from the high-level waste as compared to direct disposal of the used fuel, but there would likely be greater generation of low-level wastes that will also require disposal. An additional potential waste management benefit is having the ability to tailor waste forms and contents to one or more targeted disposal environments (i.e., to be able to put waste in environments best-suited for the waste contents and forms).

  12. Preliminary Performance Assessment for the Waste Management Area C at the Hanford Site in Southeast Washington - 15331

    SciTech Connect (OSTI)

    Bergeron, Marcel P.; Singleton, Kristin M.; Eberlein, Susan J.

    2015-01-07

    A performance assessment (PA) of Single-Shell Tank (SST) Waste Management Area C (WMA C) located at the U.S. Department of Energy's (DOE) Hanford Site in southeastern Washington is being conducted to satisfy the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO), as well as other Federal requirements and State-approved closure plans and permits. The WMP C PA assesses the fate, transport, and impacts of radionuclides and hazardous chemicals within residual wastes left in tanks and ancillary equipment and facilities in their assumed closed configuration and the subsequent risks to humans into the far future. The part of the PA focused on radiological impacts is being developed to meet the requirements for a closure authorization under DOE Order 435.1 that includes a waste incidental to reprocessing determination for residual wastes remaining in tanks, ancillary equipment, and facilities. An additional part of the PA will evaluate human health and environmental impacts from hazardous chemical inventories in residual wastes remaining in WMA C tanks, ancillary equipment, and facilities needed to meet the requirements for permitted closure under RCRA.

  13. Towards Adaptive Educational Assessments: Predicting Student Performance using Temporal Stability and Data Analytics in Learning Management Systems

    SciTech Connect (OSTI)

    Thakur, Gautam [ORNL] [ORNL; Olama, Mohammed M [ORNL] [ORNL; McNair, Wade [ORNL] [ORNL; Sukumar, Sreenivas R [ORNL] [ORNL

    2014-01-01

    Data-driven assessments and adaptive feedback are becoming a cornerstone research in educational data analytics and involve developing methods for exploring the unique types of data that come from the educational context. For example, predicting college student performance is crucial for both the students and educational institutions. It can support timely intervention to prevent students from failing a course, increasing efficacy of advising functions, and improving course completion rate. In this paper, we present our efforts in using data analytics that enable educationists to design novel data-driven assessment and feedback mechanisms. In order to achieve this objective, we investigate temporal stability of students grades and perform predictive analytics on academic data collected from 2009 through 2013 in one of the most commonly used learning management systems, called Moodle. First, we have identified the data features useful for assessments and predicting student outcomes such as students scores in homework assignments, quizzes, exams, in addition to their activities in discussion forums and their total Grade Point Average(GPA) at the same term they enrolled in the course. Second, time series models in both frequency and time domains are applied to characterize the progression as well as overall projections of the grades. In particular, the model analyzed the stability as well as fluctuation of grades among students during the collegiate years (from freshman to senior) and disciplines. Third, Logistic Regression and Neural Network predictive models are used to identify students as early as possible who are in danger of failing the course they are currently enrolled in. These models compute the likelihood of any given student failing (or passing) the current course. The time series analysis indicates that assessments and continuous feedback are critical for freshman and sophomores (even with easy courses) than for seniors, and those assessments may be provided using the predictive models. Numerical results are presented to evaluate and compare the performance of the developed models and their predictive accuracy. Our results show that there are strong ties associated with the first few weeks for coursework and they have an impact on the design and distribution of individual modules.

  14. Risk management of undesirable substances in feed following updated risk assessments

    SciTech Connect (OSTI)

    Verstraete, Frans

    2013-08-01

    Directive 2002/32/EC of 7 May 2002 of the European Parliament and of the Council on undesirable substances in animal feed is the framework for the EU action on undesirable substances in feed. This framework Directive provides: ?that products intended for animal feed may enter for use in the Union from third countries, be put into circulation and/or used in the Union only if they are sound, genuine and of merchantable quality and therefore when correctly used do not represent any danger to human health, animal health or to the environment or could adversely affect livestock production. ?that in order to protect animal and public health and the environment, maximum levels for specific undesirable substances shall be established where necessary. ?for mandatory consultation of a scientific body (EFSA) for all provisions which may have an effect upon public health or animal health or on the environment. ?that products intended for animal feed containing levels of an undesirable substance that exceed the established maximum level may not be mixed for dilution purposes with the same, or other, products intended for animal feed and may not be used for the production of compound feed. Based on the provisions and principles laid down in this framework Directive, maximum levels for a whole range of undesirable substances have been established at EU level. During the discussions in view of the adoption of Directive 2002/32/EC, the European Commission made the commitment to review all existing provisions on undesirable substances on the basis of updated scientific risk assessments. Following requests of the European Commission, the Panel on Contaminants in the Food Chain (CONTAM) from the European Food Safety Authority (EFSA) has completed a series of 30 risk assessments undertaken over the last 5 years on undesirable substances in animal feed reviewing the possible risks for animal and human health due to the presence of these substances in animal feed. EU legislation on undesirable substances has undergone recently several changes to take account of these most recent scientific opinions. Furthermore EFSA has assessed the risks for public and animal health following the unavoidable carry-over of coccidiostats into non target feed. Maximum levels for the unavoidable carry-over have been established for the non-target feed and the food of animal origin from non-target animal species.

  15. Improved methodology to assess modification and completion of landfill gas management in the aftercare period

    SciTech Connect (OSTI)

    Morris, Jeremy W.F.; Crest, Marion; Barlaz, Morton A.; Spokas, Kurt A.; Akerman, Anna; Yuan, Lei

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer Performance-based evaluation of landfill gas control system. Black-Right-Pointing-Pointer Analytical framework to evaluate transition from active to passive gas control. Black-Right-Pointing-Pointer Focus on cover oxidation as an alternative means of passive gas control. Black-Right-Pointing-Pointer Integrates research on long-term landfill behavior with practical guidance. - Abstract: Municipal solid waste landfills represent the dominant option for waste disposal in many parts of the world. While some countries have greatly reduced their reliance on landfills, there remain thousands of landfills that require aftercare. The development of cost-effective strategies for landfill aftercare is in society's interest to protect human health and the environment and to prevent the emergence of landfills with exhausted aftercare funding. The Evaluation of Post-Closure Care (EPCC) methodology is a performance-based approach in which landfill performance is assessed in four modules including leachate, gas, groundwater, and final cover. In the methodology, the objective is to evaluate landfill performance to determine when aftercare monitoring and maintenance can be reduced or possibly eliminated. This study presents an improved gas module for the methodology. While the original version of the module focused narrowly on regulatory requirements for control of methane migration, the improved gas module also considers best available control technology for landfill gas in terms of greenhouse gas emissions, air quality, and emissions of odoriferous compounds. The improved module emphasizes the reduction or elimination of fugitive methane by considering the methane oxidation capacity of the cover system. The module also allows for the installation of biologically active covers or other features designed to enhance methane oxidation. A methane emissions model, CALMIM, was used to assist with an assessment of the methane oxidation capacity of landfill covers.

  16. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  17. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  18. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  19. Proceedings of the 1998 USCOLD Annual Lecture, Buffalo, New York. August 1998 PORTFOLIO RISK ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT

    E-Print Network [OSTI]

    Bowles, David S.

    ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT David S. Bowles1 , Loren R. Anderson2 , Terry F. Glover3 , and Sanjay S. Chauhan4 ABSTRACT Dam owners, engineers and regulators who are responsible for the safety of groups of dams need to prioritize dam safety evaluations or funding for structural and non

  20. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  8. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  9. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  10. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  11. Environmental and managing

    E-Print Network [OSTI]

    Virginia Tech

    Environmental Education Assessing and managing visitor experiences and impacts Managing natural. A conservation worker Use your communications and management skills in an environmental organization, a government agen- cy, or in cooperative extension to enhance the environmental management. A nature guide

  12. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  13. Taking Risk Assessment and Management to the Next Level: Program-Level Risk Analysis to Enable Solid Decision-Making on Priorities and Funding

    SciTech Connect (OSTI)

    Nelson, J. G.; Morton, R. L.; Castillo, C.; Dyer, G.; Johnson, N.; McSwain, J. T.

    2011-02-01

    A multi-level (facility and programmatic) risk assessment was conducted for the facilities in the Nevada National Security Site (NNSS) Readiness in Technical Base and Facilities (RTBF) Program and results were included in a new Risk Management Plan (RMP), which was incorporated into the fiscal year (FY) 2010 Integrated Plans. Risks, risk events, probability, consequence(s), and mitigation strategies were identified and captured, for most scope areas (i.e., risk categories) during the facilitated risk workshops. Risk mitigations (i.e., efforts in addition to existing controls) were identified during the facilitated risk workshops when the risk event was identified. Risk mitigation strategies fell into two broad categories: threats or opportunities. Improvement projects were identified and linked to specific risks they mitigate, making the connection of risk reduction through investments for the annual Site Execution Plan. Due to the amount of that was collected, analysis to be performed, and reports to be generated, a Risk Assessment/ Management Tool (RAMtool) database was developed to analyze the risks in real-time, at multiple levels, which reinforced the site-level risk management process and procedures. The RAMtool database was developed and designed to assist in the capturing and analysis of the key elements of risk: probability, consequence, and impact. The RAMtool calculates the facility-level and programmatic-level risk factors to enable a side-by-side comparison to see where the facility manager and program manager should focus their risk reduction efforts and funding. This enables them to make solid decisions on priorities and funding to maximize the risk reduction. A more active risk management process was developed where risks and opportunities are actively managed, monitored, and controlled by each facility more aggressively and frequently. risk owners have the responsibility and accountability to manage their assigned risk in real-time, using the RAMtool database.

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  15. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  16. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  17. Embedding climate change risk assessment within a governance context

    SciTech Connect (OSTI)

    Preston, Benjamin L

    2011-01-01

    Climate change adaptation is increasingly being framed in the context of climate risk management. This has contributed to the proliferation of climate change vulnerability and/or risk assessments as means of supporting institutional decision-making regarding adaptation policies and measures. To date, however, little consideration has been given to how such assessment projects and programs interact with governance systems to facilitate or hinder the implementation of adaptive responses. An examination of recent case studies involving Australian local governments reveals two key linkages between risk assessment and the governance of adaptation. First, governance systems influence how risk assessment processes are conducted, by whom they are conducted, and whom they are meant to inform. Australia s governance system emphasizes evidence-based decision-making that reinforces a knowledge deficit model of decision support. Assessments are often carried out by external experts on behalf of local government, with limited participation by relevant stakeholders and/or civil society. Second, governance systems influence the extent to which the outputs from risk assessment activities are translated into adaptive responses and outcomes. Technical information regarding risk is often stranded by institutional barriers to adaptation including poor uptake of information, competition on the policy agenda, and lack of sufficient entitlements. Yet, risk assessments can assist in bringing such barriers to the surface, where they can be debated and resolved. In fact, well-designed risk assessments can contribute to multi-loop learning by institutions, and that reflexive problem orientation may be one of the more valuable benefits of assessment.

  18. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  19. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  20. Proceedings of the 2009 Industrial Engineering Research Conference Technology Assessment for an Inventory Management Process in a

    E-Print Network [OSTI]

    Rossetti, Manuel D.

    that 16% of hospitals use barcode technology for supply chain management purposes, and 3% use Radio a technological alternative. This paper studies the impact of Auto ID DC technologies on the inventory management Technologies, barcodes, RFID, hospital unit inventory management, quantitative modeling 1. Introduction Auto ID

  1. Uncertainties and severe-accident management

    SciTech Connect (OSTI)

    Kastenberg, W.E. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Severe-accident management can be defined as the use of existing and or alternative resources, systems, and actions to prevent or mitigate a core-melt accident. Together with risk management (e.g., changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-indepth safety philosophy for severe accidents. A significant number of probabilistic safety assessments have been completed, which yield the principal plant vulnerabilities, and can be categorized as (a) dominant sequences with respect to core-melt frequency, (b) dominant sequences with respect to various risk measures, (c) dominant threats that challenge safety functions, and (d) dominant threats with respect to failure of safety systems. Severe-accident management strategies can be generically classified as (a) use of alternative resources, (b) use of alternative equipment, and (c) use of alternative actions. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These include (a) uncertainty in key phenomena, (b) uncertainty in operator behavior, (c) uncertainty in system availability and behavior, and (d) uncertainty in information availability (i.e., instrumentation). This paper focuses on phenomenological uncertainties associated with severe-accident management strategies.

  2. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  3. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  4. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  5. Texas Water Resources: Vulnerability from Contaminants 

    E-Print Network [OSTI]

    Dwivedi, Dipankar

    2012-10-02

    Numerical models of flow and transport are commonly applied for the sustainable management of water resources and for the selection of appropriate remediation techniques. However, these numerical models are not always ...

  6. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  7. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  8. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  9. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  10. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  11. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  12. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  13. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  14. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  15. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  16. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  17. Supplemental information related to risk assessment for the off-site transportation of low-level mixed waste for the U.S. Department of Energy waste management programmatic environmental impact statement

    SciTech Connect (OSTI)

    Monette, F.A.; Biwer, B.M.; LePoire, D.J.; Lazaro, M.A.; Antonopoulos, A.A.; Hartmann, H.M.; Policastro, A.J.; Chen, S.Y. [Argonne National Lab., IL (United States). Environmental Assessment Div.] [Argonne National Lab., IL (United States). Environmental Assessment Div.

    1996-12-01

    This report provides supplemental information to support the human health risk assessment conducted for the transportation of low-level mixed waste (LLMW) in support of the US Department of Energy Waste Management Programmatic Environmental Impact Statement (WM PEIS). The assessment considers both the radioactive and chemical hazards associated with LLMW transportation. Detailed descriptions of the transportation health risk assessment methods and results of the assessment are presented in Appendix E of the WM PEIS. This report presents additional information that is not included in Appendix E but that was needed to conduct the transportation risk assessment for Waste Management (WM) LLMW. Included are definitions of the LLMW alternatives considered in the WM PEIS; data related to the inventory and to the physical, chemical, and radiological characteristics of WM LLMW; an overview of the risk assessment methods; and detailed results of the assessment for each WM LLMW case considered.

  18. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market analyses the global waste market, with particular reference to municipal solid waste (MSW). Key Note. Industrial waste generally has a greater tonnage than MSW, but its management is the responsibility

  19. Guide to Using Vulnerability Naming Schemes

    E-Print Network [OSTI]

    welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL the development of technical, physical, administrative, and management standards and guidelines for the cost Institute of Standards and Technology David Waltermire Karen Scarfone Daniel Owens C O M P U T E R S E C U R

  20. NIST Interagency Report 7435 The Common Vulnerability

    E-Print Network [OSTI]

    by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 August 2007 U

  1. Privacy Vulnerability of Published Anonymous Mobility Traces

    E-Print Network [OSTI]

    2010-07-07

    Sep 20, 2010 ... a function of the nodal mobility (captured in both real and synthetic traces), the ... Systems; K.6.5 [Management of Computing and Infor- mation Systems]: Security and ..... We first describe them for case A1: (1) MLE Approach ...

  2. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  3. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  4. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: December 2005

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services the confidentiality, integrity and availability of Health Science Center electronic information resources. Policy and vulnerabilities #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management

  5. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2007-04-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.

