Powered by Deep Web Technologies
Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

2

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

3

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

4

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

5

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

6

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

7

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

8

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

9

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

10

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

11

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

12

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

13

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

14

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

15

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

16

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

17

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

18

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

19

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

20

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS  

SciTech Connect (OSTI)

The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

Ray Fink

2006-10-01T23:59:59.000Z

22

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

23

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

24

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

25

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

26

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

27

VULNERABILITY ASSESSMENT FOR MINING SUBSIDENCE HAZARD DECK Olivier1  

E-Print Network [OSTI]

, roads, public facilities and public functions) as well as they deal with method of assessment is of a highly accidental nature when it takes place over mines that use abandoned rooms and pillars method even

Paris-Sud XI, Université de

28

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

29

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

30

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

31

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

32

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

33

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

34

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

35

CRAD, Configuration Management Assessment Plan  

Broader source: Energy.gov [DOE]

The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders.

36

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

37

Risk assessment in environmental management  

SciTech Connect (OSTI)

This book is a straightforward exposition of US EPA-based procedures for the risk assessment and risk management of contaminated land, interwoven with discussions on some of the key fundamentals on the fate and transport of chemicals in the environment and the toxic action of environmental chemicals. The book is logically structured, commencing with a general overview of the principles of risk assessment and the interface with environmental legislation. There follows an introduction to environmental fate and transport, modeling, toxicology and uncertainty analysis, and a discussion of the elements of a risk assessment (site characterization, exposure analysis, toxic action and risk characterization), intake of a chemical with its environmental concentration and activity-related parameters such as inhalation rate and exposure time. The book concludes with a discussion on the derivation of risk-based action levels and remediation goals.

Asante-Duah, D.K.

1998-07-01T23:59:59.000Z

38

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

39

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

40

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents  

SciTech Connect (OSTI)

The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

Not Available

1993-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

BSBA IN MANAGEMENT -HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN  

E-Print Network [OSTI]

BSBA IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 7 in Human Resource Management (HRM), the goal is to provide a foundation of all areas of human resources countries. · Content Delivered in: MGT 350, MGT 405, & MGT 357. · Assessment Method: Culminating exam

Gallo, Linda C.

42

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

43

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy Savers [EERE]

Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

44

Bureau of Land Management's Environmental Assessment | Department...  

Broader source: Energy.gov (indexed) [DOE]

Management's Environmental Assessment - T G Power LLC Hot Sulphur Springs Transmission Line, 120 kV Electric Power Line, Northern Independence Valley, Elko County, Nevada Bureau...

45

Manager's Signature Log Privacy Impact Assessment, Office of...  

Office of Environmental Management (EM)

Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's...

46

Management Assessment and Independent Assessment Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The revision to this Guide reflects current assessment practices, international standards, and changes in the Department of Energy expectations. Cancels DOE G 414.1-1. Canceled by DOE G 414.1-1B.

2001-05-31T23:59:59.000Z

47

Supplier Management Self-Assessment Tool  

E-Print Network [OSTI]

This tool represents a framework that companies can utilize to conduct a self-assessment of how much progress they have made in developing lean supply chain management capabilities. In addition, it can be used to establish ...

Lean Advancement Initiative

48

Senior Technical Safety Manager Qualification Program Self-Assessment...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of...

49

Management and Independent Assessments Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide reflects updated standards for assessment practices, international standards, and changes in DOE expectations related to quality assurance (QA). Cancels DOE G 414.1-1B.

2014-03-27T23:59:59.000Z

50

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

51

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

52

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

53

Marginal Lands: Concept, Assessment and Management  

SciTech Connect (OSTI)

Marginal lands have received wide attention for their potential to improve food security and support bioenergy production. However, environmental, ecosystem service, and sustainability concerns have been widely raised over the use of marginal land. Knowledge of the extent, location, and quality of marginal lands as well as their assessment and management are limited and diverse. This paper provides a review of the historical development of marginal concept, its application and assessment. Limitations and priority research needs of marginal land assessment and management were discussed.

Kang, Shujiang [ORNL; Post, Wilfred M [ORNL; West, Tristram O. [Joint Global Change Research Institute, PNNL; Bandaru, Vara Prasad [ORNL; Izaurralde, Dr. R. Cesar [Pacific Northwest National Laboratory (PNNL); Wang, Dali [ORNL; Nichols, Dr Jeff A [ORNL

2013-01-01T23:59:59.000Z

54

Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework  

SciTech Connect (OSTI)

In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

2012-07-01T23:59:59.000Z

55

Shift manager workload assessment - A case study  

SciTech Connect (OSTI)

In early 2003, Bruce Power restarted two of its previously laid up units in the Bruce A generating station, Units 3 and 4. However, due to challenges relating to the availability of personnel with active Shift Manager licenses, an alternate shift structure was proposed to ensure the safe operation of the station. This alternate structure resulted in a redistribution of responsibility, and a need to assess the resulting changes in workload. Atomic Energy of Canada Limited was contracted to perform a workload assessment based on the new shift structure, and to provide recommendations, if necessary, to ensure Shift Managers had sufficient resources available to perform their required duties. This paper discusses the performance of that assessment, and lessons learned as a result of the work performed during the Restart project. (authors)

Berntson, K.; Kozak, A. [Bruce Power, P O Box 1540 B10, Tiverton, Ont. N0G 2T0 (Canada); Malcolm, J. S. [Atomic Energy of Canada Ltd., 2251 Speakman Drive, Mississauga, Ont. L5K 1B2 (Canada)

2006-07-01T23:59:59.000Z

56

Seamless Energy Management Systems Part I: Assessment of Energy  

E-Print Network [OSTI]

Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key to Engineer the Future Electric Energy System #12;#12;Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key Technological Requirements Final Project Report Project Faculty Team

57

T-581: Novell Access Manager Java Double Literal Denial of Service...  

Broader source: Energy.gov (indexed) [DOE]

Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

58

Privacy Impact Assessment OFEO Facilities Management System Facilities Center  

E-Print Network [OSTI]

Privacy Impact Assessment OFEO Facilities Management System ­ Facilities Center I. System Identification 1. IT System Name: Facilities Management System - FacilityCenter 2. IT System Sponsor: Office. IT System Manager: Michelle T. Gooch, Facilities Management Systems Manager 5. PIA Author: Michelle T. Gooch

Mathis, Wayne N.

59

Bonneville - Hood River Vegetation Management Environmental Assessment  

SciTech Connect (OSTI)

To maintain the reliability of its electrical system, BPA, in cooperation with the U.S. Forest Service, needs to expand the range of vegetation management options used to clear unwanted vegetation on about 20 miles of BPA transmission line right-of-way between Bonneville Dam and Hood River; Oregon, within the Columbia Gorge National Scenic Area (NSA). We propose to continue controlling undesirable vegetation using a program of Integrated Vegetation Management (IVM) which includes manual, biological and chemical treatment methods. BPA has prepared an Environmental Assessment (EA) (DOE/EA-1257) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required and BPA is issuing this FONSI.

N /A

1998-08-01T23:59:59.000Z

60

Implementing Management Systems-Based Assessments  

SciTech Connect (OSTI)

A management system approach for evaluating environment, safety, health, and quality is in use at Sandia National Laboratories (SNL). Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000. As a multi-program national laboratory, SNL has many diverse operations including research, engineering development and applications, production, and central services supporting all activities and operations. Basic research examples include fusion power generation, nuclear reactor experiments, and investigation of combustion processes. Engineering development examples are design, testing, and prototype developments of micro-mechanical systems for safe'~arding computer systems, air bags for automobiles, satellite systems, design of transportation systems for nuclear materials, and systems for use in medical applications such as diagnostics and surgery. Production operations include manufacture of instrumented detection devices, radioisotopes, and replacement parts for previously produced engineered systems. Support services include facilities engineering, construction, and site management, site security, packaging and transportation of hazardous materials wastes, ES&H functional programs to establish requirements and guidance to comply with federal, state, local, and contractual requirements and work safety. In this diverse environment, unlike more traditional single function business units, an integrated consistent management system is not typical. Instead, each type of diverse activity has its own management system designed and distributed around the operations, personnel, customers, and facilities (e.g., hazards involved, security, regulatory requirements, and locations). Laboratory managers are not likely to have experience in the more traditional hierarchical or command and control structures and thus do not share oversight expectations found in centralized management systems. The resulting corporate management system gives the appearance of an assembly of multiple, nearly independent operating units. The executive management system maintains these separate units, encouraging autonomy and creativity by establishing a minimum of requirements and procedures. In any organization, senior management has a responsibility to ensure that all operating units are meeting requirements. Part of this responsibility is fulfilled by conducting oversight or assurance activities, to determine the effectiveness of established systems in meeting requirements and performance expectations. Internal independent assessment is one of these assurance activities. Independent appraisals are combined with external audits and appraisals, self-assessments, peer reviews, project reviews, and other internal and external audits (e.g., financial, contractual) for a more complete assurance view. At SNL, internal independent appraisals are performed by the Audit Center, which reports directly to the Executive Vice President. ES&H independent appraisals are the responsibility of the ES&H and Quality Assessments Department, with a staff complement of eight. With our organization's charter to perform internal, independent appraisals, we set out to develop an approach and associated tools, which would be useful in the overall SNL environment and within our resource limitations.

Campisi, John A.; Reese, Robert T.

1999-05-03T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Radioactive Waste Management Complex performance assessment: Draft  

SciTech Connect (OSTI)

A radiological performance assessment of the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory was conducted to demonstrate compliance with appropriate radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the general public. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the general public via air, ground water, and food chain pathways. Projections of doses were made for both offsite receptors and individuals intruding onto the site after closure. In addition, uncertainty analyses were performed. Results of calculations made using nominal data indicate that the radiological doses will be below appropriate radiological criteria throughout operations and after closure of the facility. Recommendations were made for future performance assessment calculations.

Case, M.J.; Maheras, S.J.; McKenzie-Carter, M.A.; Sussman, M.E.; Voilleque, P.

1990-06-01T23:59:59.000Z

62

Ann Williamson, Deputy Director, Office of Environmental Assessment Mike Cox, Manager, Risk Assessment Unit, Office of Environmental Assessment  

E-Print Network [OSTI]

Ann Williamson, Deputy Director, Office of Environmental Assessment Mike Cox, Manager, Risk, WA Ann Williamson and Mike Cox, EPA Region 10 Office of Environmental Assessment, will be presenting

63

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

64

DOE's New Checklist Helps Plants Assess Energy Management Activities...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

simple checklist can help a facility assess whether Superior Energy Performance (SEP) or ISO 50001 are practical next steps, or if foundational energy management activities...

65

Save Energy Now Assessment Helps Expand Energy Management Program...  

Broader source: Energy.gov (indexed) [DOE]

identify significant energy savings opportunities in their Dalton, Georgia, plant's steam system. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw...

66

Climate Vulnerability, Risk assessment and management in a Post-Kyoto PI: Gunter Stephan  

E-Print Network [OSTI]

the industrialized to the developing countries are viewed as key elements in combating climate change, since change? How do climate change, discounting and population growth interact? What disasters, and (2) how insurance companies act in order to cope with the risk of climate change. Based upon

Richner, Heinz

67

An Open-Source Learning Content Management and Assessment System  

E-Print Network [OSTI]

LON-CAPA An Open-Source Learning Content Management and Assessment System Gerd Kortemeyer-CAPA is free open-source a learning content management system an assessment system around since 1992 #12 Cross-Institutional Resource Library (Base de Dados Compartilhada entre Instituições) Resource Assembly

68

Environmental Management Assessment of the National Renewable Energy Laboratory (NREL)  

SciTech Connect (OSTI)

This report documents the results of the environmental management assessment performed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. The onsite portion of the assessment was conducted from September 14 through September 27, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). During this assessment, the activities conducted by the assessment team included reviews of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and NREL contractor personnel; and inspections and observations of selected facilities and operations. The environmental management assessment of NREL focused on the adequacy of environmental management systems and assessed the formality of programs employing an approach that recognizes the level of formality implementing environmental programs may vary commensurate with non-nuclear research and development operations. The Assessment Team evaluated environmental monitoring, waste management and National Environmental Policy Act (NEPA) activities at NREL, from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section of this report. The scope of the NREL Environmental Management Assessment was comprehensive and included all areas of environmental management. At the same time, environmental monitoring, waste management, and NEPA activities were evaluated to develop a programmatic understanding of these environmental disciplines, building upon the results of previous appraisals, audits, and reviews performed at the NREL.

Not Available

1993-09-01T23:59:59.000Z

69

Implementation of Industrial Assessment Center Energy and Waste Management Recommendations  

E-Print Network [OSTI]

the associated costs and savings. The report is sent to the company which then is responsible for the implementation of the projects, including funding. Case studies of three successful assessments are provided, and were chosen due to management cooperation...

King, J. D.; Eggebrecht, J. A.; Heffington, W. M.

70

COMPARATIVE HEALTH IMPACT ASSESSMENTS ON FECAL SLUDGE MANAGEMENT PRACTICES  

E-Print Network [OSTI]

i COMPARATIVE HEALTH IMPACT ASSESSMENTS ON FECAL SLUDGE MANAGEMENT PRACTICES: A CASE STUDY OF KLONG Fecal sludge (FS) is widely acknowledged as a major source of infectious pathogens. However, the proper

Richner, Heinz

71

An Open-Source Learning Content Management and Assessment System  

E-Print Network [OSTI]

LON-CAPA An Open-Source Learning Content Management and Assessment System Gerd Kortemeyer Michigan system an assessment system around since 1992 #12;Free and Open-Source · Free: "Free beer=split(/\\,/,$line); $username=$entries[4]; _ #12;Campus A Campus B LON-CAPA Architecture Shared Cross-Institutional Resource

72

Risk assessment and management of radiofrequency radiation exposure  

SciTech Connect (OSTI)

Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.

Dabala, Dana [Railways Medical Clinic Cluj-Napoca, Occupational Medicine Department, 16-20 Bilascu Gheorghe St., 400015 Cluj-Napoca (Romania)] [Railways Medical Clinic Cluj-Napoca, Occupational Medicine Department, 16-20 Bilascu Gheorghe St., 400015 Cluj-Napoca (Romania); Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)] [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)

2013-11-13T23:59:59.000Z

73

NGNP Risk Management through Assessing Technology Readiness  

SciTech Connect (OSTI)

Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

John W. Collins

2010-08-01T23:59:59.000Z

74

Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty and managing risk. After  

E-Print Network [OSTI]

Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty and managing risk. After reviewing the reasons for addressing uncertainty in the Council's Fifth Power Plan the studies evaluated the performance of resource plans under uncertainty, including their associated risk

75

Methodology for assessing performance of waste management systems  

SciTech Connect (OSTI)

The purpose of the methodology provided in this report is to select the optimal way to manage particular sets of waste streams from generation to disposal in a safe and cost-effective manner. The methodology described is designed to review the entire waste management system, assess its performance, ensure that the performance objectives are met, compare different LLW management alternatives, and select the optimal alternative. The methodology is based on decision analysis approach, in which costs and risk are considered for various LLW management alternatives, a comparison of costs, risks, and benefits is made, and an optimal system is selected which minimizes costs and risks and maximizes benefits. A ''zoom-lens'' approach is suggested, i.e., one begins by looking at gross features and gradually proceeds to more and more detail. Performance assessment requires certain information about the characteristics of the waste streams and about the various components of the waste management system. Waste acceptance criteria must be known for each component of the waste management system. Performance assessment for each component requires data about properties of the waste streams and operational and design characteristics of the processing or disposal components. 34 refs., 2 figs., 1 tab.

Meshkov, N.K.; Herzenberg, C.L.; Camasta, S.F.

1988-01-01T23:59:59.000Z

76

FLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT MEASURES FOR FLOOD MANAGEMENT SYSTEMS1  

E-Print Network [OSTI]

FLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT variability/change; risk assessment; flood management; water resources flexibility.) DiFrancesco, Kara N of Assessment Measures for Flood Management Systems. Journal of the American Water Resources Association (JAWRA

Tullos, Desiree

77

Nondestructive radioassay for waste management: an assessment  

SciTech Connect (OSTI)

Nondestructive Assay (NDA) for Transuranic Waste Management is used to mean determining the amount of transuranic (TRU) isotopes in crates, drums, boxes, cans, or other containers without having to open the container. It also means determining the amount of TRU in soil, bore holes, and other environmental testing areas without having to go through extensive laboratory wet chemistry analyses. it refers to radioassay techniques used to check for contamination on objects after decontamination and to determine amounts of TRU in waste processing streams without taking samples to a laboratory. Gednerally, NDA instrumentation in this context refers to all use of radioassay which does not involve taking samples and using wet chemistry techniques. NDA instruments have been used for waste assay at some sites for over 10 years and other sites are just beginning to consider assay of wastes. The instrumentation used at several sites is discussed in this report. Almost all these instruments in use today were developed for special nuclear materials safeguards purposes and assay TRU waste down to the 500 nCi/g range. The need for instruments to assay alpha particle emitters at 10 nCi/g or less has risen from the wish to distinguish between Low Level Waste (LLW) and TRU Waste at the defined interface of 10 nCi/g. Wastes have historically been handled as TRU wastes if they were just suspected to be transuranically contaminated but their exact status was unknown. Economic and political considerations make this practice undesirable since it is easier and less costly to handle LLW. This prompted waste generators to want better instrumentation and led the Transuranic Waste Management Program to develop and test instrumentation capable of assaying many types of waste at the 10 nCi/g level. These instruments are discussed.

Lehmkuhl, G.D.

1981-06-01T23:59:59.000Z

78

SDSS Data Management and Photometric Quality Assessment  

E-Print Network [OSTI]

We summarize the Sloan Digital Sky Survey data acquisition and processing steps, and describe runQA, a pipeline designed for automated data quality assessment. In particular, we show how the position of the stellar locus in color-color diagrams can be used to estimate the accuracy of photometric zeropoint calibration to better than 0.01 mag in 0.03 deg2 patches. Using this method, we estimate that typical photometric zeropoint calibration errors for SDSS imaging data are not larger than ~0.01 mag in the g, r, and i bands, 0.02 mag in the z band, and 0.03 mag in the u band (root-mean-scatter for zeropoint offsets).

Z. Ivezic; R. H. Lupton; D. Schlegel; B. Boroski; J. Adelman-McCarthy; B. Yanny; S. Kent; C. Stoughton; D. Finkbeiner; N. Padmanabhan; C. M. Rockosi; J. E. Gunn; G. R. Knapp; M. A. Strauss; G. T. Richards; D. Eisenstein; T. Nicinski; S. J. Kleinman; J. Krzesinski; P. R. Newman; S. Snedden; A. R. Thakar; A. Szalay; J. A. Munn; J. A. Smith; D. Tucker; B. C. Lee

2004-10-07T23:59:59.000Z

79

Environmental Assessment : Squawfish Management Program : Final.  

SciTech Connect (OSTI)

Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

United States. Bonneville Power Administration.

1992-05-01T23:59:59.000Z

80

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Integrated Safeguards and Security Management Self-Assessment 2004  

SciTech Connect (OSTI)

In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

Lunford, Dan; Ramsey, Dwayne

2005-04-01T23:59:59.000Z

82

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

83

Assessment of Disposal Options for DOE-Managed High-Level Radioactive...  

Office of Environmental Management (EM)

Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and...

84

The Paradoxes of Military Risk Assessment: Will the Enterprise Risk Assessment Model, Composite Risk Management and Associated  

E-Print Network [OSTI]

to assess the nation's military preparedness. However, risk management is not a panacea for the problemsThe Paradoxes of Military Risk Assessment: Will the Enterprise Risk Assessment Model, Composite Risk Management and Associated Techniques Provide the Predicted Benefits? Chris. W. Johnson, Glasgow

Johnson, Chris

85

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

86

What life-cycle assessment does and does not do in assessments of waste management  

SciTech Connect (OSTI)

In assessments of the environmental impacts of waste management, life-cycle assessment (LCA) helps expanding the perspective beyond the waste management system. This is important, since the indirect environmental impacts caused by surrounding systems, such as energy and material production, often override the direct impacts of the waste management system itself. However, the applicability of LCA for waste management planning and policy-making is restricted by certain limitations, some of which are characteristics inherent to LCA methodology as such, and some of which are relevant specifically in the context of waste management. Several of them are relevant also for other types of systems analysis. We have identified and discussed such characteristics with regard to how they may restrict the applicability of LCA in the context of waste management. Efforts to improve LCA with regard to these aspects are also described. We also identify what other tools are available for investigating issues that cannot be adequately dealt with by traditional LCA models, and discuss whether LCA methodology should be expanded rather than complemented by other tools to increase its scope and applicability.

Ekvall, Tomas [IVL Swedish Environmental Research Institute, P.O. Box 5302, SE-400 14 Goeteborg (Sweden)], E-mail: tomas.ekvall@ivl.se; Assefa, Getachew [Industrial Ecology, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Bjoerklund, Anna [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Eriksson, Ola [Technology and Built Environment, University of Gaevle, SE-801 76 Gaevle (Sweden); Finnveden, Goeran [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden)

2007-07-01T23:59:59.000Z

87

Assessing Infrastructure Decisions to Manage Water Resources in the Valle de Mxico  

E-Print Network [OSTI]

PORSE E. Assessing Infrastructure Decisions to Manage Water Resources in the Valle de México Erik inherent uncertainty. Such a framework can be used to assess groundwater management and water supply. Keywords Groundwater; water, management; Mexico City; infrastructure INTRODUCTION: GROUNDWATER AND CITIES

Paris-Sud XI, Université de

88

An Assessment of Integrated Health Management (IHM) Frameworks  

SciTech Connect (OSTI)

In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging nuclear power plants presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to the better understanding and management of the challenges posed by aging nuclear power plants. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of a NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of a NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

N. Lybeck; M. Tawfik; L. Bond; J. Coble

2012-05-01T23:59:59.000Z

89

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

90

V-125: Cisco Connected Grid Network Management System Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

91

T-614: Cisco Unified Communications Manager Database Security...  

Energy Savers [EERE]

614: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

92

Waste Management Recommendations in the Texas A&M University Industrial Assessment Center Program  

E-Print Network [OSTI]

The Texas A&M University Industrial Assessment Center (IAC) was one of the four Energy Analysis & Diagnostic Centers (EADC) that began providing waste management, in addition to energy and demand conservation, assessments in January, 1994. Over 30...

Eggebrecht, J. A.; Heffington, W. M.

93

Life cycle assessment of bagasse waste management options  

SciTech Connect (OSTI)

Bagasse is mostly utilized for steam and power production for domestic sugar mills. There have been a number of alternatives that could well be applied to manage bagasse, such as pulp production, conversion to biogas and electricity production. The selection of proper alternatives depends significantly on the appropriateness of the technology both from the technical and the environmental points of view. This work proposes a simple model based on the application of life cycle assessment (LCA) to evaluate the environmental impacts of various alternatives for dealing with bagasse waste. The environmental aspects of concern included global warming potential, acidification potential, eutrophication potential and photochemical oxidant creation. Four waste management scenarios for bagasse were evaluated: landfilling with utilization of landfill gas, anaerobic digestion with biogas production, incineration for power generation, and pulp production. In landfills, environmental impacts depended significantly on the biogas collection efficiency, whereas incineration of bagasse to electricity in the power plant showed better environmental performance than that of conventional low biogas collection efficiency landfills. Anaerobic digestion of bagasse in a control biogas reactor was superior to the other two energy generation options in all environmental aspects. Although the use of bagasse in pulp mills created relatively high environmental burdens, the results from the LCA revealed that other stages of the life cycle produced relatively small impacts and that this option might be the most environmentally benign alternative.

Kiatkittipong, Worapon [Department of Chemical Engineering, Faculty of Engineering and Industrial Technology, Silpakorn University, Nakhon Pathom 73000 (Thailand); National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Wongsuchoto, Porntip [National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Pavasant, Prasert [National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Department of Chemical Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok 10330 (Thailand)], E-mail: prasert.p@chula.ac.th

2009-05-15T23:59:59.000Z

94

Final Environmental assessment for the Uranium Lease Management Program  

SciTech Connect (OSTI)

The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

NONE

1995-07-01T23:59:59.000Z

95

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

96

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

97

Assessment of Brine Management for Geologic Carbon Sequestration  

E-Print Network [OSTI]

brine management or extracted water management infrastructure or where nearby fresh water resources need to be carefully monitored for later contamination.

Breunig, Hanna M.

2014-01-01T23:59:59.000Z

98

assessing biodiversity management: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

24 25 Next Page Last Page Topic Index 281 Density Management In Pacific Northwest Forests Renewable Energy Websites Summary: lands Emphasis on managing for biodiversity and...

99

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol  

SciTech Connect (OSTI)

This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

NONE

1994-09-01T23:59:59.000Z

100

Assessment of Managed Aquifer Recharge Site Suitability Using a GIS and Modeling  

E-Print Network [OSTI]

with a regional groundwater model to assess the hydrologic impact of potential MAR placement and operating planning, including evaluation of options for enhancing groundwater resources. Introduction ManagedAssessment of Managed Aquifer Recharge Site Suitability Using a GIS and Modeling by Tess A. Russo1

Fisher, Andrew

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

102

Office of Emergency Management Assessments | Department of Energy  

Office of Environmental Management (EM)

requiring a quantitative Emergency Planning Hazards Assessment. Works closely with other IEA offices and DOE line organizations to schedule and undertake assessments. Evaluates...

103

A National Assessment of the Intrastructure for Urban Wildlife Management  

E-Print Network [OSTI]

ecosystems. Universities and state wildlife agencies are the main driving forces for research and management, and it is crucial that these institutions provide support for managing wildlife in urban environments. Universities (n = 73) and state wildlife...

Murphy, Michaela Rene

2014-08-01T23:59:59.000Z

104

An Economic, Hydrologic, and Environmental Assessment of Water Management Alternative Plans for the South Central Texas Region*1  

E-Print Network [OSTI]

An Economic, Hydrologic, and Environmental Assessment of Water Management Alternative Plans. The economic, hydrologic, and environmental consequences of the "best" choice of regional water management plan, and water management plans. #12;3 An Economic, Hydrologic, and Environmental Assessment of Water Management

McCarl, Bruce A.

105

Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Office of Civilian Radioactive Waste Management Fee Adequacy Assessment Report is to present an analysis of the adequacy of the fee being paid by nuclear power utilities...

106

PPPO-02-427-07 Revised Solid Waste Management Unit Assessment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6&D1 Secondary Document C-755-GSA-23 Located at C-755 Near the East Fence Line Solid Waste Management Unit Assessment Report UNIT NUMBER: 551 DATE OF ORIGINAL SAR: 12303 DATE OF...

107

PPPO-02-340-07 Revised Solid Waste Management Unit Assessment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7&D1 Secondary Document C-747 Contaminated Burial Yard and C-748-B Burial Area Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 4 DATE OF ORIGINAL SAR: 824...

108

PPPO-02-427-07 Revised Solid Waste Management Unit Assessment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

O7-0023&D1 Secondary Document G-746-S-01 GSA Next to the Sanitary Landfill Solid Waste Management Unit Assessment Report UNIT NUMBER: 415 DATE OF ORIGINAL SAR: 011901 DATE OF SAR...

109

PPPO-02-296-08 Revised Solid Waste Management Unit Assessment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6-P and C-746-P1 Scrap Yards Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 13 DATE OF ORIGINAL SAR: 8241987 DATE OF SAR REVISION: 123107 REGULATORY...

110

H-340-01 Solid Waste Management Unit (SWMU) Assessment Report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

340-01 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 566 DATE OF ORIGINAL SAR: 12110 DATE OF SAR REVISIONS: NA REGULATORY STATUS: SWMU LOCATION: C-340...

111

PPPO-02-427-07 Revised Solid Waste Management Unit Assessment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Area for Concrete Piers, Rubble, and Wood on the North Side of C-745-B Cylinder Yard Solid Waste Management Unit Assessment Report UNIT NUMBER: 548 DATE OF ORIGINAL SAR: 627...

112

Environmental management assessment of the Waste Isolation Pilot Plant (WIPP), Carlsbad, New Mexico  

SciTech Connect (OSTI)

This document contains the results of the Environmental Management Assessment of the Waste Isolation Pilot Plant (WIPP). This Assessment was conducted by EH-24 from July 19 through July 30, 1993 to advise the Secretary of Energy of the adequacy of management systems established at WIPP to ensure the protection of the environment and compliance with Federal, state, and DOE environmental requirements. The mission of WIPP is to demonstrate the safe disposal of transuranic (TRU) waste. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the management and operating contractors. This assessment revealed that WIPP`s environmental safety and health programs are satisfactory, and that all levels of the Waste Isolation Division (WID) management and staff consistently exhibit a high level of commitment to achieve environmental excellence.

Not Available

1993-07-01T23:59:59.000Z

113

Senior Technical Safety Manager Qualification Program Self-Assessment- Chief of Nuclear Safety  

Broader source: Energy.gov [DOE]

This Chief of Nuclear Safety (CNS) Report was prepared to summarize the results of the July 2013 CNS self-assessment of the Senior Technical Safety Manager Qualification Program.

114

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

115

Development and initial assessment of Texas Cooperative Extension's white-tailed dear management module  

E-Print Network [OSTI]

DEVELOPMENT AND INITIAL ASSESSMENT OF TEXAS COOPERATIVE EXTENSION?S WHITE-TAILED DEER MANAGEMENT MODULE A Thesis by MARK ANDREW BEDGOOD Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE December 2004 Major Subject: Agricultural Education DEVELOPMENT AND INITIAL ASSESSMENT OF TEXAS COOPERATIVE EXTENSION?S WHITE-TAILED DEER MANAGEMENT MODULE A Thesis by MARK ANDREW...

Bedgood, Mark Andrew

2005-02-17T23:59:59.000Z

116

Environmental management assessment of the National Institute for Petroleum and Energy Research  

SciTech Connect (OSTI)

This report documents the results of the environmental management assessment of the National Institute for Petroleum and Energy Research (NIPER), located in Bartlesville, Oklahoma. The assessment was conducted August 15-26, 1994, by the DOE Office of Environmental Audit (EH-24), located within the Office of Environment, Safety and Health. The assessment included reviews of documents and reports, as well as inspections and observations of selected facilities and operations. Further, the team conducted interviews with management and staff from the Bartlesville Project Office (BPO), the Office of Fossil Energy (FE), the Pittsburgh Energy Technology Center (PETC), state and local regulatory agencies, and BDM Oklahoma (BDM-OK), which is the management and operating (M&O) contractor for NIPER. Because of the transition from a cooperative agreement to an M&O contract in January 1994, the scope of the assessment was to evaluate (1) the effectiveness of BDM-OK management systems being developed and BPO systems in place and under development to address environmental requirements; (2) the status of compliance with DOE Orders, guidance, and directives; and (3) conformance with accepted industry management practices. An environmental management assessment was deemed appropriate at this time in order to identify any systems modifications that would provide enhanced effectiveness of the management systems currently under development.

NONE

1994-08-01T23:59:59.000Z

117

Organizational Assessment Of Integrating CAD And Product Data Management Tools In The Furniture Industry  

E-Print Network [OSTI]

Organizational Assessment Of Integrating CAD And Product Data Management Tools In The Furniture Industry Furniture Manufacturing and Management Center Technical Report 1996-1997 Eric N. Wiebe Jennifer J) organizational structure, 3) power distribution, and 4) user communication patterns. The technology

118

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

119

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

120

Assessment groundwater monitoring plan for single shell tank waste management area B-BX-BY  

SciTech Connect (OSTI)

Single Shell Tank Waste Management Area B-BX-BY has been placed into groundwater quality assessment monitoring under interim-status regulations. This document presents background and an assessment groundwater monitoring plan to evaluate any impacts of risks/spills from these Single Shell Tanks in WMA B-BX-BY on groundwater quality.

Caggiano, J.A.

1996-09-27T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Broader source: Energy.gov (indexed) [DOE]

Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli...

122

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Broader source: Energy.gov (indexed) [DOE]

IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

123

A framework for the assessment of severe accident management strategies  

SciTech Connect (OSTI)

Severe accident management can be defined as the use of existing and/or altemative resources, systems and actors to prevent or mitigate a core-melt accident. For each accident sequence and each combination of severe accident management strategies, there may be several options available to the operator, and each involves phenomenological and operational considerations regarding uncertainty. Operational uncertainties include operator, system and instrumentation behavior during an accident. A framework based on decision trees and influence diagrams has been developed which incorporates such criteria as feasibility, effectiveness, and adverse effects, for evaluating potential severe accident management strategies. The framework is also capable of propagating both data and model uncertainty. It is applied to several potential strategies including PWR cavity flooding, BWR drywell flooding, PWR depressurization and PWR feed and bleed.

Kastenberg, W.E. [ed.; Apostolakis, G.; Dhir, V.K. [California Univ., Los Angeles, CA (United States). Dept. of Mechanical, Aerospace and Nuclear Engineering] [and others

1993-09-01T23:59:59.000Z

124

Assessment of public perception of radioactive waste management in Korea.  

SciTech Connect (OSTI)

The essential characteristics of the issue of radioactive waste management can be conceptualized as complex, with a variety of facets and uncertainty. These characteristics tend to cause people to perceive the issue of radioactive waste management as a 'risk'. This study was initiated in response to a desire to understand the perceptions of risk that the Korean public holds towards radioactive waste and the relevant policies and policy-making processes. The study further attempts to identify the factors influencing risk perceptions and the relationships between risk perception and social acceptance.

Trone, Janis R.; Cho, SeongKyung (Myongji University, Korea); Whang, Jooho (Kyung Hee University, Korea); Lee, Moo Yul

2011-11-01T23:59:59.000Z

125

United States Environmental Protection Agency: Use of risk assessment and risk management methodologies. Master's thesis  

SciTech Connect (OSTI)

Make a full investigation of the policy implications and appropriate uses of risk assessment and risk management in regulatory programs under various Federal laws to prevent cancer and other chronic health effects which may result from exposure to hazardous substances. This is the primary mission of the Risk Assessment and Management Commission (Risk Commission). The Clean Air Act Amendments of 1990 (CAAA), created the Risk Commission reflecting Congress' concern over agency use of risk assessment and risk management techniques and methodologies to implement federal laws protective of human health. The Risk Commission is to consider: methods for measuring and describing risks of chronic health effects from hazardous substances; methods to reflect uncertainties associated with estimation techniques, and whether it is possible or desirable to develop a consistent risk assessment methodology or a consistent standard of acceptable risk for various federal programs.

Lamuro, R.J.