  6. Hawaii demand-side management resource assessment. Final report, Reference Volume 3 -- Residential and commercial sector DSM analyses: Detailed results from the DBEDT DSM assessment model; Part 1, Technical potential

    SciTech Connect (OSTI)

    1995-04-01

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. Numerous tables and figures illustrating the technical potential for demand-side management are included.

  7. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , MA 01003 #12;Outline of Tutorial · Part I: Network Fundamentals, Efficiency Measurement for transportation and logistics, for communication, energy provision, social interactions, financing, and economic decision-making behavior, and · assess network robustness using total cost as a measure under alternative

  8. Supplemental information related to risk assessment for the off-site transportation of low-level waste for the U.S. Department of Energy waste management programmatic environmental impact statement

    SciTech Connect (OSTI)

    Monette, F.A.; Biwer, B.M.; LePoire, D.J.; Chen, S.Y. [Argonne National Lab., IL (United States). Environmental Assessment Div.

    1996-12-01

    This report presents supplemental information to support the human health risk assessment conducted for the transportation of low-level waste (LLW) in support of the US Department of Energy Waste Management Programmatic Environmental Impact Statement (WM PEIS). Detailed descriptions of the transportation health risk assessment method and results of the assessment are presented in Appendix E of the WM PEIS and are not repeated in this report. This report presents additional information that is not presented in Appendix E but that was needed to conduct the transportation risk assessment for Waste Management (WM) LLW. Included are definition of the LLW alternatives considered in the WM PEIS, data related to the inventory and to the physical and radiological characteristics of WM LLW, an overview of the risk assessment method, and detailed results of the assessment for each WM LLW alternative considered.

  9. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  10. Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri Faculty Advisor : Prof Estimation Methodology Applications (in progress) Port of Long Beach · Seismic Risk Assessment, Decision & Vertical movement, Settlement of Apron Seismic Vulnerability - quay Wall

  11. Assessment of contrast enhanced respiration managed cone-beam CT for image guided radiotherapy of intrahepatic tumors

    SciTech Connect (OSTI)

    Jensen, Nikolaj K. G.; Stewart, Errol; Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7; Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 ; Lock, Michael; Fisher, Barbara; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 ; Kozak, Roman; Chen, Jeff; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 ; Lee, Ting-Yim; Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7; Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 ; Wong, Eugene; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1; Department of Physics and Astronomy, University of Western Ontario, London, Ontario N6A 3K7

    2014-05-15

    Purpose: Contrast enhancement and respiration management are widely used during image acquisition for radiotherapy treatment planning of liver tumors along with respiration management at the treatment unit. However, neither respiration management nor intravenous contrast is commonly used during cone-beam CT (CBCT) image acquisition for alignment prior to radiotherapy. In this study, the authors investigate the potential gains of injecting an iodinated contrast agent in combination with respiration management during CBCT acquisition for liver tumor radiotherapy. Methods: Five rabbits with implanted liver tumors were subjected to CBCT with and without motion management and contrast injection. The acquired CBCT images were registered to the planning CT to determine alignment accuracy and dosimetric impact. The authors developed a simulation tool for simulating contrast-enhanced CBCT images from dynamic contrast enhanced CT imaging (DCE-CT) to determine optimal contrast injection protocols. The tool was validated against contrast-enhanced CBCT of the rabbit subjects and was used for five human patients diagnosed with hepatocellular carcinoma. Results: In the rabbit experiment, when neither motion management nor contrast was used, tumor centroid misalignment between planning image and CBCT was 9.2 mm. This was reduced to 2.8?mm when both techniques were employed. Tumors were not visualized in clinical CBCT images of human subjects. Simulated contrast-enhanced CBCT was found to improve tumor contrast in all subjects. Different patients were found to require different contrast injections to maximize tumor contrast. Conclusions: Based on the authors’ animal study, respiration managed contrast enhanced CBCT improves IGRT significantly. Contrast enhanced CBCT benefits from patient specific tracer kinetics determined from DCE-CT.

  12. Facilities management: the development of a model for building condition assessment surveys conducted at Fort Riley, Kansas 

    E-Print Network [OSTI]

    Riblett, Carl Olin

    1993-01-01

    The purpose of this study is to document the research and design of a condition assessment system for buildings by utilizing case study methods for the facilities located at Fort Riley, Kansas, an Army military installation. ...

  13. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were...

  14. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability...

  15. Environmental Assessment and Finding of No Significant Impact: Idaho National Engineering and Environmental Laboratory Wildland Fire Management

    SciTech Connect (OSTI)

    N /A

    2003-04-25

    The Idaho National Engineering and Environmental Laboratory (INEEL) is a U.S. Department of Energy (DOE)-managed reservation occupying about 890 square miles in southeastern Idaho. The INEEL lies within the upper Snake River Plain sagebrush steppe ecosystem. Much of the sagebrush steppe ecosystem throughout the west has been segmented and lost to development and agriculture. The remaining sagebrush steppe ecosystem and the habitat it provides is threatened with irreversible conversion to non-native annual weeds by rangeland management practices in combination with the natural fire process. The sagebrush steppe of the INEEL is now threatened and DOE must evaluate its management role and alternatives available to preserve this important component of the western ecosystem.

  16. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  17. Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the NTS

    SciTech Connect (OSTI)

    Vefa Yucel

    2007-01-03

    U.S. Department of Energy (DOE) Manual M 435.1-1 requires that performance assessments (PAs) and composite analyses (CAs) for low-level waste (LLW) disposal facilities be maintained by the field offices. This plan describes the activities performed to maintain the PA and the CA for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada Test Site (NTS). This plan supersedes the Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (DOE/NV/11718--491-REV 1, dated September 2002). The plan is based on U.S. Department of Energy (DOE) Order 435.1 (DOE, 1999a), DOE Manual M 435.1-1 (DOE, 1999b), the DOE M 435.1-1 Implementation Guide DOE G 435.1-1 (DOE, 1999c), and the Maintenance Guide for PAs and CAs (DOE, 1999d). The plan includes a current update on PA/CA documentation, a revised schedule, and a section on Quality Assurance.

  18. Notice of Intent to Revise DOE G 414.1-1B, Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    This memorandum provides justification for revising DOE G 414.1-1B, Management and Independent Assessments Guide for Use With 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A, Implementation of Department of Energy Oversight Policy.

  19. Nonproliferation impacts assessment for the management of the Savannah River Site aluminum-based spent nuclear fuel

    SciTech Connect (OSTI)

    NONE

    1998-12-01

    On May 13, 1996, the US established a new, 10-year policy to accept and manage foreign research reactor spent nuclear fuel containing uranium enriched in the US. The goal of this policy is to reduce civilian commerce in weapons-usable highly enriched uranium (HEU), thereby reducing the risk of nuclear weapons proliferation. Two key disposition options under consideration for managing this fuel include conventional reprocessing and new treatment and packaging technologies. The Record of Decision specified that, while evaluating the reprocessing option, ``DOE will commission or conduct an independent study of the nonproliferation and other (e.g., cost and timing) implications of chemical separation of spent nuclear fuel from foreign research reactors.`` DOE`s Office of Arms Control and Nonproliferation conducted this study consistent with the aforementioned Record of Decision. This report addresses the nonproliferation implications of the technologies under consideration for managing aluminum-based spent nuclear fuel at the Savannah River Site. Because the same technology options are being considered for the foreign research reactor and the other aluminum-based spent nuclear fuels discussed in Section ES.1, this report addresses the nonproliferation implications of managing all the Savannah River Site aluminum-based spent nuclear fuel, not just the foreign research reactor spent nuclear fuel. The combination of the environmental impact information contained in the draft EIS, public comment in response to the draft EIS, and the nonproliferation information contained in this report will enable the Department to make a sound decision regarding how to manage all aluminum-based spent nuclear fuel at the Savannah River Site.