1992-09-30T23:59:59.000Z

126

Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report  

SciTech Connect (OSTI)

This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

NONE

1994-09-01T23:59:59.000Z

127

An Open-Source Learning Content Management and Assessment System  

E-Print Network [OSTI]

;Campus A Campus B LON-CAPA Architecture Shared Cross-Institutional Resource Library (Base de Dados Assembly Course Management LON-CAPA Architecture Shared Cross-Institutional Resource Library (Base de Dados module about energy conservation Writes module about momentum conservation Compiles module about

128

EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site  

Broader source: Energy.gov [DOE]

This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

129

ASSESSING THE IMPACTS OF THE JFK GROUND MANAGEMENT PROGRAM  

E-Print Network [OSTI]

at John F. Kennedy International Airport (JFK) aims to leverage the availability of comprehensive airport. Kennedy International Airport (JFK) in response to a major runway reconstruction project in 2010 and after departure metering was initiated at JFK, to assess its impacts. The results show that airport

Gummadi, Ramakrishna

130

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INLs Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendors system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendors) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

131

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

132

Natural resource management activities at the Savannah River Site. Environmental Assessment  

SciTech Connect (OSTI)

This environmental assessment (EA) reviews the environmental consequences of ongoing natural resource management activities on the Savannah River Site (SRS). Appendix A contains the Natural Resources Management Plant (NRMP). While several SRS organizations have primary responsibilities for different elements of the plan, the United States Department of Agriculture (USDA), Forest Service, Savannah River Forest Station (SRFS) is responsible for most elements. Of the river scenarios defined in 1985, the High-Intensity Management alternative established the upper bound of environmental consequences; it represents a more intense level of resource management than that being performed under current resource management activities. This alternative established compliance mechanisms for several natural resource-related requirements and maximum practical timber harvesting. Similarly, the Low-Intensity Management alternative established the lower bound of environmental consequences and represents a less intense level of resource management than that being performed under current resource management activities. This alternative also established compliance mechanisms, but defined a passively managed natural area. The Proposed Action of this EA describes the current level of multiple-natural resource management. This EA reviews the proposed action, and the high and low intensity alternative scenarios.

Not Available

1993-07-01T23:59:59.000Z

133

Oilfield property development: Risk assessment, management and control  

SciTech Connect (OSTI)

Several regulatory authorities in California have developed new regulations/guidelines for oilfield remediation and subsequent development. The sole intent of the new regulations/guidelines is to protect public health; however, these efforts are often misdirected. In fact, many of the regulations/guidelines impose remediation or construction standards that, in effect, render the development of such properties impractical. These standards include or require stringent contaminant cleanup standards, minimum development setbacks from active and abandoned wells, natural-gas venting provisions for abandoned wells, and the widespread use of soil-gas barriers. Clearly, these regulatory changes have been made without due consideration of risk. Because, in actuality, the risks posed by former oilfield properties are insignificant when compared to other non- oilfield properties. The history of oilfield development in Southern California has shown that although some physical and chemical hazards do exist, oilfield development, properly managed, can usually be accomplished with acceptable residual risk. Rigid control measures, based on inaccurate assumptions, merely inhibit the useful development of valuable property and misdirect resources that could be more effectively applied where the risks are real and significant. To protect public health and allow for efficient resource allocation, risk control measures must be both adequate and proportional to the actual health risks and hazards posed. This paper reviews the history of oil production in Southern California, explains the known health risks associated with oilfield property development, and describes a risk management approach that will address these risks at an acceptable cost.

Robertson, M.; Robles, H.; Manweiler, D. [Environmental Science & Engineering, Inc., Fountain Valley, CA (United States)

1996-08-01T23:59:59.000Z

134

RCRA Assessment Plan for Single-Shell Tank Waste Management Area A-AX at the Hanford Site  

SciTech Connect (OSTI)

This document describes a groundwater assessment plan for the single-shell tank systems in Waste Management Area A-AX at the Hanford Site.

Narbutovskih, Susan M.; Chou, Charissa J.

2006-03-03T23:59:59.000Z

135

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

136

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

137

Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment  

SciTech Connect (OSTI)

DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

Irving, John S

2003-04-01T23:59:59.000Z

138

Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment - April 2003  

SciTech Connect (OSTI)

DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

Irving, J.S.

2003-04-30T23:59:59.000Z

139

Challenges in assessment, management and development of coalbed methane resources in the Powder River Basin, Wyoming  

SciTech Connect (OSTI)

Coalbed methane development in the Powder River Basin has accelerated rapidly since the mid-1990's. forecasts of coalbed methane (CBM) production and development made during the late 1980's and early 1990's have proven to be distinctly unreliable. Estimates of gas in place and recoverable reserves have also varied widely. This lack of reliable data creates challenges in resource assessment, management and development for public resource management agencies and the CBM operators. These challenges include a variety of complex technical, legal and resource management-related issues. The Bureau of Land Management's Wyoming Reservoir Management Group (WRMG) and US Geological Survey (USGS), with the cooperation and assistance of CBM operators and other interested parties have initiated cooperative studies to address some of these issues. This paper presents results of those studies to date and outlines the agencies' goals and accomplishments expected at the studies' conclusion.

McGarry, D.E.

2000-07-01T23:59:59.000Z

140

GUNNISON BASIN CLIMATE CHANGE VULNERABILITY ASSESSMENT  

E-Print Network [OSTI]

Climate change is already changing ecosystems and affecting people in the southwestern United States, as well as ecosystem services, e.g., water supply. The climate of the Gunnison Basin, Colorado Fish and Wildlife Service, US Forest Service, Upper Gunnison River Water Conservancy District, Western

Neff, Jason

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Vulnerability, Risk Management, and Agricultural Development  

E-Print Network [OSTI]

P. (1980). Attitudes Towards Risk: Experimental MeasurementIncentive Flexibility, and Risk. Americal Journal ofCaria, A. S. (2009), Risk Attitudes and The Formation of

Fafchamps, Marcel

2009-01-01T23:59:59.000Z

142

Environmental Assessment/Regulatory Impact Review AMENDMENT 45 TO THE FISHERY MANAGEMENT PLAN  

E-Print Network [OSTI]

Environmental Assessment/Regulatory Impact Review FOR AMENDMENT 45 TO THE FISHERY MANAGEMENT PLAN it would conflict with the Bering Sea non-roe season. At its January 1996 meeting, the Council considered/C Regulatory Areas must be made. Amendment 19 to the FMP, implemented as a measure to prevent roe stripping

143

Clearwater Subbasin Assessment 360 November 2003 9 Resource Synthesis and Definition of Potential Management Units  

E-Print Network [OSTI]

management units. For the purposes of planning at the subbasin scale, and given limitations in data availability and accuracy based on the broad scale nature of this assessment, subjective PMU delineations (Table 66). Due to the large amount of information being synthesized, raw data were often categorized (e

144

QUANTITATIVE MICROBIAL RISK ASSESSMENT OF ORGANIC WASTE MANAGEMENT PRACTICES IN A PERI-URBAN COMMUNITY  

E-Print Network [OSTI]

i QUANTITATIVE MICROBIAL RISK ASSESSMENT OF ORGANIC WASTE MANAGEMENT PRACTICES IN A PERI transfer station and the households who helped me in getting food waste samples. It should thing in my life with this little effort. #12;iii Abstract The growth of municipal solid waste

Richner, Heinz

145

A GUIDE AND A TOOLBOX FOR PUBLIC INVOLVEMENT IN THE ASSESSMENT AND THE MANAGEMENT OF CONTAMINATED SITES  

E-Print Network [OSTI]

A GUIDE AND A TOOLBOX FOR PUBLIC INVOLVEMENT IN THE ASSESSMENT AND THE MANAGEMENT OF CONTAMINATED, franck.marot@ademe.fr Keywords: Public involvement, Stakeholder, Communication, Guide, Tool, Contaminated of the assessment and the management of a contaminated site. It is also perceived as a difficult and sometimes risky

Boyer, Edmond

146

Scientific basis for risk assessment and management of uranium mill tailings  

SciTech Connect (OSTI)

A National Research Council study panel, convened by the Board on Radioactive Waste Management, has examined the scientific basis for risk assessment and management of uranium mill tailings and issued this final report containing a number of recommendations. Chapter 1 provides a brief introduction to the problem. Chapter 2 examines the processes of uranium extraction and the mechanisms by which radionuclides and toxic chemicals contained in the ore can enter the environment. Chapter 3 is devoted to a review of the evidence on health risks associated with radon and its decay products. Chapter 4 provides a consideration of conventional and possible new technical alternatives for tailings management. Chapter 5 explores a number of issues of comparative risk, provides a brief history of uranium mill tailings regulation, and concludes with a discussion of choices that must be made in mill tailing risk management. 211 refs., 30 figs., 27 tabs.

Not Available

1986-01-01T23:59:59.000Z

147

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

148

Drought affects virtually all regions of the world and results in significant economic, social, and environmental impacts. The Federal Emergency Management Agency estimates  

E-Print Network [OSTI]

geospatial decision-support tools to address agricultural drought hazards and identify regions of vulnerability in the management of drought risk. The goal of the National Agricultural Decision Support System assess- ment and exposure analysis. Drought risk management involves both expanding our ability

Goddard, Steve

149

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

150

LCA-IWM: A decision support tool for sustainability assessment of waste management systems  

SciTech Connect (OSTI)

The paper outlines the most significant result of the project 'The use of life cycle assessment tools for the development of integrated waste management strategies for cities and regions with rapid growing economies', which was the development of two decision-support tools: a municipal waste prognostic tool and a waste management system assessment tool. The article focuses on the assessment tool, which supports the adequate decision making in the planning of urban waste management systems by allowing the creation and comparison of different scenarios, considering three basic subsystems: (i) temporary storage; (ii) collection and transport and (iii) treatment, disposal and recycling. The design and analysis options, as well as the assumptions made for each subsystem, are shortly introduced, providing an overview of the applied methodologies and technologies. The sustainability assessment methodology used in the project to support the selection of the most adequate scenario is presented with a brief explanation of the procedures, criteria and indicators applied on the evaluation of each of the three sustainability pillars.

Boer, J. den [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)], E-mail: j.denboer@iwar.tu-darmstadt.de; Boer, E. den; Jager, J. [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)

2007-07-01T23:59:59.000Z

151

Assessment of External Hazards at Radioactive Waste and Used Fuel Management Facilities - 13505  

SciTech Connect (OSTI)

One of the key lessons from the Fukushima accident is the importance of having a comprehensive identification and evaluation of risks posed by external events to nuclear facilities. While the primary focus has been on nuclear power plants, the Canadian nuclear industry has also been updating hazard assessments for radioactive waste and used fuel management facilities to ensure that lessons learnt from Fukushima are addressed. External events are events that originate either physically outside the nuclear site or outside its control. They include natural events, such as high winds, lightning, earthquakes or flood due to extreme rainfall. The approaches that have been applied to the identification and assessment of external hazards in Canada are presented and analyzed. Specific aspects and considerations concerning hazards posed to radioactive waste and used fuel management operations are identified. Relevant hazard identification techniques are described, which draw upon available regulatory guidance and standard assessment techniques such as Hazard and Operability Studies (HAZOPs) and 'What-if' analysis. Consideration is given to ensuring that hazard combinations (for example: high winds and flooding due to rainfall) are properly taken into account. Approaches that can be used to screen out external hazards, through a combination of frequency and impact assessments, are summarized. For those hazards that cannot be screened out, a brief overview of methods that can be used to conduct more detailed hazard assessments is also provided. The lessons learnt from the Fukushima accident have had a significant impact on specific aspects of the approaches used to hazard assessment for waste management. Practical examples of the effect of these impacts are provided. (authors)

Gerchikov, Mark; Schneider, Glenn; Khan, Badi; Alderson, Elizabeth [AMEC NSS, 393 University Ave., Toronto, ON (Canada)] [AMEC NSS, 393 University Ave., Toronto, ON (Canada)

2013-07-01T23:59:59.000Z

152

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

153

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

154

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

155

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

156

Developing a GIS tool to assess potential damage of future floods J. Eleutrio1,2  

E-Print Network [OSTI]

analysis, vulnerability assessment, natural hazard, decision support tool. 1 Introduction Flood risk brings and A. Rozan1 1 UMR Cemagref/ENGEES GESTE, Territorial Management of Water and Environment, France 2 UTR Urban Hydraulics - UMR CNRS/UdS/ ENGEES Mechanical Institute of Fluids and Solids, France Abstract

Boyer, Edmond

157

Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1  

SciTech Connect (OSTI)

With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

1995-06-30T23:59:59.000Z

158

Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2  

SciTech Connect (OSTI)

With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

1995-06-30T23:59:59.000Z

159

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

160

Life cycle assessment of solid waste management options for Eskisehir, Turkey  

SciTech Connect (OSTI)

Life cycle assessment (LCA) methodology was used to determine the optimum municipal solid waste (MSW) management strategy for Eskisehir city. Eskisehir is one of the developing cities of Turkey where a total of approximately 750 tons/day of waste is generated. An effective MSW management system is needed in this city since the generated MSW is dumped in an unregulated dumping site that has no liner, no biogas capture, etc. Therefore, five different scenarios were developed as alternatives to the current waste management system. Collection and transportation of waste, a material recovery facility (MRF), recycling, composting, incineration and landfilling processes were considered in these scenarios. SimaPro7 libraries were used to obtain background data for the life cycle inventory. One ton of municipal solid waste of Eskisehir was selected as the functional unit. The alternative scenarios were compared through the CML 2000 method and these comparisons were carried out from the abiotic depletion, global warming, human toxicity, acidification, eutrophication and photochemical ozone depletion points of view. According to the comparisons and sensitivity analysis, composting scenario, S3, is the more environmentally preferable alternative. In this study waste management alternatives were investigated only on an environmental point of view. For that reason, it might be supported with other decision-making tools that consider the economic and social effects of solid waste management.

Banar, Mufide [Anadolu University, Faculty of Engineering and Architecture, Department of Environmental Engineering, Iki Eylul Campus, 26555 Eskisehir (Turkey)], E-mail: mbanar@anadolu.edu.tr; Cokaygil, Zerrin; Ozkan, Aysun [Anadolu University, Faculty of Engineering and Architecture, Department of Environmental Engineering, Iki Eylul Campus, 26555 Eskisehir (Turkey)

2009-01-15T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Transportation risk assessment for the US Department of Energy Environmental Management Programmatic Environmental Impact Statement  

SciTech Connect (OSTI)

In its Programmatic Environmental Impact Statement (PEIS), the Office of Environmental Management (EM) of the US Department of Energy (DOE) is considering a broad range of alternatives for the future management of radioactive and hazardous waste at the facilities of the DOE complex. The alternatives involve facilities to be used for treatment, storage, and disposal of various wastes generated from DOE`s environmental restoration activities and waste management operation. Included in the evaluation are six types of waste (five types of radioactive waste plus hazardous waste), 49 sites, and numerous cases associated with each different alternative for waste management. In general, the alternatives are evaluated independently for each type of waste and reflect decentralized, regionalized, and centralized approaches. Transportation of waste materials is an integral component of the EM PEIS alternatives for waste management. The estimated impact on human health that is associated with various waste transportation activities is an important element leading to a complete appraisal of the alternatives. The transportation risk assessment performed for the EM PEIS is designed to ensure -- through uniform and judicious selection of models, data, and assumptions -- that relative comparisons of risk among the various alternatives are meaningful and consistent.

Chen, S.Y.; Monette, F.A.; Biwer, B.M.; Lazaro, M.A.; Hartmann, H.M.; Policastro, A.J.

1994-08-01T23:59:59.000Z

162

The role of waste-to-energy in integrated waste management: A life cycle assessment perspective  

SciTech Connect (OSTI)

Municipal Solid Waste (MSW) management has become a major issue in terms of environmental impacts. It has become the focus of local, state and federal regulations, which generally tend to promote the reduce/re-use/recycle/incinerate/landfill environmental hierarchy. At the same time, the Waste Industry capital requirements have increased in order of magnitude since the beginning of the 80`s. The driving forces of further capital requirements for the Waste Management Industry will be the impact of public policies set today and goals set by politicians. Therefore, it appears extremely important for the Waste Industry to correctly analyze and forecast the real environmental and financial costs of waste management practices in order to: discuss with the local, state and federal agencies on more rational grounds; forecast the right investments in new technologies (recycling networks and plants, incinerators with heat recovery, modern landfill). The aim of this paper is to provide an example of a Life Cycle Assessment (LCA) project in the waste management field that raised surprising issues on otherwise unchallenged waste management practices.

Besnainou, J. [Ecobalance, Rockville, MD (United States)

1996-12-31T23:59:59.000Z

163

Integrated farm sustainability assessment for the environmental management of rural activities  

SciTech Connect (OSTI)

Farmers have been increasingly called upon to respond to an ongoing redefinition in consumers' demands, having as a converging theme the search for sustainable production practices. In order to satisfy this objective, instruments for the environmental management of agricultural activities have been sought out. Environmental impact assessment methods are appropriate tools to address the choice of technologies and management practices to minimize negative effects of agricultural development, while maximizing productive efficiency, sound usage of natural resources, conservation of ecological assets and equitable access to wealth generation means. The 'system for weighted environmental impact assessment of rural activities' (APOIA-NovoRural) presented in this paper is organized to provide integrated farm sustainability assessment according to quantitative environmental standards and defined socio-economic benchmarks. The system integrates sixty-two objective indicators in five sustainability dimensions - (i) Landscape ecology, (ii) Environmental quality (atmosphere, water and soil), (iii) Sociocultural values, (iv) Economic values, and (v) Management and administration. Impact indices are expressed in three integration levels: (i) specific indicators, that offer a diagnostic and managerial tool for farmers and rural administrators, by pointing out particular attributes of the rural activities that may be failing to comply with defined environmental performance objectives; (ii) integrated sustainability dimensions, that show decision-makers the major contributions of the rural activities toward local sustainable development, facilitating the definition of control actions and promotion measures; and (iii) aggregated sustainability index, that can be considered a yardstick for eco-certification purposes. Nine fully documented case studies carried out with the APOIA-NovoRural system, focusing on different scales, diverse rural activities/farming systems, and contrasting spatial/territorial contexts, attest to the malleability of the method and its applicability as an integrated farm environmental management tool.

Stachetii Rodrigues, Geraldo, E-mail: stacheti@cnpma.embrapa.b [Embrapa Labex Europe, Agropolis International, Avenue Agropolis, 34394, Montpellier (France); Aparecida Rodrigues, Izilda, E-mail: isis@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Almeida Buschinelli, Claudio Cesar de, E-mail: buschi@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Barros, Inacio de, E-mail: indebarros@antilles.inra.f [INRA, Unite de Recherche Agropedoclimatique da la Zone Caraibe, Domaine Duclos, 97170 Petit-Bourg (France)

2010-07-15T23:59:59.000Z

164

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

165

Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.113  

SciTech Connect (OSTI)

Preliminary results for Version 4.113 of the Nevada National Security Site Area 5 Radioactive Waste Management Site performance assessment model are summarized. Version 4.113 includes the Fiscal Year 2011 inventory estimate.

Shott, G. J.

2012-04-15T23:59:59.000Z

166

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

167

Environmental assessment of garden waste management in the Municipality of Aarhus, Denmark  

SciTech Connect (OSTI)

An environmental assessment of six scenarios for handling of garden waste in the Municipality of Aarhus (Denmark) was performed from a life cycle perspective by means of the LCA-model EASEWASTE. In the first (baseline) scenario, the current garden waste management system based on windrow composting was assessed, while in the other five scenarios alternative solutions including incineration and home composting of fractions of the garden waste were evaluated. The environmental profile (normalised to Person Equivalent, PE) of the current garden waste management in Aarhus is in the order of -6 to 8 mPE Mg{sup -1} ww for the non-toxic categories and up to 100 mPE Mg{sup -1} ww for the toxic categories. The potential impacts on non-toxic categories are much smaller than what is found for other fractions of municipal solid waste. Incineration (up to 35% of the garden waste) and home composting (up to 18% of the garden waste) seem from an environmental point of view suitable for diverting waste away from the composting facility in order to increase its capacity. In particular the incineration of woody parts of the garden waste improved the environmental profile of the garden waste management significantly.

Boldrin, Alessio, E-mail: aleb@env.dtu.dk [Department of Environmental Engineering, Technical University of Denmark, Kongens Lyngby (Denmark); Andersen, Jacob K.; Christensen, Thomas H. [Department of Environmental Engineering, Technical University of Denmark, Kongens Lyngby (Denmark)

2011-07-15T23:59:59.000Z

168

RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY  

SciTech Connect (OSTI)

WMA TX-TY contains underground, single-shell tanks that were used to store liquid waste that contained chemicals and radionuclides. Most of the liquid has been removed, and the remaining waste is regulated under the RCRA as modified in 40 CFR Part 265, Subpart F and Washington States Hazardous Waste Management Act . WMA TX-TY was placed in assessment monitoring in 1993 because of elevated specific conductance. A groundwater quality assessment plan was written in 1993 describing the monitoring activities to be used in deciding whether WMA TX-TY had affected groundwater. That plan was updated in 2001 for continued RCRA groundwater quality assessment as required by 40 CFR 265.93 (d)(7). This document further updates the assessment plan for WMA TX-TY by including (1) information obtained from ten new wells installed at the WMA after 1999 and (2) information from routine quarterly groundwater monitoring during the last five years. Also, this plan describes activities for continuing the groundwater assessment at WMA TX TY.

Horton, Duane G.

2007-03-26T23:59:59.000Z

169

Life cycle assessment of ship-generated waste management of Luka Koper  

SciTech Connect (OSTI)

Sea ports and the related maritime activities (e.g. shipping, shipbuilding, etc.) are one of the main driver of Europe's growth, jobs, competitiveness and prosperity. The continuously growth of shipping sectors has however introduced some environmental concerns, particularly with respect to ship-generated waste management. The port of Koper, one of the major ports on the northern Adriatic Coast, is the focus of this study. In this paper, a life cycle assessment was performed to identify and quantify the environmental impacts caused by the ship-generated waste management of port of Koper. Carcinogens substance (e.g. dioxins) and inorganic emissions, especially heavy metals, resulted to be the most critical environmental issues, while the fossil fuels consumption is reduced by recovery of ship-generated oils. Moreover, the final treatment of ship waste was found to be critical phase of the management, and the landfill have a significant contribute to the overall environmental load. These results can be useful in the identification of the best practices and in the implementation of waste management plans in ports.

Zuin, Stefano, E-mail: sz.cvr@vegapark.ve.i [Consorzio Venezia Ricerche, Via della Liberta 12, c/o PST VEGA, 30175 Venice (Italy); Belac, Elvis; Marzi, Boris [Luka Koper d.d., Vojkovo nabrezje 38, SI - 6501 Koper (Slovenia)

2009-12-15T23:59:59.000Z

170

Management of spent nuclear fuel on the Oak Ridge Reservation, Oak Ridge, Tennessee: Environmental assessment  

SciTech Connect (OSTI)

On June 1, 1995, DOE issued a Record of Decision [60 Federal Register 28680] for the Department-wide management of spent nuclear fuel (SNF); regionalized storage of SNF by fuel type was selected as the preferred alternative. The proposed action evaluated in this environmental assessment is the management of SNF on the Oak Ridge Reservation (ORR) to implement this preferred alternative of regional storage. SNF would be retrieved from storage, transferred to a hot cell if segregation by fuel type and/or repackaging is required, loaded into casks, and shipped to off-site storage. The proposed action would also include construction and operation of a dry cask SNF storage facility on ORR, in case of inadequate SNF storage. Action is needed to enable DOE to continue operation of the High Flux Isotope Reactor, which generates SNF. This report addresses environmental impacts.

NONE

1996-02-01T23:59:59.000Z

171

Applications of life cycle assessment and cost analysis in health care waste management  

SciTech Connect (OSTI)

Highlights: Black-Right-Pointing-Pointer Three Health Care Waste (HCW) scenarios were assessed through environmental and cost analysis. Black-Right-Pointing-Pointer HCW treatment using microwave oven had the lowest environmental impacts and costs in comparison with autoclave and lime. Black-Right-Pointing-Pointer Lime had the worst environmental and economic results for HCW treatment, in comparison with autoclave and microwave. - Abstract: The establishment of rules to manage Health Care Waste (HCW) is a challenge for the public sector. Regulatory agencies must ensure the safety of waste management alternatives for two very different profiles of generators: (1) hospitals, which concentrate the production of HCW and (2) small establishments, such as clinics, pharmacies and other sources, that generate dispersed quantities of HCW and are scattered throughout the city. To assist in developing sector regulations for the small generators, we evaluated three management scenarios using decision-making tools. They consisted of a disinfection technique (microwave, autoclave and lime) followed by landfilling, where transportation was also included. The microwave, autoclave and lime techniques were tested at the laboratory to establish the operating parameters to ensure their efficiency in disinfection. Using a life cycle assessment (LCA) and cost analysis, the decision-making tools aimed to determine the technique with the best environmental performance. This consisted of evaluating the eco-efficiency of each scenario. Based on the life cycle assessment, microwaving had the lowest environmental impact (12.64 Pt) followed by autoclaving (48.46 Pt). The cost analyses indicated values of US$ 0.12 kg{sup -1} for the waste treated with microwaves, US$ 1.10 kg{sup -1} for the waste treated by the autoclave and US$ 1.53 kg{sup -1} for the waste treated with lime. The microwave disinfection presented the best eco-efficiency performance among those studied and provided a feasible alternative to subsidize the formulation of the policy for small generators of HCW.

Soares, Sebastiao Roberto, E-mail: soares@ens.ufsc.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Finotti, Alexandra Rodrigues, E-mail: finotti@ens.ufsc.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Prudencio da Silva, Vamilson, E-mail: vamilson@epagri.sc.gov.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); EPAGRI, Rod. Admar Gonzaga 1347, Itacorubi, Florianopolis, Santa Catarina 88034-901 (Brazil); Alvarenga, Rodrigo A.F., E-mail: alvarenga.raf@gmail.com [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Ghent University, Department of Sustainable Organic Chemistry and Technology, Coupure Links 653/9000 Gent (Belgium)

2013-01-15T23:59:59.000Z

172

An assessment of potential for benefit from integrating geographic information systems technology into life-cycle management of infrastructures a focus for infrastructure management practice  

E-Print Network [OSTI]

: Dr. Robert L. Lytton Infrastructure life-cycle management phases with the greatest potential for benefit from Geographic Information Systems (GIS), is the subject of this thesis. The planning, design, construction, operations, maintenance... then focuses on analysis of data collected by a questionnaire sent to in&astructure managers in Texas. The survey was made to assess how important and frequently they deal with issues associated with the planning, design, construction, operation, maintenance...

Millegan, Harold Lynn

1997-01-01T23:59:59.000Z

173

Joint Assessment of Renewable Energy and Water Desalination Research Center (REWDC) Program Capabilities and Facilities In Radioactive Waste Management  

SciTech Connect (OSTI)

The primary goal of this visit was to perform a joint assessment of the Renewable Energy and Water Desalination Center's (REWDC) program in radioactive waste management. The visit represented the fourth technical and scientific interaction with Libya under the DOE/NNSA Sister Laboratory Arrangement. Specific topics addressed during the visit focused on Action Sheet P-05-5, ''Radioactive Waste Management''. The Team, comprised of Mo Bissani (Team Lead), Robert Fischer, Scott Kidd, and Jim Merrigan, consulted with REWDC management and staff. The team collected information, discussed particulars of the technical collaboration and toured the Tajura facility. The tour included the waste treatment facility, waste storage/disposal facility, research reactor facility, hot cells and analytical labs. The assessment team conducted the first phase of Task A for Action Sheet 5, which involved a joint assessment of the Radioactive Waste Management Program. The assessment included review of the facilities dedicated to the management of radioactive waste at the Tourja site, the waste management practices, proposed projects for the facility and potential impacts on waste generation and management.

Bissani, M; Fischer, R; Kidd, S; Merrigan, J

2006-04-03T23:59:59.000Z

174

Assessment of national systems for obtaining local acceptance of waste management siting and routing activities  

SciTech Connect (OSTI)

There is a rich mixture of formal and informal approaches being used in our sister nuclear democracies in their attempts to deal with the difficulties of obtaining local acceptance for siting of waste management facilities and activities. Some of these are meeting with a degree of success not yet achieved in the US. Although this survey documents and assesses many of these approaches, time did not permit addressing in any detail their relevance to common problems in the US. It would appear the US could benefit from a periodic review of the successes and failures of these efforts, including analysis of their applicability to the US system. Of those countries (Germany, Sweden, Switzerland, Japan, Belgium, and the US) who are working to a time table for the preparation of a high-level waste (HLW) repository, Germany is the only country to have gained local siting acceptance for theirs. With this (the most difficult of siting problems) behind them they appear to be in the best overall condition relative to waste management progress and plans. This has been achieved without a particularly favorable political structure, made up for by determination on the part of the political leadership. Of the remaining three countries studied (France, UK and Canada) France, with its AVM production facility, is clearly the world leader in the HLW immobilization aspect of waste management. France, Belgium and the UK appear to have the least favorable political structures and environments for arriving at waste management decisions. US, Switzerland and Canada appear to have the least favorable political structures and environments for arriving at waste management decisions.

Paige, H.W.; Lipman, D.S.; Owens, J.E.

1980-07-01T23:59:59.000Z

175

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

176

MANAGEMENT OF RESEARCH AND TEST REACTOR ALUMINUM SPENT NUCLEAR FUEL - A TECHNOLOGY ASSESSMENT  

SciTech Connect (OSTI)

The Department of Energy's Environmental Management (DOE-EM) Program is responsible for the receipt and storage of aluminum research reactor spent nuclear fuel or used fuel until ultimate disposition. Aluminum research reactor used fuel is currently being stored or is anticipated to be returned to the U.S. and stored at DOE-EM storage facilities at the Savannah River Site and the Idaho Nuclear Technology and Engineering Center. This paper assesses the technologies and the options for safe transportation/receipt and interim storage of aluminum research reactor spent fuel and reviews the comprehensive strategy for its management. The U.S. Department of Energy uses the Appendix A, Spent Nuclear Fuel Acceptance Criteria, to identify the physical, chemical, and isotopic characteristics of spent nuclear fuel to be returned to the United States under the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program. The fuel is further evaluated for acceptance through assessments of the fuel at the foreign sites that include corrosion damage and handleability. Transport involves use of commercial shipping casks with defined leakage rates that can provide containment of the fuel, some of which are breached. Options for safe storage include wet storage and dry storage. Both options must fully address potential degradation of the aluminum during the storage period. This paper focuses on the various options for safe transport and storage with respect to technology maturity and application.

Vinson, D.

2010-07-11T23:59:59.000Z

177

Comparative evaluation of life cycle assessment models for solid waste management  

SciTech Connect (OSTI)

This publication compares a selection of six different models developed in Europe and America by research organisations, industry associations and governmental institutions. The comparison of the models reveals the variations in the results and the differences in the conclusions of an LCA study done with these models. The models are compared by modelling a specific case - the waste management system of Dresden, Germany - with each model and an in-detail comparison of the life cycle inventory results. Moreover, a life cycle impact assessment shows if the LCA results of each model allows for comparable and consecutive conclusions, which do not contradict the conclusions derived from the other models' results. Furthermore, the influence of different level of detail in the life cycle inventory of the life cycle assessment is demonstrated. The model comparison revealed that the variations in the LCA results calculated by the models for the case show high variations and are not negligible. In some cases the high variations in results lead to contradictory conclusions concerning the environmental performance of the waste management processes. The static, linear modelling approach chosen by all models analysed is inappropriate for reflecting actual conditions. Moreover, it was found that although the models' approach to LCA is comparable on a general level, the level of detail implemented in the software tools is very different.

Winkler, Joerg [Institute for Waste Management and Contaminated Sites Treatment, TU Dresden Faculty of Forestry, Geo and Hydro Sciences, Pratzschwitzer Str. 15, 01796 Pirna (Germany); Bilitewski, Bernd [Institute for Waste Management and Contaminated Sites Treatment, TU Dresden Faculty of Forestry, Geo and Hydro Sciences, Pratzschwitzer Str. 15, 01796 Pirna (Germany)], E-mail: abfall@rcs.urz.tu-dresden.de

2007-07-01T23:59:59.000Z

178

Hawaii demand-side management resource assessment. Final report: DSM opportunity report  

SciTech Connect (OSTI)

The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. 10 figs., 55 tabs.

NONE

1995-08-01T23:59:59.000Z

179

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

180

Identification and assessment of containment and release management strategies for a BWR Mark I containment  

SciTech Connect (OSTI)

This report identifies and assesses accident management strategies which could be important for preventing containment failure and/or mitigating the release of fission products during a severe accident in a BWR plant with a Mark 1 type of containment. Based on information available from probabilistic risk assessments and other existing severe accident research, and using simplified containment and release event trees, the report identifies the challenges a Mark 1 containment could face during the course of a severe accident, the mechanisms behind these challenges, and the strategies that could be used to mitigate the challenges. A safety objective tree is developed which provides the connection between the safety objectives, the safety functions, the challenges, and the strategies. The strategies were assessed by applying them to certain severe accident sequence categories which have one or more of the following characteristics: have high probability of core damage or high consequences, lead to a number of challenges, and involve the failure of multiple systems. 59 refs., 55 figs., 27 tabs.