  20. A total risk assessment methodology for security assessment.

    SciTech Connect (OSTI)

    Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-06-01

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

  1. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  2. Hawaii demand-side management resource assessment. Final report, Reference Volume 4: The DBEDT DSM assessment model user`s manual

    SciTech Connect (OSTI)

    1995-04-01

    The DBEDT DSM Assessment Model (DSAM) is a spreadsheet model developed in Quattro Pro for Windows that is based on the integration of the DBEDT energy forecasting model, ENERGY 2020, with the output from the building energy use simulation model, DOE-2. DOE-2 provides DSM impact estimates for both energy and peak demand. The ``User`s Guide`` is designed to assist DBEDT staff in the operation of DSAM. Supporting information on model structure and data inputs are provided in Volumes 2 and 3 of the Final Report. DSAM is designed to provide DBEDT estimates of the potential DSM resource for each county in Hawaii by measure, program, sector, year, and levelized cost category. The results are provided for gas and electric and for both energy and peak demand. There are two main portions of DSAM, the residential sector and the commercial sector. The basic underlying logic for both sectors are the same. However, there are some modeling differences between the two sectors. The differences are primarily the result of (1) the more complex nature of the commercial sector, (2) memory limitations within Quattro Pro, and (3) the fact that the commercial sector portion of the model was written four months after the residential sector portion. The structure for both sectors essentially consists of a series of input spreadsheets, the portion of the model where the calculations are performed, and a series of output spreadsheets. The output spreadsheets contain both detailed and summary tables and graphs.

  3. Material stabilization characterization management plan

    SciTech Connect (OSTI)

    GIBSON, M.W.

    1999-08-31

    This document presents overall direction for characterization needs during stabilization of SNM at the Plutonium Finishing Plant (PFP). Technical issues for needed data and equipment are identified. Information on material categories and links to vulnerabilities are given. Comparison data on the material categories is discussed to assist in assessing the relative risks and desired processing priority.

  4. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  5. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  6. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  7. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  8. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  9. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  10. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  11. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  12. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  13. INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE SEPARATIONS PROCESS RESEARCH UNIT (SPRU) DISPOSITION PROJECT, NEW YORK

    SciTech Connect (OSTI)

    Abitz, R.; Jackson, D.; Eddy-Dilek, C.

    2011-06-27

    The U.S. Department of Energy (DOE) is currently evaluating the water management procedures at the Separations Process Research Unit (SPRU). The facility has three issues related to water management that require technical assistance: (1) due to a excessive rainfall event in October, 2010, contaminated water collected in basements of G2 and H2 buildings. As a result of this event, the contractor has had to collect and dispose of water offsite; (2) The failure of a sump pump at a KAPL outfall resulted in a Notice of Violation issued by the New York State Department of Environment and Conservation (NYSDEC) and subsequent Consent Order. On-site water now requires treatment and off-site disposition; and (3) stormwater infiltration has resulted in Strontium-90 levels discharged to the storm drains that exceed NR standards. The contractor has indicated that water management at SPRU requires major staff resources (at least 50 persons). The purpose of this review is to determine if the contractor's technical approach warrants the large number of staff resources and to ensure that the technical approach is compliant and in accordance with federal, state and NR requirements.

  14. Coupling GIS and LCA for biodiversity assessments of land use: Part 2: Impact assessment

    E-Print Network [OSTI]

    Geyer, Roland; Lindner, Jan P.; Stoms, David M.; Davis, Frank W.; Wittstock, Bastian

    2010-01-01

    2002) Handbook on life cycle assessment, operational guideEnvironmental management—life cycle assessment—requirementsThe purpose of life cycle assessment is to synthesize a

  15. Study of Risk Assessment Programs at Federal Agencies and Commercial Industry Related to the Conduct or Regulation of High Hazard Operations

    SciTech Connect (OSTI)

    Bari, R.; Rosenbloom, S.; O'Brien, J.

    2011-03-13

    In the Department of Energy (DOE) Implementation Plan (IP) for Defense Nuclear Facilities Safety Board's Recommendation 2009-1, the DOE committed to studying the use of quantitative risk assessment methodologies at government agencies and industry. This study consisted of document reviews and interviews of senior management and risk assessment staff at six organizations. Data were collected and analyzed on risk assessment applications, risk assessment tools, and controls and infrastructure supporting the correct usage of risk assessment and risk management tools. The study found that the agencies were in different degrees of maturity in the use of risk assessment to support the analysis of high hazard operations and to support decisions related to these operations. Agencies did not share a simple, 'one size fits all' approach to tools, controls, and infrastructure needs. The agencies recognized that flexibility was warranted to allow use of risk assessment tools in a manner that is commensurate with the complexity of the application. The study also found that, even with the lack of some data, agencies application of the risk analysis structured approach could provide useful insights such as potential system vulnerabilities. This study, in combination with a companion study of risk assessment programs in the DOE Offices involved in high hazard operations, is being used to determine the nature and type of controls and infrastructure needed to support risk assessments at the DOE.

  16. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  17. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  18. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  19. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  20. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  1. Desk study of the proposed Petroleum Resource Management and Assessment project for the Western Siberia Administration, Russia. Volume 1. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1992-05-15

    The United States Trade and Development Program (TDP) is considering the provision of funds to allow a U.S. firm or firms to be hired to conduct a feasibility study on a Petroleum Resource Management and Assessment project in Russia's West Siberian Basin. To evaluate whether or not to fund the study, TDP contracted a Desk Study to evaluate the concept of the project; cost out the scope of work for the feasibility study; estimate the potential exports of U.S. equipment and services during project implementation; and make a recommendation as to whether TDP should fund the study. The goal of the feasibility study would be to stem the rapid decline in oil and gas production which has resulted in a well-publicized hard currency crisis.

  2. Comparative assessment of municipal sewage sludge incineration, gasification and pyrolysis for a sustainable sludge-to-energy management in Greece

    SciTech Connect (OSTI)

    Samolada, M.C.; Zabaniotou, A.A.

    2014-02-15

    Highlights: • The high output of MSS highlights the need for alternative routes of valorization. • Evaluation of 3 sludge-to-energy valorisation methods through SWOT analysis. • Pyrolysis is an energy and material recovery process resulting to ‘zero waste’. • Identification of challenges and barriers for MSS pyrolysis in Greece was investigated. • Adopters of pyrolysis systems face the challenge of finding new product markets. - Abstract: For a sustainable municipal sewage sludge management, not only the available technology, but also other parameters, such as policy regulations and socio-economic issues should be taken in account. In this study, the current status of both European and Greek Legislation on waste management, with a special insight in municipal sewage sludge, is presented. A SWOT analysis was further developed for comparison of pyrolysis with incineration and gasification and results are presented. Pyrolysis seems to be the optimal thermochemical treatment option compared to incineration and gasification. Sewage sludge pyrolysis is favorable for energy savings, material recovery and high added materials production, providing a ‘zero waste’ solution. Finally, identification of challenges and barriers for sewage sludge pyrolysis deployment in Greece was investigated.

  3. Assessment of Safety Culture at the U.S. Departmen to Energy Office of Environmental Management Headquarters, November 2012

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (BillionProvedTravel TravelChallenges | DepartmentPowerMarketingArea6 Assessment Report:2013-2014

  4. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  5. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  6. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  7. 6 Management Plan Introduction

    E-Print Network [OSTI]

    147 6 Management Plan Introduction The management plan integrates the vision for the White Salmon for restoration of fish and wildlife habitat and populations which form the bulk of the management plan is derived from that input. The scope of the management plan is somewhat narrower than the scope of the assessment

  8. Professional Certificate in Environmental Management UCD School of Public Health,

    E-Print Network [OSTI]

    is to provide a broad perspective on environmental assessment and management to professionals that are required to Environmental Science · Environmental Assessment and Management. Further Module Information: Further information of the scientific principles underlying environmental assessment and management and professionally interact

  9. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  10. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Environmental Management (EM)

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  11. Enterprise Assessments Review of the Savannah River Site Emergency...