Lin, C.C.; Lehner, J.R. (Brookhaven National Lab., Upton, NY (United States))

1991-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

An Assessment of Use, Need for, and Capacity to Integrate Climate Information Among Water Managers in Southeastern United States and the ACF Basin  

E-Print Network [OSTI]

An Assessment of Use, Need for, and Capacity to Integrate Climate Information Among Water Managers-year droughts, floods, and associated water management decisions have long concerned water managers in Western states. Similar concerns are now facing water managers in Southeastern states, including those in Georgia

Miami, University of

182

Material and energy recovery in integrated waste management systems. An evaluation based on life cycle assessment  

SciTech Connect (OSTI)

This paper reports the environmental results, integrated with those arising from mass and energy balances, of a research project on the comparative analysis of strategies for material and energy recovery from waste, funded by the Italian Ministry of Education, University and Research. The project, involving the cooperation of five University research groups, was devoted to the optimisation of material and energy recovery activities within integrated municipal solid waste (MSW) management systems. Four scenarios of separate collection (overall value of 35%, 50% without the collection of food waste, 50% including the collection of food waste, 65%) were defined for the implementation of energetic, environmental and economic balances. Two sizes of integrated MSW management system (IWMS) were considered: a metropolitan area, with a gross MSW production of 750,000 t/year and an average province, with a gross MSW production of 150,000 t/year. The environmental analysis was conducted using Life Cycle Assessment methodology (LCA), for both material and energy recovery activities. In order to avoid allocation we have used the technique of the expansion of the system boundaries. This means taking into consideration the impact on the environment related to the waste management activities in comparison with the avoided impacts related to the saving of raw materials and primary energy. Under the hypotheses of the study, both for the large and for the small IWMS, the energetic and environmental benefits are higher than the energetic and environmental impacts for all the scenarios analysed in terms of all the indicators considered: the scenario with 50% separate collection in a drop-off scheme excluding food waste shows the most promising perspectives, mainly arising from the highest collection (and recycling) of all the packaging materials, which is the activity giving the biggest energetic and environmental benefits. Main conclusions of the study in the general field of the assessment of the environmental performance of any integrated waste management scheme address the importance of properly defining, beyond the design value assumed for the separate collection as a whole, also the yields of each material recovered; particular significance is finally related to the amount of residues deriving from material recovery activities, resulting on average in the order of 20% of the collected materials.

Giugliano, Michele; Cernuschi, Stefano [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy); Grosso, Mario, E-mail: mario.grosso@polimi.it [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy); Rigamonti, Lucia [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy)

2011-09-15T23:59:59.000Z

183

Management Challenges in Developing Performance Assessments and Effectively Communicating Their Results - 13612  

SciTech Connect (OSTI)

The end of the Cold War has left a legacy of approximately 37 million gallons of radioactive waste in the aging waste tanks at the Department of Energy's Savannah River Site (SRS). A robust program is in place to remove waste from these tanks, treat the waste to separate into a relatively small volume of high level waste and a large volume of low-level waste, and to actively dispose of the low-level waste on-site and close the cleaned waste tanks and associated ancillary structures. To support performance-based, risk-informed decision making, performance assessments have been developed for the low-level waste disposal facility and for the SRS Tank Farms. Although these performance assessments share many similar features, the nature of the hazards and associated containments differ. As a management team, we are challenged to effectively communicate both the similarities and differences of these performance assessments, how they should be used to support sound decision making for treatment, disposal and waste tank cleaning decisions, and in defending their respective assumptions to the regulatory community and the public but, equally important, to our own corporate decision makers and operations personnel. Effective development and defense of these performance assessments, and effective interpretation and communication of the results are key to making cost-effective, pragmatic decisions for the safe disposal of the low-level waste and stabilization and operational closure of the cleaned tanks and associated structures. This paper will focus on the importance and challenges in communicating key attributes, conclusions and operational implications within a company. (authors)

Thomas, Steve; Mahoney, Mark [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)] [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)

2013-07-01T23:59:59.000Z

184

Radioactive Waste Management Complex low-level waste radiological performance assessment  

SciTech Connect (OSTI)

This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

1994-04-01T23:59:59.000Z

185

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

186

Improvement actions in waste management systems at the provincial scale based on a life cycle assessment evaluation  

SciTech Connect (OSTI)

Highlights: LCA was used for evaluating the performance of four provincial waste management systems. Milano, Bergamo, Pavia and Mantova (Italy) are the provinces selected for the analysis. Most of the data used to model the systems are primary. Significant differences were found among the provinces located in the same Region. LCA was used as a decision-supporting tool by Regione Lombardia. - Abstract: This paper reports some of the findings of the GERLA project: GEstione Rifiuti in Lombardia Analisi del ciclo di vita (Waste management in Lombardia Life cycle assessment). The project was devoted to support Lombardia Region in the drafting of the new waste management plan by applying a life cycle thinking perspective. The present paper mainly focuses on four Provinces in the Region, which were selected based on their peculiarities. Life cycle assessment (LCA) was adopted as the methodology to assess the current performance of the integrated waste management systems, to discuss strengths and weaknesses of each of them and to design their perspective evolution as of year 2020. Results show that despite a usual business approach that is beneficial to all the provinces, the introduction of technological and management improvements to the system provides in general additional energy and environmental benefits for all four provinces. The same improvements can be easily extended to the whole Region, leading to increased environmental benefits from the waste management sector, in line with the targets set by the European Union for 2020.

Rigamonti, L., E-mail: lucia.rigamonti@polimi.it; Falbo, A.; Grosso, M.

2013-11-15T23:59:59.000Z

187

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

188

Assessment of thermal analysis software for the DOE Office of Civilian Radioactive Waste Management  

SciTech Connect (OSTI)

This assessment uses several recent assessments and the more general code compilations that have been completed to produce a list of 116 codes that can be used for thermal analysis. This list is then compared with criteria prepared especially for the Department of Energy Office of Civilian Radioactive Waste Management (DOE/OCRWM). Based on these criteria, fifteen codes are narrowed to three primary codes and four secondary codes for use by the OCRWM thermal analyst. The analyst is cautioned that since no single code is sufficient for all applications, a code must be selected based upon the predominate heat transfer mode of the problem to be solved, but the codes suggested in this report have been used successfully for a range of OCRWM applications. The report concludes with a series of recommendations for additional work of which the major points include the following: The codes suggested by this report must be benchmarked with the existing US and international problems and validated when possible; An interactive code selection tool could be developed or, perhaps even more useful, a users group could be supported to ensure the proper selection of thermal codes and dissemination of information on the latest version; The status of the 116 codes identified by this report should be verified, and methods for maintaining the still active codes must be established; and special capabilities of each code in phase change, convection and radiation should be improved to better enable the thermal analyst to model OCRWM applications. 37 refs., 3 figs., 12 tabs.

Williams, P.T.; Graham, R.F.; Lagerberg, G.N.; Chung, T.C.

1989-07-01T23:59:59.000Z

189

Assessment of transportation risk for the U.S. Department of Energy Environmental Management programmatic environmental impact statement  

SciTech Connect (OSTI)

In its Programmatic Environmental Impact Statement (PEIS), the Office of Environmental Management (EM) of the U.S. Department of Energy (DOE) is considering a broad range of alternatives for the future management of radioactive and hazardous waste at the facilities of the DOE complex. The alternatives involve facilities to be used for treatment, storage, and disposal of various wastes generated from DOE environmental restoration activities and waste management operations. The evaluation includes five types of waste (four types of radioactive waste plus hazardous waste), 49 sites, and numerous cases associated with each alternative for waste management. In general, the alternatives are evaluated independently for each type of waste and reflect decentralized, regionalized, and centralized approaches. Transportation of waste materials is an integral component of the EM PEIS alternatives for waste management. The estimated impact on human health that is associated with various waste transportation activities is an important component of a complete appraisal of the alternatives. The transportation risk assessment performed for the EM PEIS is designed to ensure through uniform and judicious selection of models, data, and assumptions that relative comparisons of risk among the various alternatives are meaningful and consistent. Among other tasks, Argonne National Laboratory is providing technical assistance to the EM PEIS on transportation risk assessment. The objective is to perform a human health risk assessment for each type of waste relative to the EM PEIS alternatives for waste management. The transportation risk assessed is part of the overall impacts being analyzed for the EM PEIS to determine the safest, most environmentally and economically sound manner in which to satisfy requirements for waste management in the coming decades.

Chen, S.Y.; Monette, F.A.; Biwer, B.M.; Lazaro, M.A.; Hartmann, H.M.; Policastro, A.J.

1995-03-01T23:59:59.000Z

190

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

191

RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY at the Hanford Site  

SciTech Connect (OSTI)

A groundwater quality assessment plan was prepared to investigate the rate and extent of aquifer contamination beneath Waste Management Area TX-TY on the Hanford Site in Washington State. This plan is an update of a draft plan issued in February 1999, which guided work performed in fiscal year 2000.

Hodges, Floyd N.; Chou, Charissa J.

2001-02-23T23:59:59.000Z

192

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

193

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

194

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

195

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

196

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

197

Burlington Bottoms Wildlife Mitigation Project. Final Environmental Assessment/Management Plan and Finding of No Significant Impact.  

SciTech Connect (OSTI)

Bonneville Power Administration (BPA) proposes to fund wildlife management and enhancement activities for the Burlington bottoms wetlands mitigation site. Acquired by BPA in 1991, wildlife habitat at Burlington bottoms would contribute toward the goal of mitigation for wildlife losses and inundation of wildlife habitat due to the construction of Federal dams in the lower Columbia and Willamette River Basins. Target wildlife species identified for mitigation purposes are yellow warbler, great blue heron, black-capped chickadee, red-tailed hawk, valley quail, spotted sandpiper, wood duck, and beaver. The Draft Management Plan/Environmental Assessment (EA) describes alternatives for managing the Burlington Bottoms area, and evaluates the potential environmental impacts of the alternatives. Included in the Draft Management Plan/EA is an implementation schedule, and a monitoring and evaluation program, both of which are subject to further review pending determination of final ownership of the Burlington Bottoms property.

Not Available

1994-12-01T23:59:59.000Z

198

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

199

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

200

Surficial geology and performance assessment for a Radioactive Waste Management Facility at the Nevada Test Site  

SciTech Connect (OSTI)

At the Nevada Test Site, one potentially disruptive scenario being evaluated for the Greater Confinement Disposal (GCD) Facility Performance Assessment is deep post-closure erosion that would expose buried radioactive waste to the accessible environment. The GCD Facility located at the Area 5 Radioactive Waste Management Site (RWMS) lies at the juncture of three alluvial fan systems. Geomorphic surface mapping in northern Frenchman Flat indicates that reaches of these fans where the RWMS is now located have been constructional since at least the middle Quaternary. Mapping indicates a regular sequence of prograding fans with entrenchment of the older fan surfaces near the mountain fronts and construction of progressively younger inset fans farther from the mountain fronts. At the facility, the oldest fan surfaces are of late Pleistocene and Holocene age. More recent geomorphic activity has been limited to erosion and deposition along small channels. Trench and pit wall mapping found maximum incision in the vicinity of the RWMS to be less than 1.5 m. Based on collected data, natural geomorphic processes are unlikely to result in erosion to a depth of more than approximately 2 m at the facility within the 10,000-year regulatory period.

Snyder, K.E. [Lockheed Environmental Systems and Technologies, Co., Las Vegas, NV (United States); Gustafson, D.L.; Huckins-Gang, H.E.; Miller, J.J.; Rawlinson, S.E. [Raytheon Services Nevada, Las Vegas, NV (United States)

1995-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Environmental assessment for the Radioactive and Mixed Waste Management Facility: Sandia National Laboratories/New Mexico  

SciTech Connect (OSTI)

The Department of Energy (DOE) has prepared an environmental assessment (EA) (DOE/EA-0466) under the National Environmental Policy Act (NEPA) of 1969 for the proposed completion of construction and subsequent operation of a central Radioactive and Mixed Waste Management Facility (RMWMF), in the southeastern portion of Technical Area III at Sandia National Laboratory, Albuquerque (SNLA). The RMWMF is designed to receive, store, characterize, conduct limited bench-scale treatment of, repackage, and certify low-level waste (LLW) and mixed waste (MW) (as necessary) for shipment to an offsite disposal or treatment facility. The RMWMF was partially constructed in 1989. Due to changing regulatory requirements, planned facility upgrades would be undertaken as part of the proposed action. These upgrades would include paving of road surfaces and work areas, installation of pumping equipment and lines for surface impoundment, and design and construction of air locks and truck decontamination and water treatment systems. The proposed action also includes an adjacent corrosive and reactive metals storage area, and associated roads and paving. LLW and MW generated at SNLA would be transported from the technical areas to the RMWMF in containers approved by the Department of Transportation. The RMWMF would not handle nonradioactive hazardous waste. Based on the analysis in the EA, the proposed completion of construction and operation of the RMWMF does not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of NEPA. Therefore, preparation of an environmental impact statement for the proposed action is not required.

Not Available

1993-06-01T23:59:59.000Z

202

E-Print Network 3.0 - assessing chemical protective Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

most vulnerable, including pregnant women and children. Promote Safer Chemicals and Products... chemical alternatives assessments. 12;States' ... Source: California Energy...

203

Groundwater quality assessment plan for single-shell waste management area B-BX-BY at the Hanford Site  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory conducted a first determination groundwater quality assessment at the Hanford Site. This work was performed for the US Department of Energy, Richland Operations Office, in accordance with the Federal Facility Compliance Agreement during the time period 1996--1998. The purpose of the assessment was to determine if waste from the Single-Shell Tank (SST) Waste Management Area (WMA) B-BX-BY had entered the groundwater at levels above the drinking water standards (DWS). The resulting assessment report documented evidence demonstrating that waste from the WMA has, most likely, impacted groundwater quality. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and of rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

SM Narbutovskih

2000-03-31T23:59:59.000Z

204

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

205

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

206

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

207

E-Print Network 3.0 - assessing quality management Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

management... pillar, ... Source: Vardeman, Stephen B. - Departments of Statistics & Industrial Engineering, Iowa State University Collection: Mathematics 33 Quality...

208

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

209

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

210

Analysis of the low-level waste radionuclide inventory for the Radioactive Waste Management Complex performance assessment  

SciTech Connect (OSTI)

This report summarizes the results of a study to improve the estimates of the radionuclides in the low-level radioactive waste (LLW) inventory which is buried in the Idaho National Engineering Laboratory (INEL) Radioactive Waste Management Complex (RWMC) Subsurface Disposal Area (SDA). The work is done to support the RWMC draft performance assessment (PA). Improved radionuclide inventory estimates are provided for the INEL LLW generators. Engineering, environmental assessment or other research areas may find use for the information in this report. It may also serve as a LLW inventory baseline for data quality assurance. The individual INEL LLW generators, their history and their activities are also described in detail.

Plansky, L.E.; Hoiland, S.A.

1992-02-01T23:59:59.000Z

211

Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562  

SciTech Connect (OSTI)

The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

2014-05-28T23:59:59.000Z

212

A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings  

E-Print Network [OSTI]

while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

Steele, Robert James Scott

2012-06-07T23:59:59.000Z

213

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

214

RCRA Assessment Plan for Single-Shell Tank Waste Management Area S-SX at the Hanford Site  

SciTech Connect (OSTI)

A groundwater quality assessment plan was prepared for waste management area S-SX at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with Title 40, Code of Federal Regulation (CFR) Part 265, Subpart F [and by reference of Washington Administrative Code (WAC) 173-303-400(3)]. The facility was placed in assessment groundwater monitoring program status after elevated waste constituents and indicator parameter measurements (i.e., chromium, technetium-99 and specific conductance) in downgradient monitoring wells were observed and confirmed. A first determination, as allowed under 40 CFR 265.93(d), provides the owner/operator of a facility an opportunity to demonstrate that the regulated unit is not the source of groundwater contamination. Based on results of the first determination it was concluded that multiple source locations in the waste management area could account for observed spatial and temporal groundwater contamination patterns. Consequently, a continued investigation is required. This plan, developed using the data quality objectives process, is intended to comply with the continued investigation requirement. Accordingly, the primary purpose of the present plan is to determine the rate and extent of dangerous waste (hexavalent chromium and nitrate) and radioactive constituents (e.g., technetium-99) in groundwater and to determine their concentrations in groundwater beneath waste management area S-SX. Comments and concerns expressed by the Washington State Department of Ecology on the initial waste management area S-SX assessment report were addressed in the descriptive narrative of this plan as well as in the planned activities. Comment disposition is documented in a separate addendum to this plan.

Chou, C.J.; Johnson, V.G.

1999-10-06T23:59:59.000Z

215

Aeronautical System Center's environmental compliance assessment and management program's cost-saving initiatives support the Air Force's acquisition reform initiative  

SciTech Connect (OSTI)

The Environmental Management directorate of ASC (ASC/EM) has the responsibility of providing government oversight for the Government Owned Contractor Operated Aircraft and Missile plants (GOCOs). This oversight is manifested as a landlord role where Air Force provides the funding required to maintain the plant facilities including buildings and utilities as well as environmental systems. By agreement the companies operating the plants are required to operate them in accordance with environmental law. Presently the GOCOs include Air Force Plant (AFP) 6 in Marietta Ga., AFP 4 in Fort Worth, Tx., AFP 44 in Tucson, Az., AFP 42 in Palmdale, Ca., and AFP PJKS in Denver, Co. Lockheed Martin corporation operates AFPs 4,6, PJKS and a portion of AFP 42 while AFP 44 is operated by Raytheon Missile Systems Company. Other GOCOs at AFP 42 are Northrup-Grumman, Boeing, and Cabaco, the facilities engineer. Since 1992 the Environmental Management division has conducted its Environmental Compliance Assessment and Management Program assessments (ECAMP) annually at each of the plants. Using DOD's ECAMP Team Guide and teams comprised of both Air Force and consultant engineering personnel, each plant is assessed for its environmental compliance well being. In the face of rising operational costs and diminishing budgets ASC/EM performed a comprehensive review of its ECAMP. As a result, the basic ECAMP program was improved to reduce costs without compromising on quality of the effort. The program retained its emphasis in providing a snap-shot evaluation of each Air Force plant's environmental compliance health supported by complete but tailored protocol assessments.

Meanor, T.