    Broader source: Energy.gov (indexed) [DOE]

    the Savannah River Site Emergency Management Exercise Program November 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office...

  12. Enterprise Assessments Review of the Y-12 National Security Complex...

    Broader source: Energy.gov (indexed) [DOE]

    Y-12 National Security Complex Emergency Management Exercise Program August 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments...

  13. Project Management Practices

    Broader source: Energy.gov (indexed) [DOE]

    Version) See Figure 3-3. 19. Administrative Controls 1. Provisions relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to...

  14. Results of Phase I groundwater quality assessment for single-shell tank waste management Area S-SX at the Hanford Site

    SciTech Connect (OSTI)

    Johnson, V.G.; Chou, C.J.

    1998-01-01

    Pacific Northwest National Laboratory (PNNL) conducted a Phase I, Resource Conservation and Recovery Act of 1976 (RCRA) groundwater quality assessment for the Richland Field Office of the U.S. Department of Energy (DOE-RL), in accordance with the Federal Facility Compliance Agreement. The purpose of the investigation was to determine if the Single-Shell Tank Waste Management Area (WMA) S-SX has impacted groundwater quality. The WMA is located in the southern portion of the 200 West Area of the Hanford Site and consists of the 241-S and 241-SX tank farms and ancillary waste systems. The unit is regulated under RCRA interim-status regulations (40 CFR 265, Subpart F) and was placed in assessment groundwater monitoring (40 CFR 265.93 [d]) in August 1996 because of elevated specific conductance and technetium-99, a non-RCRA co-contaminant, in downgradient monitoring wells. Major findings of the assessment are summarized below: (1) Distribution patterns for radionuclides and RCRA/dangerous waste constituents indicate WMA S-SX has contributed to groundwater contamination observed in downgradient monitoring wells. (2) Drinking water standards for nitrate and technetium-99 are currently exceeded in one RCRA-compliant well (299-W22-46) located at the southeastern comer of the SX tank farm. (3) Technetium-99, nitrate, and chromium concentrations in downgradient well 299-W22-46 (the well with the highest current concentrations) appear to be declining after reaching maximum concentrations in May 1997. (4) Cesium-137 and strontium-90, major constituents of concern in single-shell tank waste, were not detected in any of the RCRA-compliant wells in the WMA network, including the well with the highest current technetium-99 concentrations (299-W22-46). (5) Low but detectable strontium-90 and cesium-137 were found in one old well (2-W23-7), located inside and between the S and SX tank farms.

  15. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  16. Classification ofAttributes and Behavior in Risk Management Using Bayesian Networks

    E-Print Network [OSTI]

    Akl, Robert

    Classification ofAttributes and Behavior in Risk Management Using Bayesian Networks Ram Dantu path from the root to the end node suitable vulnerability analysis and risk management strategies-Attack Graphs, Behavior, Risk Management and risk management with these graph transitions. For many years

  17. School of Resource and Environmental Management

    E-Print Network [OSTI]

    of the concept of sustainable development requires competent stewardship and management of resources management, protected areas management, environmental impact assessment, and climate change. EachSchool of Resource and Environmental Management SIMON FRASER UNIVERSITY Sessional Instructor

  18. Environmental Assessment and Finding of No Significant Impact: Interim Measures for the Mixed Waste Management Facility Groundwater at the Burial Ground Complex at the Savannah River Site

    SciTech Connect (OSTI)

    N /A

    1999-12-08

    The U. S. Department of Energy (DOE) prepared this environmental assessment (EA) to analyze the potential environmental impacts associated with the proposed interim measures for the Mixed Waste Management Facility (MW) groundwater at the Burial Ground Complex (BGC) at the Savannah River Site (SRS), located near Aiken, South Carolina. DOE proposes to install a small metal sheet pile dam to impound water around and over the BGC groundwater seepline. In addition, a drip irrigation system would be installed. Interim measures will also address the reduction of volatile organic compounds (VOCS) from ''hot-spot'' regions associated with the Southwest Plume Area (SWPA). This action is taken as an interim measure for the MWMF in cooperation with the South Carolina Department of Health and Environmental Control (SCDHEC) to reduce the amount of tritium seeping from the BGC southwest groundwater plume. The proposed action of this EA is being planned and would be implemented concurrent with a groundwater corrective action program under the Resource Conservation and Recovery Act (RCRA). On September 30, 1999, SCDHEC issued a modification to the SRS RCRA Part B permit that adds corrective action requirements for four plumes that are currently emanating from the BGC. One of those plumes is the southwest plume. The RCRA permit requires SRS to submit a corrective action plan (CAP) for the southwest plume by March 2000. The permit requires that the initial phase of the CAP prescribe a remedy that achieves a 70-percent reduction in the annual amount of tritium being released from the southwest plume area to Fourmile Branch, a nearby stream. Approval and actual implementation of the corrective measure in that CAP may take several years. As an interim measure, the actions described in this EA would manage the release of tritium from the southwest plume area until the final actions under the CAP can be implemented. This proposed action is expected to reduce the release of tritium from the southwest plume area to Fourmile Branch between 25 to 35 percent. If this proposed action is undertaken and its effectiveness is demonstrated, it may become a component of the final action in the CAP. This document was prepared in compliance with the National Environmental Policy Act (NEPA) of 1969, as amended; the requirements of the Council on Environmental Quality Regulations for Implementing NEPA (40 CFR 1500-1508); and the DOE Regulations for Implementing NEPA (10 CFR 1021). NEPA requires the assessment of environmental consequences of Federal actions that may affect the quality of the human environment. Based on the potential for impacts described herein, DOE will either publish a Finding of No Significant Impact (FONSI) or prepare an environmental impact statement (EM).

  19. Geologic mapping for groundwater resource protection and assessment

    SciTech Connect (OSTI)

    Shafer, J.M. (Univ. of South Carolina, Columbia, SC (United States). Earth Sciences and Resources Inst.); Berg, R.C. (Illinois State Geological Survey, Champaign, IL (United States))

    1993-03-01

    Groundwater is a vital natural resource in the US and around the world. In order to manage and protect this often threatened resource one must better understand its occurrence, extent, and susceptibility to contamination. Geologic mapping is a fundamental approach to developing more detailed and accurate assessments of groundwater resources. The stratigraphy and lithology of earth materials provide the framework for groundwater systems, whether they are deep confined aquifers or shallow, water table environments. These same earth materials control, in large part, the rates of migration of water and contaminants into and through groundwater systems thus establishing the potential yields of the systems and their vulnerability to contamination. Geologic mapping is used to delineate and display the vertical sequencing of earth materials either in cross-section or over lateral areas as in the stack-unit geologic map. These geologic maps, along with supportive hydrogeologic information, are used to identify the three-dimensional positioning and continuity of aquifer and non-aquifer earth materials. For example, detailed stack-unit mapping to a depth of 30 meters has been completed for a portion of a northern Illinois county. Groundwater contamination potentials were assigned to various vertical sequences of materials. Where aquifers are unconfined, groundwater contamination potentials are greatest. Conversely, other considerations being equal, the thicker the confining unit, the lower the contamination potential. This information is invaluable for land use decision-making; water supply assessment, development, and management; and environmental protection planning.

  20. {Control of Residential Load Management Networks Using Real Time Pricing

    E-Print Network [OSTI]

    Burke, William Jerome

    2010-01-01

    modeling and control of load management. Further, withoutA profit-based load management using linear programming”.with applica- tions to load management assessment and load

  1. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  2. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  3. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  4. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  5. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  6. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  7. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  8. Joint environmental assessment 1997--2001 of the California Department of Food and Agriculture Curly Top Virus Control Program for Bureau of Land Management and Department of Energy

    SciTech Connect (OSTI)

    1997-03-01

    The DOE, Naval Petroleum reserves in California (NPRC), proposes to sign an Amendment to the Cooperative Agreement and Supplement with the California Department of Food and Agriculture (CDFA) to extend the term of the Curly Top Virus Control Program (CTVCP) in California. This program involves Malathion spraying on NPRC lands to control the beet leafhopper, over a five year period from 1997 through 2001. It is expected that approximately 330 acres on Naval Petroleum Reserve Number 1 (NPR-1) and approximately 9,603 acres on Naval Petroleum Reserve Number 2 (NPR-2) will be treated with Malathion annually by CDFA during the course of this program. The actual acreage subject to treatment can vary from year to year. Pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as amended, the potential impacts of the proposed action were analyzed in a Joint Environmental Assessment (DOE/EA-1011) with the US Department of Interior, Bureau of Land Management (BLM) acting as lead agency, in consultation with the CDFA, and the DOE acting as a cooperating agency. Based on the analysis in the EA, DOE has determined that the conduct of the Curly Top Virus Control Program in California is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the NEPA. Therefore, the preparation of an Environmental Impact Statement is not required and DOE is consequently issuing a FONSI.

  9. Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on

    E-Print Network [OSTI]

    OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having access to relevant weather and climate data is essential for developing appropriate planning, risk

  10. Manage Your Time 

    E-Print Network [OSTI]

    White, Lynn

    2000-06-27

    People view time in different ways, but we all could do a better job of managing our time. This publication explains three different time management tools: the 24-hour time log and chart; a self-assessment of thinking styles and time management...

  11. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  12. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  13. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  14. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  15. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  16. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  17. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  18. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  19. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  20. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  1. Role Of Informal Solid Waste Management Sector And Possibilities Of Integration; The

    E-Print Network [OSTI]

    Columbia University

    Role Of Informal Solid Waste Management Sector And Possibilities Of Integration; The Case religion. Attracts tourist from all over the globe. #12;Municipal Solid Waste management : Current Formal;Social-Economic Vulnerability #12;Major Solid Waste management Options for the city Incineration based

  2. IMPROVING ENERGY EFFICIENCY AND REDUCING COSTS IN THE DRINKING WATER SUPPLY INDUSTRY: An ENERGY STAR Resource Guide for Energy and Plant Managers

    E-Print Network [OSTI]

    Brown, Moya Melody, Camilla Dunham Whitehead, Rich

    2011-01-01

    10   Energy Management Systems andiii Appendix D: Assessing Energy Management Systems for Bestof each system. ? Energy management systems and programs (

  3. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  4. Assessing the assessments: Pharmaceuticals in the environment

    SciTech Connect (OSTI)

    Enick, O.V. Moore, M.M.

    2007-11-15

    The relatively new issue of pharmaceutical contamination of the environment offers the opportunity to explore the application of values to the construction, communication and management of risk. The still-developing regulatory policies regarding environmental contamination with pharmaceuticals provide fertile ground for the introduction of values into the definition and management of risk. In this report, we summarize the current knowledge regarding pharmaceutical contamination of the environment and discuss specific attributes of pharmaceuticals that require special consideration. We then present an analysis showing that if values are incorporated into assessing, characterizing and managing risk, the results of risk assessments will more accurately reflect the needs of various stakeholders. Originating from an acknowledgement of the inherent uncertainty and value-laden nature of risk assessment, the precautionary principle (and later, the multi-criteria, integrated risk assessment), provides a direction for further research and policy development.

  5. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  6. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  7. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  8. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  9. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  10. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  11. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  12. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  13. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  14. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  15. The Environmental Management Project Manager`s Handbook for improved project definition

    SciTech Connect (OSTI)

    NONE

    1995-02-01

    The United States Department of Energy (DOE) is committed to providing high quality products that satisfy customer needs and are the associated with this goal, DOE personnel must possess the knowledge, skills, and abilities to ensure successful job performance. In addition, there must be recognition that the greatest obstacle to proper project performance is inadequate project definition. Without strong project definition, DOE environmental management efforts are vulnerable to fragmented solutions, duplication of effort, and wastes resources. The primary means of ensuring environmental management projects meet cost and schedule milestones is through a structured and graded approach to project definition, which is the focus of this handbook.

  16. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT January 2008 OFFICE OF UNIVERSITY RISK MANAGEMENT CP-320 714-278-7346 #12;2006 ­ 2007 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  17. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2006 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2005 ­ 2006 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  18. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  19. Management Plan Management Plan

    E-Print Network [OSTI]

    Management Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids in the Deschutes River. The Management Plan consists of five elements described in the Council's program: 1

  20. Utility of Social Modeling for Proliferation Assessment - Preliminary Assessment

    SciTech Connect (OSTI)

    Coles, Garill A.; Gastelum, Zoe N.; Brothers, Alan J.; Thompson, Sandra E.

    2009-06-01

    This Preliminary Assessment draft report will present the results of a literature search and preliminary assessment of the body of research, analysis methods, models and data deemed to be relevant to the Utility of Social Modeling for Proliferation Assessment research. This report will provide: 1) a description of the problem space and the kinds of information pertinent to the problem space, 2) a discussion of key relevant or representative literature, 3) a discussion of models and modeling approaches judged to be potentially useful to the research, and 4) the next steps of this research that will be pursued based on this preliminary assessment. This draft report represents a technical deliverable for the NA-22 Simulations, Algorithms, and Modeling (SAM) program. Specifically this draft report is the Task 1 deliverable for project PL09-UtilSocial-PD06, Utility of Social Modeling for Proliferation Assessment. This project investigates non-traditional use of social and cultural information to improve nuclear proliferation assessment, including nonproliferation assessment, proliferation resistance assessments, safeguards assessments and other related studies. These assessments often use and create technical information about the State’s posture towards proliferation, the vulnerability of a nuclear energy system to an undesired event, and the effectiveness of safeguards. This project will find and fuse social and technical information by explicitly considering the role of cultural, social and behavioral factors relevant to proliferation. The aim of this research is to describe and demonstrate if and how social science modeling has utility in proliferation assessment.

  1. NISTIR 8023 Risk Management for

    E-Print Network [OSTI]

    with replication devices. Keywords 3D printers; 3D scanners; copiers; countermeasures; exploits; mitigation; multifunction devices; printers; replication devices; risk; risk assessment; risk management; scanners; security

  2. Performing Energy Security Assessments - A How-To Guide for Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Guide...

  3. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    for windows vista. In Software Testing, Verification andthe Effectiveness of Software Testing Strate- gies. IEEEBruce Potter. Software security testing. IEEE Security and

  4. Development and application of downscaled hydroclimatic predictor variables for use in climate vulnerability and assessment studies.

    E-Print Network [OSTI]

    Thorne, James H; Boynton, Ryan; Flint, Lorriane; Flint, Alan; N'goc Le, Thuy

    2012-01-01

    Mexico and Idaho; Flint and Flint 2007, 2009, 2011) was applied to  California following regional calibrations for solar 

  5. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    within the substation networks. Countermeasures are identified for improvement of the cybersecurity has also leveraged the cost of system deployment among the vendors to improve system upgradeability

  6. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    within the substation networks. Countermeasures are identified for improvement of the cybersecurity for wide area communication. The compatibility of standards has also leveraged the cost of system

  7. A METHOD FOR RAPID VULNERABILITY ASSESSMENT OF STRUCTURES LOADED BY OUTSIDE BLASTS

    E-Print Network [OSTI]

    Cizelj, Leon

    , Matjaz Leskovar, Marko Cepin, Borut Mavko "Jozef Stefan" Institute, Reactor Engineering Division Keywords revisited and analyzed in greater detail. The first studies of the kind scrutinized the experience from. The proposed method includes basic provisions to predict the inelastic response and failure. Simplicity

  8. Northeast Climate Science Center: Transposing Extreme Rainfall to Assess Climate Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Climate models predict significant increases in the magnitude and frequency of extreme rainfalls.  However, climate model projections of precipitation vary greatly across models.  For communities...