1999-07-01T23:59:59.000Z

216

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

217

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

218

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

219

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

220

RCRA Assessment Plan for Single-Shell Tank Waste Management Area B-BX-BY at the Hanford Site  

SciTech Connect (OSTI)

This document was prepared as a groundwater quality assessment plan revision for the single-shell tank systems in Waste Management Area B-BX-BY at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with 40 CFR Part 265, Subpart F. In FY 1996, the groundwater monitoring program was changed from detection-level indicator evaluation to a groundwater quality assessment program when elevated specific conductance in downgradient monitoring well 299 E33-32 was confirmed by verification sampling. During the course of the ensuing investigation, elevated technetium-99 and nitrate were observed above the drinking water standard at well 299-E33-41, a well located between 241-B and 241-BX Tank Farms. Earlier observations of the groundwater contamination and tank farm leak occurrences combined with a qualitative analysis of possible solutions, led to the conclusion that waste from the waste management area had entered the groundwater and were observed in this well. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

Narbutovskih, Susan M.

2006-09-29T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Assessment of the urban public's knowledge of white-tailed deer management in two Texas communities  

E-Print Network [OSTI]

Urbanization throughout much of Texas has resulted in diminished wildlife habitat, resulting from fragmented landscapes. Several previous studies addressed the publics attitudes concerning the most acceptable white-tailed deer management techniques...

Alderson, Jessica Lynn

2009-05-15T23:59:59.000Z

222

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

223

Range Con: a management evaluation system for assessing sucess of selected range improvement practices  

E-Print Network [OSTI]

. The project identified five important attributes of management; (1) formal education, (2) age, (3) farm income, (4)total debts, and (5)thinking methods. All but (5) could be quantified. As Stamp (1981) indicated, thinking or problem solving methods can... environment and incorporated the effects of uncertainty. The model included management attributes such as planning and goals of the individuals as related to quality of life and risk- taking behavior. The purpose of the study was to evaluate the impact...

Ekblad, Steven Linn

1989-01-01T23:59:59.000Z

224

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

225

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

226

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

227

U.S. Department of Energy worker health risk evaluation methodology for assessing risks associated with environmental restoration and waste management  

SciTech Connect (OSTI)

This document describes a worker health risk evaluation methodology for assessing risks associated with Environmental Restoration (ER) and Waste Management (WM). The methodology is appropriate for estimating worker risks across the Department of Energy (DOE) Complex at both programmatic and site-specific levels. This document supports the worker health risk methodology used to perform the human health risk assessment portion of the DOE Programmatic Environmental Impact Statement (PEIS) although it has applications beyond the PEIS, such as installation-wide worker risk assessments, screening-level assessments, and site-specific assessments.

Blaylock, B.P.; Legg, J.; Travis, C.C. [Oak Ridge National Lab., TN (United States). Center for Risk Management; Simek, M.A.; Sutherland, J. [Univ. of Tennessee, Knoxville, TN (United States); Scofield, P.A. [Office of Environmental Compliance and Documentation (United States)

1995-06-01T23:59:59.000Z

228

Assessment of sludge management options in a waste water treatment plant  

E-Print Network [OSTI]

This thesis is part of a larger project which began in response to a request by the Spanish water agengy, Cadagua, for advice on life cycle assessment (LCA) and environmental impacts of Cadagua operated wastewater treatment ...

Lim, Jong hyun, M. Eng. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

229

Methods for managing uncertainly in material selection decisions : robustness of early stage life cycle assessment  

E-Print Network [OSTI]

Utilizing alternative materials is an important tactic to improve the environmental performance of products. Currently a growing array of materials candidates confronts today's product designer. While life-cycle assessment ...

Nicholson, Anna L. (Anna Louise)

2009-01-01T23:59:59.000Z

230

Waste management health risk assessment: A case study of a solid waste landfill in South Italy  

SciTech Connect (OSTI)

An integrated risk assessment study has been performed in an area within 5 km from a landfill that accepts non hazardous waste. The risk assessment was based on measured emissions and maximum chronic population exposure, for both children and adults, to contaminated air, some foods and soil. The toxic effects assessed were limited to the main known carcinogenic compounds emitted from landfills coming both from landfill gas torch combustion (e.g., dioxins, furans and polycyclic aromatic hydrocarbons, PAHs) and from diffusive emissions (vinyl chloride monomer, VCM). Risk assessment has been performed both for carcinogenic and non-carcinogenic effects. Results indicate that cancer and non-cancer effects risk (hazard index, HI) are largely below the values accepted from the main international agencies (e.g., WHO, US EPA) and national legislation ( and ).

Davoli, E., E-mail: enrico.davoli@marionegri.i [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy); Fattore, E.; Paiano, V.; Colombo, A.; Palmiotto, M. [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy); Rossi, A.N.; Il Grande, M. [Progress S.r.l., Via Nicola A. Porpora 147, 20131 Milano (Italy); Fanelli, R. [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy)

2010-08-15T23:59:59.000Z

231

Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems  

E-Print Network [OSTI]

G.E. (2004) How useful is quantitative risk assessment?Risk Analysis Vol. 24 No. 3, pp. 515-520 Atwater, BF (Quantitative and qualitative risk analyses the safety of

Hamedifar, Hamed

2012-01-01T23:59:59.000Z

232

Cedar River, Cedar Rapids, Iowa Flood Risk Management Feasibility Study Report with Integrated Environmental Assessment  

E-Print Network [OSTI]

of Engineers (USACE) has developed a plan for the flood risk management for the Cedar River, Cedar Rapids, Iowa all 12 comments. 1. IEPR Comment - High Significance: The analysis of existing cultural resources Resources was revised to explain why the resolution of the cultural resources will not exceed the budgeted

US Army Corps of Engineers

233

Assessing the Potential of Developing a Tool for Residential Facility Management Using Building Information Modeling Software  

E-Print Network [OSTI]

in analyzing the scope of using BIM and Application Programming Interface (API) for management of maintenance in residences by the owner who are not professionally trained. The research analyzes a single, basic function of a BIM tool to determine the potential...

Madhani, Himanshu 1986-

2012-11-29T23:59:59.000Z

234

Self-perceptions of volunteer management:: a texas 4-h volunteer needs assessment  

E-Print Network [OSTI]

study. I appreciate all of the time and energy you put into assisting me with the development, administration, and reminders for the questionnaire and helping me learn more about the 4-H program in Texas. Your work has not gone unnoticed. I hope... .................................................................................. 7 Models of Volunteer Administration ............................................. 9 The Role of the 4-H Volunteer ....................................................... 12 Volunteer Management...

Torock, Jodi Lynn

2009-05-15T23:59:59.000Z

235

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

236

Sandia National Laboratories: Cyber-Based Vulnerability Assessments  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(NESL) Brayton Lab SCO2 Brayton Cycle Technology Videos Heat Exchanger Development Diffusion Bonding Characterization Mechanical Testing Deep Borehole Disposal Nuclear...

237

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG | Department of EnergyGeothermalGoing OffGreenServices| Department of

238

Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCT BiomassArnprior, Ontario: EnergyAskja Energy Jump

239

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed Jump

240

Sandia National Laboratories: Cyber-Based Vulnerability Assessments  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0EnergySandia Involves Wind-FarmCool EarthSafety

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place: Eden Prairie, Minnesota Zip: 55344ESMAP LowChange | Open

242

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:|

243

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:| Department

244

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthenticationEnergy

245

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |

246

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is aDepartmentDepartment

247

Incorporating risk into the feasibility assessment of alternative brush management strategies for the Welder Wildlife Refuge  

E-Print Network [OSTI]

be produced from it over time. Historically, the significant revenue source from rangelands has been grazing domestic animals for the production of consumer goods. More recently, a growing ecotourism industry, which includes hunting, hiking, bird watching... or failure is significant. Precautions must also be taken when developing a cost-effective brush management scheme to ensure that wildlife habitat disturbance is minimized if ecotourism rents are a desired goal. Problem Statement The purpose...

Schumann, Keith D.

2012-06-07T23:59:59.000Z

248

Damage Assessment Technologies for Prognostics and Proactive Management of Materials Degradation  

SciTech Connect (OSTI)

The Nuclear Regulatory Commission has undertaken a program to lay the groundwork for defining proactive actions to manage degradation of materials in light water reactors (LWRs). This paper discusses the U.S. Nuclear Regulatory Commissions Proactive Management of Materials Degradation (PMMD) program and its application to nuclear power plant structures, systems and components. The PMMD program is examining LWR component materials and the degradation phenomena that affect them. Of particular interest is how such phenomena can be monitored to predict degradation and prevent component failure. Some forms of degradation, such as stress corrosion cracking, are characterized by a long initiation time followed by a rapid growth phase. Monitoring such long-term degradation will require new NDE methods and measurement procedures. A critical analysis of all reactor components is required to determine if new inspection strategies are required to effectively manage slow degradation mechanisms that may lead to component failure. As reactor lifetimes are extended, degradation mechanisms previously considered too long-term to be of consequence (such as concrete and wiring insulation degradation) may become more important. This paper includes a review of techniques with potential for sensing and monitoring degradation in its early stages and will concisely explain the basic principles of PMMD and its relationship to in-service inspection, condition based maintenance, and advanced diagnostics and prognostics.

Bond, Leonard J.; Doctor, Steven R.; Griffin, Jeffrey W.; Hull, Amy; Malik, Shah

2011-02-26T23:59:59.000Z

249

Damage Assessment Technologies for Prognostics and Proactive Management of Materials Degradation  

SciTech Connect (OSTI)

The Nuclear Regulatory Commission has undertaken a program to lay the groundwork for defining proactive actions to manage degradation of materials in light water reactors (LWRs). This paper discusses the U.S. Nuclear Regulatory Commissions Proactive Management of Materials Degradation (PMMD) program and its application to nuclear power plant structures, systems and components. The PMMD program is examining LWR component materials and the degradation phenomena that affect them. Of particular interest is how such phenomena can be monitored to predict degradation and prevent component failure. Some forms of degradation, including some modes of stress corrosion cracking, are characterized by a long initiation time followed by a rapid growth phase. Monitoring such long-term degradation will require new non-destructive evaluation (NDE) methods and measurement procedures. A critical analysis of all reactor components is required to determine if new inspection strategies are required to effectively manage slow degradation mechanisms that may lead to component failure. As reactor lifetimes are extended, degradation mechanisms previously considered too long-term to be of consequence (such as concrete and wiring insulation degradation) may become more important. This paper includes a review of techniques with potential for sensing and monitoring degradation in its early stages and will concisely explain the basic principles of PMMD and its relationship to in-service inspection, condition based maintenance, and advanced diagnostics and prognostics.

Bond, Leonard J.; Doctor, Steven R.; Griffin, Jeffrey W.; Hull, Amy B.; Malik, Shah

2011-01-01T23:59:59.000Z

250

Sandia National Laboratories performance assessment methodology for long-term environmental programs : the history of nuclear waste management.  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) is the world leader in the development of the detailed science underpinning the application of a probabilistic risk assessment methodology, referred to in this report as performance assessment (PA), for (1) understanding and forecasting the long-term behavior of a radioactive waste disposal system, (2) estimating the ability of the disposal system and its various components to isolate the waste, (3) developing regulations, (4) implementing programs to estimate the safety that the system can afford to individuals and to the environment, and (5) demonstrating compliance with the attendant regulatory requirements. This report documents the evolution of the SNL PA methodology from inception in the mid-1970s, summarizing major SNL PA applications including: the Subseabed Disposal Project PAs for high-level radioactive waste; the Waste Isolation Pilot Plant PAs for disposal of defense transuranic waste; the Yucca Mountain Project total system PAs for deep geologic disposal of spent nuclear fuel and high-level radioactive waste; PAs for the Greater Confinement Borehole Disposal boreholes at the Nevada National Security Site; and PA evaluations for disposal of high-level wastes and Department of Energy spent nuclear fuels stored at Idaho National Laboratory. In addition, the report summarizes smaller PA programs for long-term cover systems implemented for the Monticello, Utah, mill-tailings repository; a PA for the SNL Mixed Waste Landfill in support of environmental restoration; PA support for radioactive waste management efforts in Egypt, Iraq, and Taiwan; and, most recently, PAs for analysis of alternative high-level radioactive waste disposal strategies including repositories deep borehole disposal and geologic repositories in shale and granite. Finally, this report summarizes the extension of the PA methodology for radioactive waste disposal toward development of an enhanced PA system for carbon sequestration and storage systems. These efforts have produced a generic PA methodology for the evaluation of waste management systems that has gained wide acceptance within the international community. This report documents how this methodology has been used as an effective management tool to evaluate different disposal designs and sites; inform development of regulatory requirements; identify, prioritize, and guide research aimed at reducing uncertainties for objective estimations of risk; and support safety assessments.

Marietta, Melvin Gary; Anderson, D. Richard; Bonano, Evaristo J.; Meacham, Paul Gregory (Raytheon Ktech, Albuquerque, NM)

2011-11-01T23:59:59.000Z

251

Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program  

SciTech Connect (OSTI)

This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 47th set of environmental quality assessment samples (QAP XLVII) that were received on or before December 1, 1997.

Greenlaw, P.D.

1998-01-01T23:59:59.000Z

252

Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program  

SciTech Connect (OSTI)

This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. This report presents the results from the analysis of the 48th set of environmental quality assessment samples (QAP XLVIII) that were received on or before June 1, 1998.

Greenlaw, P.D.; Minick, S.K.

1998-07-01T23:59:59.000Z

253

Flood Assessment at the Area 5 Radioactive Waste Management Site and the Proposed Hazardous Waste Storage Unit, DOE/Nevada Test Site, Nye County, Nevada  

SciTech Connect (OSTI)

A flood assessment at the Radioactive Waste Management Site (RWMS) and the proposed Hazardous Waste Storage Unit (HWSU) in Area 5 of the Nevada Test Site (NTS) was performed to determine the 100-year flood hazard at these facilities. The study was conducted to determine whether the RWMS and HWSU are located within a 100-year flood hazard as defined by the Federal Emergency Management Agency, and to provide discharges for the design of flood protection.

Schmeltzer, J. S., Millier, J. J., Gustafson, D. L.

1993-01-01T23:59:59.000Z

254

Technical Note: Seasonality in alpine water resources management a regional assessment  

E-Print Network [OSTI]

Abstract. Alpine regions are particularly affected by seasonal variations in water demand and water availability. Especially the winter period is critical from an operational point of view, as being characterised by high water demands due to tourism and low water availability due to the temporal storage of precipitation as snow and ice. The clear definition of summer and winter periods is thus an essential prerequisite for water resource management in alpine regions. This paper presents a GIS-based multi criteria method to determine the winter season. A snow cover duration dataset serves as basis for this analysis. Different water demand stakeholders, the alpine hydrology and the present day water supply infrastructure are taken into account. Technical snow-making and (winter) tourism were identified as the two major seasonal water demand stakeholders in the study area, which is the Kitzbueheler region in the Austrian Alps. Based upon different geographical datasets winter was defined as the period from December to March, and summer as the period from April to November. By determining potential regional water balance deficits or surpluses in the present day situation and in future, important management decisions such as water storage and allocation can be made and transposed to the local level. 1

Hydrology; D. Vanham; E. Fleischhacker; W. Rauch

2007-01-01T23:59:59.000Z

255

Risk assessment and optimization (ALARA) analysis for the environmental remediation of Brookhaven National Laboratory`s hazardous waste management facility  

SciTech Connect (OSTI)

The Department of Energy`s (DOE) Office of Environment, Safety, and Health (EH) sought examples of risk-based approaches to environmental restoration to include in their guidance for DOE nuclear facilities. Extensive measurements of radiological contamination in soil and ground water have been made at Brookhaven National Laboratory`s Hazardous Waste Management Facility (HWMF) as part of a Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) remediation process. This provided an ideal opportunity for a case study. This report provides a risk assessment and an {open_quotes}As Low as Reasonably Achievable{close_quotes} (ALARA) analysis for use at other DOE nuclear facilities as an example of a risk-based decision technique.

Dionne, B.J.; Morris, S. III; Baum, J.W. [and others

1998-03-01T23:59:59.000Z

256

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

257

Distrbuted Sensing Systems for Water Quality Assesment and Management  

E-Print Network [OSTI]

Sensing Systems for Water Quality Assessment and ManagementSensing Systems for Water Quality Assessment and ManagementSensing Systems for Water Quality Assessment and Management

2007-01-01T23:59:59.000Z

258

Material Aging and Degradation Detection and Remaining Life Assessment for Plant Life Management  

SciTech Connect (OSTI)

One of the major factors that may impact long term operations is structural material degradation, Detecting materials degradation, estimating the remaining useful life (RUL) of the component, and determining approaches to mitigating the degradation are important from the perspective of long term operations. In this study, multiple nondestructive measurement and monitoring methods were evaluated for their ability to assess the material degradation state. Metrics quantifying the level of damage from these measurements were defined, and evaluated for their ability to provide estimates of remaining life of the component. An example of estimating the RUL from nondestructive measurements of material degradation condition is provided.

Ramuhalli, Pradeep; Henager, Charles H.; Griffin, Jeffrey W.; Meyer, Ryan M.; Coble, Jamie B.; Pitman, Stan G.; Bond, Leonard J.

2012-12-31T23:59:59.000Z

259

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to cross-administrative boundaries, which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. Seventeen social vulnerability indicators are categorized into four dimensions. This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. This study provides a foundation for sustainable strategic planning to deal with environmental change. Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

260

Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Preliminary assessment of radiological doses in alternative waste management systems without an MRS facility  

SciTech Connect (OSTI)

This report presents generic analyses of radiological dose impacts of nine hypothetical changes in the operation of a waste management system without a monitored retrievable storage (MRS) facility. The waste management activities examined in this study include those for handling commercial spent fuel at nuclear power reactors and at the surface facilities of a deep geologic repository, and the transportation of spent fuel by rail and truck between the reactors and the repository. In the reference study system, the radiological doses to the public and to the occupational workers are low, about 170 person-rem/1000 metric ton of uranium (MTU) handled with 70% of the fuel transported by rail and 30% by truck. The radiological doses to the public are almost entirely from transportation, whereas the doses to the occupational workers are highest at the reactors and the repository. Operating alternatives examined included using larger transportation casks, marshaling rail cars into multicar dedicated trains, consolidating spent fuel at the reactors, and wet or dry transfer options of spent fuel from dry storage casks. The largest contribution to radiological doses per unit of spent fuel for both the public and occupational workers would result from use of truck transportation casks, which are smaller than rail casks. Thus, reducing the number of shipments by increasing cask sizes and capacities (which also would reduce the number of casks to be handled at the terminals) would reduce the radiological doses in all cases. Consolidating spent fuel at the reactors would reduce the radiological doses to the public but would increase the doses to the occupational workers at the reactors.

Schneider, K.J.; Pelto, P.J.; Daling, P.M.; Lavender, J.C.; Fecht, B.A.

1986-06-01T23:59:59.000Z

262

Life cycle assessment of four municipal solid waste management scenarios in China  

SciTech Connect (OSTI)

A life cycle assessment was carried out to estimate the environmental impact of municipal solid waste. Four scenarios mostly used in China were compared to assess the influence of various technologies on environment: (1) landfill, (2) incineration, (3) composting plus landfill, and (4) composting plus incineration. In all scenarios, the technologies significantly contribute to global warming and increase the adverse impact of non-carcinogens on the environment. The technologies played only a small role in the impact of carcinogens, respiratory inorganics, terrestrial ecotoxicity, and non-renewable energy. Similarly, the influence of the technologies on the way other elements affect the environment was ignorable. Specifically, the direct emissions from the operation processes involved played an important role in most scenarios except for incineration, while potential impact generated from transport, infrastructure and energy consumption were quite small. In addition, in the global warming category, highest potential impact was observed in landfill because of the direct methane gas emissions. Electricity recovery from methane gas was the key factor for reducing the potential impact of global warming. Therefore, increasing the use of methane gas to recover electricity is highly recommended to reduce the adverse impact of landfills on the environment.

Hong Jinglan, E-mail: hongjing@sdu.edu.c [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China); Li Xiangzhi [Department of Pathology, University of Michigan, 1301 Catherine, Ann Arbor, MI 48109 (United States); Zhaojie Cui [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China)

2010-11-15T23:59:59.000Z

263

Results of phase 1 groundwater quality assessment for Single-Shell Tank Waste Management Areas B-BX-BY at the Hanford Site  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory conducted a Phase 1 (or first determination) groundwater quality assessment for the US Department of Energy, Richland Operations Office, in accordance with the Federal Facility Compliance Agreement. The purpose of the assessment was to determine if the Single-Shell Tank Waste Management Area (WMA) B-BX-BY has impacted groundwater quality. This report will document the evidence demonstrating that the WMA has impacted groundwater quality.

Narbutovskih, S.M.

1998-02-01T23:59:59.000Z

264

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

265

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

266

Towards Adaptive Educational Assessments: Predicting Student Performance using Temporal Stability and Data Analytics in Learning Management Systems  

SciTech Connect (OSTI)

Data-driven assessments and adaptive feedback are becoming a cornerstone research in educational data analytics and involve developing methods for exploring the unique types of data that come from the educational context. For example, predicting college student performance is crucial for both the students and educational institutions. It can support timely intervention to prevent students from failing a course, increasing efficacy of advising functions, and improving course completion rate. In this paper, we present our efforts in using data analytics that enable educationists to design novel data-driven assessment and feedback mechanisms. In order to achieve this objective, we investigate temporal stability of students grades and perform predictive analytics on academic data collected from 2009 through 2013 in one of the most commonly used learning management systems, called Moodle. First, we have identified the data features useful for assessments and predicting student outcomes such as students scores in homework assignments, quizzes, exams, in addition to their activities in discussion forums and their total Grade Point Average(GPA) at the same term they enrolled in the course. Second, time series models in both frequency and time domains are applied to characterize the progression as well as overall projections of the grades. In particular, the model analyzed the stability as well as fluctuation of grades among students during the collegiate years (from freshman to senior) and disciplines. Third, Logistic Regression and Neural Network predictive models are used to identify students as early as possible who are in danger of failing the course they are currently enrolled in. These models compute the likelihood of any given student failing (or passing) the current course. The time series analysis indicates that assessments and continuous feedback are critical for freshman and sophomores (even with easy courses) than for seniors, and those assessments may be provided using the predictive models. Numerical results are presented to evaluate and compare the performance of the developed models and their predictive accuracy. Our results show that there are strong ties associated with the first few weeks for coursework and they have an impact on the design and distribution of individual modules.

Thakur, Gautam [ORNL] [ORNL; Olama, Mohammed M [ORNL] [ORNL; McNair, Wade [ORNL] [ORNL; Sukumar, Sreenivas R [ORNL] [ORNL

2014-01-01T23:59:59.000Z

267

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

268

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

269

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

270

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

271

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

272

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

273

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

274

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

275

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

276

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

277

Rangeland Ecol Manage 66:364375 | May 2013 | DOI: 10.2111/REM-D-11-00130.1 Assessing Impacts of Roads: Application of a Standard Assessment Protocol  

E-Print Network [OSTI]

a stratified random sampling approach to plot selection based on ecological potential, road inventory data site and road inventory strata accounted for significant variability in the functioning of ecological management, assessment, monitoring, off-highway vehicles, oil and gas, rangeland health INTRODUCTION Adaptive

278

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

279

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect (OSTI)

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

280

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Risk assessment for the on-site transportation of radioactive wastes for the U.S. Department of Energy Waste Management Programmatic Environmental Impact Statement  

SciTech Connect (OSTI)

This report documents the risk assessment performed for the on-site transportation of radioactive wastes in the US Department of Energy (DOE) Waste Management Programmatic Environmental Impact Statement (WM PEIS). Risks for the routine shipment of wastes and the impacts from potential accidental releases are analyzed for operations at the Hanford Site (Hanford) near Richland, Washington. Like other large DOE sites, hanford conducts waste management operations for all wastes types; consequently, the impacts calculated for Hanford are expected to be greater than those for smaller sites. The risk assessment conducted for on-site transportation is intended to provide an estimate of the magnitude of the potential risk for comparison with off-site transportation risks assessed for the WM PEIS.

Biwer, B.M.; Monette, F.A.; Chen, S.Y. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1996-12-01T23:59:59.000Z

282

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

283

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

284

Taking Risk Assessment and Management to the Next Level: Program-Level Risk Analysis to Enable Solid Decision-Making on Priorities and Funding  

SciTech Connect (OSTI)

A multi-level (facility and programmatic) risk assessment was conducted for the facilities in the Nevada National Security Site (NNSS) Readiness in Technical Base and Facilities (RTBF) Program and results were included in a new Risk Management Plan (RMP), which was incorporated into the fiscal year (FY) 2010 Integrated Plans. Risks, risk events, probability, consequence(s), and mitigation strategies were identified and captured, for most scope areas (i.e., risk categories) during the facilitated risk workshops. Risk mitigations (i.e., efforts in addition to existing controls) were identified during the facilitated risk workshops when the risk event was identified. Risk mitigation strategies fell into two broad categories: threats or opportunities. Improvement projects were identified and linked to specific risks they mitigate, making the connection of risk reduction through investments for the annual Site Execution Plan. Due to the amount of that was collected, analysis to be performed, and reports to be generated, a Risk Assessment/ Management Tool (RAMtool) database was developed to analyze the risks in real-time, at multiple levels, which reinforced the site-level risk management process and procedures. The RAMtool database was developed and designed to assist in the capturing and analysis of the key elements of risk: probability, consequence, and impact. The RAMtool calculates the facility-level and programmatic-level risk factors to enable a side-by-side comparison to see where the facility manager and program manager should focus their risk reduction efforts and funding. This enables them to make solid decisions on priorities and funding to maximize the risk reduction. A more active risk management process was developed where risks and opportunities are actively managed, monitored, and controlled by each facility more aggressively and frequently. risk owners have the responsibility and accountability to manage their assigned risk in real-time, using the RAMtool database.

Nelson, J. G.; Morton, R. L.; Castillo, C.; Dyer, G.; Johnson, N.; McSwain, J. T.

2011-02-01T23:59:59.000Z

285

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

of California. This paper describes the development and results from an integrated water resource management application includes management of reservoirs, run-of-river hydropower plants, water supply demand locations. Reservoir operations adapt to capture earlier and greater runoff volumes that result from earlier

286

The use of PRA (Probabilistic Risk Assessment) in the management of safety issues at the High Flux Isotope Reactor  

SciTech Connect (OSTI)

The High Flux Isotope reactor (HFIR) is a high performance isotope production and research reactor which has been in operation at Oak Ridge National Laboratory (ORNL) since 1965. In late 1986 the reactor was shut down as a result of discovery of unexpected neutron embrittlement of the reactor vessel. In January of 1988, a level 1 Probabilistic Risk Assessment (PRA) (excluding external events) was published as part of the response to the many reviews that followed the shutdown and for use by ORNL to prioritize action items intended to upgrade the safety of the reactor. A conservative estimate of the core damage frequency initiated by internal events for HFIR was 3.11 {times} 10{sup {minus}4}. In June 1989 a draft external events initiated PRA was published. The dominant contributions from external events came from seismic, wind, and fires. The overall external event contribution to core damage frequency is about 138% of the internal event initiated contribution and is dominated by wind initiators. The PRA has provided a basis for the management of a wide range of safety and operation issues at the HFIR. 3 refs., 4 figs., 2 tabs.

Flanagan, G.F.

1990-01-01T23:59:59.000Z

287

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

288

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

289

Seismic assessment strategies for masonry structures  

E-Print Network [OSTI]

Masonry structures are vulnerable to earthquakes, but their seismic assessment remains a challenge. This dissertation develops and improves several strategies to better understand the behavior of masonry structures under ...

DeJong, Matthew J. (Matthew Justin)

2009-01-01T23:59:59.000Z

290

Assessment of trace metals during episodic events using DGT passive sampler: A proposal for water management enhancement  

E-Print Network [OSTI]

in "Water Resources Management 27, 12 (2013) 4163-4181" DOI : 10.1007/s11269-013-0401-5 #12;Abstract disturbance (dredging) and provide proposal for a better water management. The results indicate that: (1) DGT of metals from the lake to the estuary; and (4) at the confluence of the Marikina River water management

Paris-Sud XI, Université de

291

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

292

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

293

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

294

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

295

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

296

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

297

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

298

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

299

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

300

Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.  

SciTech Connect (OSTI)

This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Results of Phase I groundwater quality assessment for single-shell tank waste management areas T and TX-TY at the Hanford Site  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory (PNNL) conducted a Phase I, Resource Conservation and Recovery Act of 1976 (RCRA) groundwater quality assessment for the Richland Field Office of the U.S. Department of Energy (DOE-RL) under the requirements of the Federal Facility Compliance Agreement. The purpose of the investigation was to determine if the Single-Shell Tank Waste Management Areas (WMAs) T and TX-TY have impacted groundwater quality. Waste Management Areas T and TX-TY, located in the northern part of the 200 West Area of the Hanford Site, contain the 241-T, 241-TX, and 241-TY tank farms and ancillary waste systems. These two units are regulated under RCRA interim-status regulations (under 40 CFR 265.93) and were placed in assessment groundwater monitoring because of elevated specific conductance in downgradient wells. Anomalous concentrations of technetium-99, chromium, nitrate, iodine-129, and cobalt-60 also were observed in some downgradient wells. Phase I assessment, allowed under 40 CFR 265, provides the owner-operator of a facility with the opportunity to show that the observed contamination has a source other than the regulated unit. For this Phase I assessment, PNNL evaluated available information on groundwater chemistry and past waste management practices in the vicinity of WMAs T and TX-TY. Background contaminant concentrations in the vicinity of WMAs T and TX-TY are the result of several overlapping contaminant plumes resulting from past-practice waste disposal operations. This background has been used as baseline for determining potential WMA impacts on groundwater.

Hodges, F.N.

1998-01-01T23:59:59.000Z

302

2.4 Contaminant Transport Assessment and Management (CONTAM) The Contam research area focuses on developing technology to observe and manage mass and energy distributions  

E-Print Network [OSTI]

wastewater irrigations sites near Merced, CA, we shifted sensing resources to the managed aquifer recharge in identifying a floodwater diversion site to contrast with the existing wastewater reclamation site installed a long-term water quality monitoring station in September 2010. This station is enabling us

California at Los Angeles, University of

303

Commentary: Risk Management and Reliability Design for Buildings  

SciTech Connect (OSTI)

Where there is a significant actuarial basis for decision making (e.g., the occurrence of fires in single-family dwellings), there is little incentive for formal risk management. Formal risk assessments are most useful in those cases where the value of the structure is high, many people may be affected, the societal perception of risk is high, consequences of a mishap would be severe, and the actuarial uncertainty is large. For these cases, there is little opportunity to obtain the necessary experiential data to make informed decisions, and the consequences in terms of money, lives, and societal confidence are severe enough to warrant a formal risk assessment. Other important factors include the symbolic value of the structure and vulnerability to single point failures. It is unlikely that formal risk management and assessment practices will or should replace the proven institutions of building codes and engineering practices. Nevertheless, formal risk assessment can provide valuable insights into the hazards threatening high-value and high-risk (perceived or actual) buildings and structures, which can in turn be translated into improved public health, safety, and security. The key is to choose and apply the right assessment tool to match the structure in question. Design-for-reliability concepts can be applied to buildings, bridges, transportation sys- tems, dams, and other structures. The use of these concepts could have the dual benefits of lowering life-cycle costs by reducing the necessity for maintenance and repair and of enhancing the saiiety and security of the structure's users.

Berry, Dennis L.; Cranwell, Robert M.; Hunter, Regina L.

1999-05-28T23:59:59.000Z

304

Hawaii demand-side management resource assessment. Final report, Reference Volume 3 -- Residential and commercial sector DSM analyses: Detailed results from the DBEDT DSM assessment model; Part 1, Technical potential  

SciTech Connect (OSTI)

The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. Numerous tables and figures illustrating the technical potential for demand-side management are included.

NONE

1995-04-01T23:59:59.000Z

305

eBird: Assessing the Application of Large Scale Citizen Science Data and Data Collection Strategies for Local Management Use  

E-Print Network [OSTI]

shorebird of management concern) counts, trends, and methodologies made through a survey following a strict protocol versus data collected by eBird in three different areas (Bolivar Flats, Apfel Park, and San Luis Pass). Using descriptive statistics...

Riddle, Thomas Carroll 1984-

2012-11-13T23:59:59.000Z

306

Control of Major-Accident Hazards Involving Land Transmission Charlotte BOUISSOU, Project Manager for Pipelines Risk Assessment  

E-Print Network [OSTI]

Control of Major-Accident Hazards Involving Land Transmission Pipelines Charlotte BOUISSOU, Project Nicolas DECHY, Project Manager for Accidents Analysis and Learning from Experience Contact : charlotte, this Directive does not apply to land transmission pipelines... According to several accidents analysis

Paris-Sud XI, Université de

307

V-192: Symantec Security Information Manager Input Validation...  

Broader source: Energy.gov (indexed) [DOE]

Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

308

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarn et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

309

Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.110  

SciTech Connect (OSTI)

Results for Version 4.110 of the Area 5 Radioactive Waste Management Site (RWMS) performance assessment (PA) model are summarized. Version 4.110 includes the fiscal year (FY) 2010 inventory estimate, including a future inventory estimate. Version 4.110 was implemented in GoldSim 10.11(SP4). The following changes have been implemented since the last baseline model, Version 4.105: (1) Updated the inventory and disposal unit configurations with data through the end of FY 2010. (1) Implemented Federal Guidance Report 13 Supplemental CD dose conversion factors (U.S. Environmental Protection Agency, 1999). Version 4.110 PA results comply with air pathway and all-pathways annual total effective dose (TED) performance objectives (Tables 2 and 3, Figures 1 and 2). Air pathways results decrease moderately for all scenarios. The time of the maximum for the air pathway open rangeland scenario shifts from 1,000 to 100 years (y). All-pathways annual TED increases for all scenarios except the resident scenario. The maximum member of public all-pathways dose occurs at 1,000 y for the resident farmer scenario. The resident farmer dose was predominantly due to technetium-99 (Tc-99) (82 percent) and lead-210 (Pb-210) (13 percent). Pb-210 present at 1,000 y is produced predominantly by radioactive decay of uranium-234 (U-234) present at the time of disposal. All results for the postdrilling and intruder-agriculture scenarios comply with the performance objectives (Tables 4 and 5, Figures 3 and 4). The postdrilling intruder results are similar to Version 4.105 results. The intruder-agriculture results are similar to Version 4.105, except for the Pit 6 Radium Disposal Unit (RaDU). The intruder-agriculture result for the Shallow Land Burial (SLB) disposal units is a significant fraction of the performance objective and exceeds the performance objective at the 95th percentile. The intruder-agriculture dose is due predominantly to Tc-99 (75 percent) and U-238 (9.5 percent). The acute intruder scenario results comply with all performance objectives (Tables 6 and 7, Figures 5 and 6). The acute construction result for the SLB disposal units decreases significantly with this version. The maximum acute intruder dose occurs at 1,000 y for the SLB disposal units under the acute construction scenario. The acute intruder dose is caused by multiple radionuclides including U-238 (31 percent), Th-229 (28 percent), plutonium-239 (8.6 percent), U-233 (7.8 percent), and U-234 (6.7 percent). All results for radon-222 (Rn-222) flux density comply with the performance objective (Table 8, Figure 7). The mean Pit 13 RaDU flux density is close to the 0.74 Bq m{sup -2} s{sup -1} limit.