  9. Columbia University, EE Technical Report #2008-08-26, Aug. 2008 Assessing the Vulnerability of

    E-Print Network [OSTI]

    Zussman, Gil

    disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by anything from Electromagnetic Pulse (EMP) attacks [14], [24] to dragging anchors [6], [27]. Such real

  10. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  11. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    for the strategic and economic well being of the Nation. The blackout of August 14, 2003 affected 8 states and fifty 3 The DOE/NERC reports are at https://reports.energy.gov/ and ftp://www.nerc.com/pub/sys/all_updl/docs/pressrel/Blackout

  12. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment|

  13. Appendix A: Choosing and Using Assessment Management Systems: What Librarians Need to Know Megan Oakleaf, Jackie Belanger, Carlie Graham | ACRL National Conference, 2013AMS

    E-Print Network [OSTI]

    Oakleaf, Megan

    Oakleaf, Jackie Belanger, Carlie Graham | ACRL National Conference, 2013AMS Characteristics Facets, library, etc.) Y Y N Y Y Y Y Y Y Y RepositoryCapacity Serves as a repository for assessment evidence assignment of assessment tasks/responsibilities/duties Y Y Y Y Y Y Y Y Y Y Allows for role-based or unit

  14. 5) Management 5) Management

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken & Thieret (1997) · Types of information utilized Ecological impacts #12;5) Management c) Control impacts Economic impacts #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken

  15. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  16. Assessment of the effectiveness of the advanced programmatic risk analysis and management model (apram) as a decision support tool for construction projects 

    E-Print Network [OSTI]

    Imbeah, William Kweku Ansah

    2007-09-17

    Construction projects are complicated and fraught with so many risks that many projects are unable to meet pre-defined project objectives. Managers of construction projects require decision support tools that can be used ...

  17. A Framework for Assessing Cost Management System Changes: The Case of Activity-Based Costing Implementation at General Motors, 1986-1993

    E-Print Network [OSTI]

    Anderson, Shannon W.

    2002-09-10

    An opportunity to study the technical and organizational impact of management accounting system changes has emerged with companies' adoption of activity-based costing (ABC). This paper provides a structured account of ...

  18. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  19. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  20. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  1. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  2. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  3. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  4. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  5. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  6. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  7. Office of Enterprise Assessments Review of the Sandia National...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sandia National LaboratoriesNew Mexico 2014 Site-Level Emergency Management Exercise April 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health...

  8. Enterprise Assessments Review of the Y-12 National Security Complex...

    Office of Environmental Management (EM)

    Complex Emergency Management Exercise Program - August 2015 Enterprise Assessments Review of the Y-12 National Security Complex Emergency Management Exercise Program - August...

  9. Enterprise Assessments Review of the Sandia National Laboratories...

    Office of Environmental Management (EM)

    Sandia National LaboratoriesNew Mexico Emergency Management Exercise Program November 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health...

  10. Hazardous waste transportation risk assessment for the US Department of Energy Environmental Restoration and Waste Management Programmatic Environmental Impact Statement -- human health endpoints

    SciTech Connect (OSTI)

    Hartmann, H.M.; Policastro, A.J.; Lazaro, M.A.

    1994-03-01

    In this presentation, a quantitative methodology for assessing the risk associated with the transportation of hazardous waste (HW) is proposed. The focus is on identifying air concentrations of HW that correspond to specific human health endpoints.

  11. Transforming trash: reuse as a waste management and climate change mitigation strategy

    E-Print Network [OSTI]

    Vergara, Sintana Eugenia

    2011-01-01

    2010. Solid Waste Technology and Management. 1 st ed. JohnCurrent status of solid waste management: Technologies andfor assessing solid waste management technologies and

  12. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  13. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  14. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  15. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  16. A Framework for Environmental Assessment of CO2 Capture and Storage Systems

    E-Print Network [OSTI]

    Sathre, Roger

    2013-01-01

    Environmental Management: Life Cycle Assessment—RequirementsA, Turkenburg W. Life cycle assessment of a pulverized coalPehnt M, Henkel J. Life cycle assessment of carbon dioxide

  17. Life-Cycle Assessment of Concrete: Decision-Support Tool and Case Study Application

    E-Print Network [OSTI]

    Gursel, Aysegul Petek

    2014-01-01

    Example of a Hybrid Life-Cycle Assessment of ConstructionD.W. Pennington, Life cycle assessment: Part 1: Framework,management - Life Cycle Assessment: Principles and

  18. The role of Life Cycle Assessment in identifying and reducing environmental impacts of CCS

    E-Print Network [OSTI]

    Sathre, Roger

    2011-01-01

    Environmental Management: Life Cycle Assessment—RequirementsA, Turkenburg W. 2008. Life cycle assessment of a pulverizedM, Henkel J. 2009. Life cycle assessment of carbon dioxide

  19. Assessment of Tire Technologies and Practices for Potential Waste and Energy Use Reductions

    E-Print Network [OSTI]

    Lutsey, Nicholas P.; Regnier, Justin; Burke, Andy; Melaina, Marc W; Bremson, Joel; Keteltas, Michael

    2006-01-01

    Managements Life Cycle Assessments: Principles andand R. Stark, 1999. “Life Cycle Assessment of a Car Tire. ”portal/themes/esh/life_cycle_assessments_en/dow nload/life_

  20. Sustainability Index for Water Resources Planning and Management

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    demonstrating the use of the index. Tailor-made sustainability indexes are defined for water users in Mexico, environmental and hydrological integrity." Although this concept is still valid, water management policies of systems to actual or expected future changes. Vulnerability is the magnitude of an adverse impact

  1. Protogynous species require special management considerations when fish-

    E-Print Network [OSTI]

    232 Protogynous species require special management considerations when fish- ing reduces). However, pro- togyny does not automatically imply elevated vulnerability to fishing if the population, to predict stock dynam- ics and a species' response to fishing pressure, it is important not only

  2. ORNL is managed by UT-Battelle for the US Department of Energy

    E-Print Network [OSTI]

    Weston, Ken

    ORNL is managed by UT-Battelle for the US Department of Energy Climate Change Science Institute to micrometer scales. #12;System Vulnerabilities to Extreme Events Prepare, Respond, Recover · Energy. Managing, their impact on human and natural land-energy-water systems, and maintain a stable climate. #12;Extreme Events

  3. Assessment of methods for evaluating adequacy of physical protection systems

    SciTech Connect (OSTI)

    Chapman, L.D.

    1980-01-01

    Generally, the scope of a safeguards evaluation model can efficiently address one of two issues: (1) global safeguards effectiveness or (2) vulnerability analysis for individual scenarios. A brief description of the variety of models developed in these areas is discussed. Current generation models are described along with an assessment of their utility and a brief look at future techniques for evaluation will be noted.

  4. Guidance document for groundwater protection needs assessments

    SciTech Connect (OSTI)

    Cobb, R.P.; Berg, R.C.; Wehrmann, H.A.

    1995-01-01

    The purpose of this document is to serve as a guidebook for conducting Groundwater Protection Needs Assessments (GPNA). The intent of a GPNA is to provide a comprehensive evaluation of the groundwater protection measures necessary in order to assure a long-term supply of potable water that is not highly vulnerable to contamination. The Illinois Environmental Protection Agency (IEPA), the Illinois State Geological Survey (ISGS) and the Illinois State Water Survey (ISWS) have developed the approach discussed for undertaking of GPNA.

  5. Voice over IP: Risks, Threats and Vulnerabilities Angelos D. Keromytis

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    , as well as the potential for lower cost through equipment consolidation and, for the con- sumer market reinforced this trend. In this envi- ronment of constant innovation, individuals, governments un- derstanding and managing their risks. In this struggle, cost reductions, convenience and new

  6. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    Amherst, Massachusetts 01003 Qiang Qiang Management Division Pennsylvania State University Great Valley School of Graduate Professional Studies Malvern, Pennsylvania 19355 April 2010; revised May 2010 and the identification of the importance of network components, such as nodes and links. We demonstrated how rigorously

  7. Virginia coastal resources management program

    SciTech Connect (OSTI)

    Not Available

    1985-08-01

    Approval of a coastal management plan for coastal land and water use activities on the coast of Virginia is proposed. The coastal management area would embrace all of Tidewater Virginia, approximately 5000 miles long, and would extend to the three-mile outer limit of the United States territorial sea. The core regulatory program would include fisheries management, subaqueous lands management, wetland management, dunes management, nonpoint source pollution control, point source pollution control, shoreline sanitation, and air pollution control. Geographic areas of particular concern would be designated as worthy of special consideration in any planning or management process. These areas would include natural resource areas, such as wetlands, spawning areas, coastal sand dunes, barrier islands, and special wildlife management areas. Natural hazard areas would include areas vulnerable to erosion and areas subject to damage from wind, tides, and storm-related events. Geographic areas of special concern would include those with particular conservation, recreational, ecological, and aesthetic values. Waterfront development areas would include ports, commercial fishing piers, and community waterfronts. Shorefront access planning would provide access to the shoreline and water for recreational activities. Each year, two additional boat ramps would be planned for construction. Energy facility planning would focus on facilities involved in the production of electricity and petroleum, and in the export of coal. Shoreline erosion mitigation planning would identify, control, and mitigate erosion.

  8. Independent Oversight Review of Management of Safety Systems...

    Office of Environmental Management (EM)

    MAP Master Assessment Plan MII Management Item Form NCR Nonconformance Report NMMP Nuclear Maintenance Management Program NNSS Nevada National Security Site OFI Opportunity for...

  9. VALUATION FOR LIFE CYCLE ASSESSMENT OF

    E-Print Network [OSTI]

    Bateman, Ian J.

    VALUATION FOR LIFE CYCLE ASSESSMENT OF WASTE MANAGEMENT OPTIONS by Jane C. Powell David Pearce and Inger Brisson CSERGE Working Paper WM 95-07 #12;VALUATION FOR LIFE CYCLE ASSESSMENT OF WASTE MANAGEMENT-use, recycling and source reduction. The context of the study is life cycle assessment (LCA), which seeks

  10. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT AND ENVIRONMENTAL HEALTH & INSTRUCTIONAL SAFETY 2009 ANNUAL REPORTS #12;2009 Annual Report Page 2 RISK MANAGEMENT I. Program Cost One method to assess the effectiveness of the University's risk management program is to compare the annual cost

  11. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT 2010 ANNUAL REPORT #12;2010 Annual Report Page 2 I. Program Cost One method to assess the effectiveness of the University's risk management,538 $ 197,196 TOTAL Risk Management Costs $ 4,675,390 $ 4,541,975 $ 3,764,749 $ 3,703,959 $ 4

  12. Transforming trash: reuse as a waste management and climate change mitigation strategy

    E-Print Network [OSTI]

    Vergara, Sintana Eugenia

    2011-01-01

    Models for waste life cycle assessment: Review of technical1998. Streamlined Life-Cycle Assessment. Upper Saddle River,if' scenarios in life cycle assessment of waste management

  13. Applications of Risk Assessment in the Development of Climate Change Adaptation Policy

    E-Print Network [OSTI]

    Michalak, Anna M.

    an evaluation of the strengths and weaknesses of present climate change risk assessment methods in terms1 Applications of Risk Assessment in the Development of Climate Change Adaptation Policy A future risks of climate change. Future impacts and the vulnerability of the impacted system are used

  14. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  15. Independent Oversight Assessment, Los Alamos National Laboratory- August 2011

    Broader source: Energy.gov [DOE]

    Facility Centered Assessment of the Los Alamos National Laboratory Science and Technology Operations - Facility Operations Director Managed Facilities

  16. Technology Assessment TECHNOLOGY ASSESSMENT

    E-Print Network [OSTI]

    Rock, Chris

    Technology Assessment 10/14/2004 1 TECHNOLOGY ASSESSMENT STRATEGIC PLAN MISSION STATEMENT Support the Mission of Texas Tech University and the TTU Information Technology Division by providing timely and relevant information and assistance in current and emerging technologies and their practical applications

  17. DOE limited standard: Operations assessments

    SciTech Connect (OSTI)

    NONE

    1996-05-01

    Purpose of this standard is to provide DOE Field Element assessors with a guide for conducting operations assessments, and provide DOE Field Element managers with the criteria of the EM Operations Assessment Program. Sections 6.1 to 6.21 provide examples of how to assess specific areas; the general techniques of operations assessments (Section 5) may be applied to other areas of health and safety (e.g. fire protection, criticality safety, quality assurance, occupational safety, etc.).

  18. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program. QAP 49 summary of evaluations of 3217 reported analyses

    SciTech Connect (OSTI)

    Greenlaw, P.D.

    1998-12-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 49th set of environmental quality assessment samples (QAP XLIX) that were received on or before December 1, 1998.

  19. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  20. Corporate Functional Management Evaluation of the LLNL Radiation Safety Organization

    SciTech Connect (OSTI)

    Sygitowicz, L S

    2008-03-20

    A Corporate Assess, Improve, and Modernize review was conducted at Lawrence Livermore National Laboratory (LLNL) to evaluate the LLNL Radiation Safety Program and recommend actions to address the conditions identified in the Internal Assessment conducted July 23-25, 2007. This review confirms the findings of the Internal Assessment of the Institutional Radiation Safety Program (RSP) including the noted deficiencies and vulnerabilities to be valid. The actions recommended are a result of interviews with about 35 individuals representing senior management through the technician level. The deficiencies identified in the LLNL Internal Assessment of the Institutional Radiation Safety Program were discussed with Radiation Safety personnel team leads, customers of Radiation Safety Program, DOE Livermore site office, and senior ES&H management. There are significant issues with the RSP. LLNL RSP is not an integrated, cohesive, consistently implemented program with a single authority that has the clear roll and responsibility and authority to assure radiological operations at LLNL are conducted in a safe and compliant manner. There is no institutional commitment to address the deficiencies that are identified in the internal assessment. Some of these deficiencies have been previously identified and corrective actions have not been taken or are ineffective in addressing the issues. Serious funding and staffing issues have prevented addressing previously identified issues in the Radiation Calibration Laboratory, Internal Dosimetry, Bioassay Laboratory, and the Whole Body Counter. There is a lack of technical basis documentation for the Radiation Calibration Laboratory and an inadequate QA plan that does not specify standards of work. The Radiation Safety Program lack rigor and consistency across all supported programs. The implementation of DOE Standard 1098-99 Radiological Control can be used as a tool to establish this consistency across LLNL. The establishment of a site wide ALARA Committee and administrative control levels would focus attention on improved processes. Currently LLNL issues dosimeters to a large number of employees and visitors that do not enter areas requiring dosimetry. This includes 25,000 visitor TLDs per year. Dosimeters should be issued to only those personnel who enter areas where dosimetry is required.