NSTec Environmental Management

2011-07-20T23:59:59.000Z

310

Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Sites Performance Assessment Program  

SciTech Connect (OSTI)

This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N&C).

Gregory J. Shott, Vefa Yucel

2007-01-03T23:59:59.000Z

311

Assessment of contrast enhanced respiration managed cone-beam CT for image guided radiotherapy of intrahepatic tumors  

SciTech Connect (OSTI)

Purpose: Contrast enhancement and respiration management are widely used during image acquisition for radiotherapy treatment planning of liver tumors along with respiration management at the treatment unit. However, neither respiration management nor intravenous contrast is commonly used during cone-beam CT (CBCT) image acquisition for alignment prior to radiotherapy. In this study, the authors investigate the potential gains of injecting an iodinated contrast agent in combination with respiration management during CBCT acquisition for liver tumor radiotherapy. Methods: Five rabbits with implanted liver tumors were subjected to CBCT with and without motion management and contrast injection. The acquired CBCT images were registered to the planning CT to determine alignment accuracy and dosimetric impact. The authors developed a simulation tool for simulating contrast-enhanced CBCT images from dynamic contrast enhanced CT imaging (DCE-CT) to determine optimal contrast injection protocols. The tool was validated against contrast-enhanced CBCT of the rabbit subjects and was used for five human patients diagnosed with hepatocellular carcinoma. Results: In the rabbit experiment, when neither motion management nor contrast was used, tumor centroid misalignment between planning image and CBCT was 9.2 mm. This was reduced to 2.8?mm when both techniques were employed. Tumors were not visualized in clinical CBCT images of human subjects. Simulated contrast-enhanced CBCT was found to improve tumor contrast in all subjects. Different patients were found to require different contrast injections to maximize tumor contrast. Conclusions: Based on the authors animal study, respiration managed contrast enhanced CBCT improves IGRT significantly. Contrast enhanced CBCT benefits from patient specific tracer kinetics determined from DCE-CT.

Jensen, Nikolaj K. G., E-mail: nkyj@regionsjaelland.dk [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada)] [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Stewart, Errol [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada) [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7 (Canada); Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 (Canada); Lock, Michael; Fisher, Barbara [Radiation Oncology, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Radiation Oncology, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Kozak, Roman [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada)] [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Chen, Jeff [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Lee, Ting-Yim [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada) [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7 (Canada); Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Wong, Eugene [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Department of Physics and Astronomy, University of Western Ontario, London, Ontario N6A 3K7 (Canada)

2014-05-15T23:59:59.000Z

312

Development of a Software SecurityAssessment Instrument to Reduce Software SecurityRisk  

E-Print Network [OSTI]

system, has vulnerabilities. (SAT) for use in the software development and maintenance life cycle throughout the sofhvare development and maintenance life cycle. The. security assessment instrument includes security assessment for use in the software development and maintenance life cycle. Currently

Bishop, Matt

313

Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri  

E-Print Network [OSTI]

Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri Faculty Advisor : Prof Estimation Methodology Applications (in progress) Port of Long Beach · Seismic Risk Assessment, Decision & Vertical movement, Settlement of Apron Seismic Vulnerability - quay Wall

Shinozuka, Masanobu

314

Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the NTS  

SciTech Connect (OSTI)

U.S. Department of Energy (DOE) Manual M 435.1-1 requires that performance assessments (PAs) and composite analyses (CAs) for low-level waste (LLW) disposal facilities be maintained by the field offices. This plan describes the activities performed to maintain the PA and the CA for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada Test Site (NTS). This plan supersedes the Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (DOE/NV/11718--491-REV 1, dated September 2002). The plan is based on U.S. Department of Energy (DOE) Order 435.1 (DOE, 1999a), DOE Manual M 435.1-1 (DOE, 1999b), the DOE M 435.1-1 Implementation Guide DOE G 435.1-1 (DOE, 1999c), and the Maintenance Guide for PAs and CAs (DOE, 1999d). The plan includes a current update on PA/CA documentation, a revised schedule, and a section on Quality Assurance.

Vefa Yucel

2007-01-03T23:59:59.000Z

315

Notice of Intent to Revise DOE G 414.1-1B, Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This memorandum provides justification for revising DOE G 414.1-1B, Management and Independent Assessments Guide for Use With 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A, Implementation of Department of Energy Oversight Policy.

2013-04-18T23:59:59.000Z

316

Nonproliferation impacts assessment for the management of the Savannah River Site aluminum-based spent nuclear fuel  

SciTech Connect (OSTI)

On May 13, 1996, the US established a new, 10-year policy to accept and manage foreign research reactor spent nuclear fuel containing uranium enriched in the US. The goal of this policy is to reduce civilian commerce in weapons-usable highly enriched uranium (HEU), thereby reducing the risk of nuclear weapons proliferation. Two key disposition options under consideration for managing this fuel include conventional reprocessing and new treatment and packaging technologies. The Record of Decision specified that, while evaluating the reprocessing option, ``DOE will commission or conduct an independent study of the nonproliferation and other (e.g., cost and timing) implications of chemical separation of spent nuclear fuel from foreign research reactors.`` DOE`s Office of Arms Control and Nonproliferation conducted this study consistent with the aforementioned Record of Decision. This report addresses the nonproliferation implications of the technologies under consideration for managing aluminum-based spent nuclear fuel at the Savannah River Site. Because the same technology options are being considered for the foreign research reactor and the other aluminum-based spent nuclear fuels discussed in Section ES.1, this report addresses the nonproliferation implications of managing all the Savannah River Site aluminum-based spent nuclear fuel, not just the foreign research reactor spent nuclear fuel. The combination of the environmental impact information contained in the draft EIS, public comment in response to the draft EIS, and the nonproliferation information contained in this report will enable the Department to make a sound decision regarding how to manage all aluminum-based spent nuclear fuel at the Savannah River Site.

NONE

1998-12-01T23:59:59.000Z

317

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability  

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

318

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

319

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

320

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

322

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity Implications for agricultural production, trade and poverty The issue of climate volatility Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

323

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java Runtime...

324

Supplemental information related to risk assessment for the off-site transportation of transuranic waste for the U.S. Department of Energy waste management programmatic environmental impact statement  

SciTech Connect (OSTI)

This report presents supplemental information to support the human health risk assessment conducted for the transportation of transuranic waste (TRUW) in support of the US Department of Energy Waste Management Programmatic Environmental Impact Statement (WM PEIS). Detailed descriptions of the transportation health risk assessment method and results of the assessment are presented in Appendix E of the WM PEIS and are not repeated in this report. This report presents additional information that is not presented in Appendix E but is necessary to conduct the transportation risk assessment for Waste Management (WM) contact- and remote-handed (CH and RH) TRUW. Included are definitions of the TRUW alternatives considered in the WM PEIS, data related to the inventory and to the physical and radiological characteristics of CH and RH TRUW, and detailed results of the assessment for each WM TRUW case considered.

Monette, F.A.; Biwer, B.M.; LePoire, D.J.; Chen, S.Y. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1996-12-01T23:59:59.000Z

325

Material stabilization characterization management plan  

SciTech Connect (OSTI)

This document presents overall direction for characterization needs during stabilization of SNM at the Plutonium Finishing Plant (PFP). Technical issues for needed data and equipment are identified. Information on material categories and links to vulnerabilities are given. Comparison data on the material categories is discussed to assist in assessing the relative risks and desired processing priority.

GIBSON, M.W.

1999-08-31T23:59:59.000Z

326

Assessment of managed aquifer recharge site suitability and influence using a GIS and3 numerical modeling4  

E-Print Network [OSTI]

" for20 MAR. Results from the GIS analysis were used with a regional groundwater model to assess the groundwater flowing to the ocean over the long term. Modeling results28 illustrate considerable variability evaluation of options for32 enhancing groundwater resources.33 34 1. Introduction35 Groundwater

Fisher, Andrew

327

INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE SEPARATIONS PROCESS RESEARCH UNIT (SPRU) DISPOSITION PROJECT, NEW YORK  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) is currently evaluating the water management procedures at the Separations Process Research Unit (SPRU). The facility has three issues related to water management that require technical assistance: (1) due to a excessive rainfall event in October, 2010, contaminated water collected in basements of G2 and H2 buildings. As a result of this event, the contractor has had to collect and dispose of water offsite; (2) The failure of a sump pump at a KAPL outfall resulted in a Notice of Violation issued by the New York State Department of Environment and Conservation (NYSDEC) and subsequent Consent Order. On-site water now requires treatment and off-site disposition; and (3) stormwater infiltration has resulted in Strontium-90 levels discharged to the storm drains that exceed NR standards. The contractor has indicated that water management at SPRU requires major staff resources (at least 50 persons). The purpose of this review is to determine if the contractor's technical approach warrants the large number of staff resources and to ensure that the technical approach is compliant and in accordance with federal, state and NR requirements.

Abitz, R.; Jackson, D.; Eddy-Dilek, C.

2011-06-27T23:59:59.000Z

328

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

329

A total risk assessment methodology for security assessment.  

SciTech Connect (OSTI)

Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

2009-06-01T23:59:59.000Z

330

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

331

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

332

Comparative assessment of municipal sewage sludge incineration, gasification and pyrolysis for a sustainable sludge-to-energy management in Greece  

SciTech Connect (OSTI)

Highlights: The high output of MSS highlights the need for alternative routes of valorization. Evaluation of 3 sludge-to-energy valorisation methods through SWOT analysis. Pyrolysis is an energy and material recovery process resulting to zero waste. Identification of challenges and barriers for MSS pyrolysis in Greece was investigated. Adopters of pyrolysis systems face the challenge of finding new product markets. - Abstract: For a sustainable municipal sewage sludge management, not only the available technology, but also other parameters, such as policy regulations and socio-economic issues should be taken in account. In this study, the current status of both European and Greek Legislation on waste management, with a special insight in municipal sewage sludge, is presented. A SWOT analysis was further developed for comparison of pyrolysis with incineration and gasification and results are presented. Pyrolysis seems to be the optimal thermochemical treatment option compared to incineration and gasification. Sewage sludge pyrolysis is favorable for energy savings, material recovery and high added materials production, providing a zero waste solution. Finally, identification of challenges and barriers for sewage sludge pyrolysis deployment in Greece was investigated.

Samolada, M.C. [Dept. Secretariat of Environmental and Urban Planning Decentralized Area Macedonian Thrace, Taki Oikonomidi 1, 54008 Thessaloniki (Greece); Zabaniotou, A.A., E-mail: azampani@auth.gr [Aristotle University of Thessaloniki, Dept. of Chemical Engineering, University Box 455, University Campus, 541 24 Thessaloniki (Greece)

2014-02-15T23:59:59.000Z

333

Study of Risk Assessment Programs at Federal Agencies and Commercial Industry Related to the Conduct or Regulation of High Hazard Operations  

SciTech Connect (OSTI)

In the Department of Energy (DOE) Implementation Plan (IP) for Defense Nuclear Facilities Safety Board's Recommendation 2009-1, the DOE committed to studying the use of quantitative risk assessment methodologies at government agencies and industry. This study consisted of document reviews and interviews of senior management and risk assessment staff at six organizations. Data were collected and analyzed on risk assessment applications, risk assessment tools, and controls and infrastructure supporting the correct usage of risk assessment and risk management tools. The study found that the agencies were in different degrees of maturity in the use of risk assessment to support the analysis of high hazard operations and to support decisions related to these operations. Agencies did not share a simple, 'one size fits all' approach to tools, controls, and infrastructure needs. The agencies recognized that flexibility was warranted to allow use of risk assessment tools in a manner that is commensurate with the complexity of the application. The study also found that, even with the lack of some data, agencies application of the risk analysis structured approach could provide useful insights such as potential system vulnerabilities. This study, in combination with a companion study of risk assessment programs in the DOE Offices involved in high hazard operations, is being used to determine the nature and type of controls and infrastructure needed to support risk assessments at the DOE.

Bari, R.; Rosenbloom, S.; O'Brien, J.

2011-03-13T23:59:59.000Z

334

A strategic analysis study-based approach to integrated risk assessment: Occupational health risks from environmental restoration and waste management activities at Hanford  

SciTech Connect (OSTI)

The goal of environmental restoration and waste management activities is to reduce public health risks or to delay risks to the future when new technology will be available for improved cleanup solutions. Actions to remediate the wastes on the Hanford Site will entail risks to workers, the public, and the environment that do not currently exist. In some circumstances, remediation activities will create new exposure pathways that are not present without cleanup activities. In addition, cleanup actions will redistribute existing health risks over time and space, and will likely shift health risks to cleanup workers in the short term. This report describes an approach to occupational risk assessment based on the Hanford Strategic Analysis Study and illustrates the approach by comparing worker risks for two options for remediation of N/K fuels, a subcategory of unprocessed irradiated fuels at Hanford.

Mahaffey, J.A.; Doctor, P.G.; Buschbom, R.L.; Glantz, C.S.; Daling, P.M.; Sever, L.E.; Vargo, G.J. Jr.; Strachan, D.M. (Pacific Northwest Lab., Richland, WA (United States)); Pajunen, A.L.; Hoyt, R.C.; Ludowise, J.D. (Westinghouse Hanford Co., Richland, WA (United States))

1993-06-01T23:59:59.000Z

335

ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES  

E-Print Network [OSTI]

ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES AND VULNERABILITY of ManagementXi'an Jiaotong University & School of Economic and Management ,Shanxi Normal University Mail Address : Gongyuan Road 1, Economic and Management School, Shanxi Normal University, Linfen city, Shanxi

Boyer, Edmond

336

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

337

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

338

CRAD, Safety Functions Assessment Plan | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Safety Functions Assessment Plan CRAD, Safety Functions Assessment Plan Performance Objective: Management should be proactive in addressing safety-related issues. Management should...

339

Environmental Assessment for the construction and operation of the Three Rivers Solid Waste Authority regional waste management center at the Savannah River Site  

SciTech Connect (OSTI)

This Environmental Assessment (EA) has been prepared by the US Department of Energy (DOE) to assess the potential environmental impacts associated with the construction and operation of a landfill and technology center for regionally-generated municipal solid waste at the Savannah River Site (SRS) near Aiken, South Carolina. The facility would serve the municipal solid waste disposal needs for SRS and at least nine of the surrounding counties who currently comprise the Three Rivers Solid Waste Authority (TRSWA). Additional counties could become included in the proposed action at some future date. Current Federal and state requirements do not afford individual counties and municipalities within the region encompassing SRS the ability to efficiently or economically operate modern waste management facilities. In addition, consolidation of regional municipal solid waste at one location would have the benefit of reducing the duplicity of environmental consequences associated with the construction and operation of county-level facilities. The option to seek a combined disposal and technology development facility based on a regionally-cooperative effort was selected as a viable alternative to the existing individual SRS or county disposal activities. This document was prepared in compliance with the National Environmental Policy Act (NEPA) of 1969, as amended, the requirements of the Council on Environmental Quality Regulations for Implementing NEPA (40 CFR Part 1021). NEPA requires the assessment of environmental consequences of Federal actions that may affect the quality of the human environment. Based on the potential for impacts described for impacts described herein, DOE will either publish a Finding of No Significant Impact or prepare an environmental impact statement (EIS).

NONE

1995-12-01T23:59:59.000Z

340

DOE's Environmental Management Site-Specific Advisory Board: The Roles, Work, and Assessment of the Constituent Local Boards - 13587  

SciTech Connect (OSTI)

The charter for the Department of Energy's Environmental Management (EM) Site-Specific Advisory Board (SSAB) was approved under the Federal Advisory Committee Act (FACA) in 1994. With a unique mandate to provide public input on issues associated with the cleanup of nuclear legacy sites in the U.S., the EM SSAB comprises eight local boards, which are based at major EM sites. While each board is unique to the community in which it is located and reflects the diversity of the local population, the boards are governed by FACA, related regulations, and DOE policies that are intended to standardize agency advisory board operations. The EM SSAB local boards are made up of a diverse group of citizens who want to understand the mission and goals of the EM program and to help EM achieve those goals for the benefit of their communities. Some are quite passionate about their mission; others need to be coaxed into active participation. Maintaining productive relationships and a supportive environment for effective board operations is the challenge of board management for DOE EM and the board members themselves. DOE draws on research findings and best practices literature from academics and practitioners in the field of public involvement in its board management practices. The EM SSAB is also evaluated annually under the law to ensure that the investment of taxpayer dollars in the board is warranted in light of the contributions of the board. Further evaluation takes place at the agency and site levels in order to identify what aspects of board functioning the agency and board members find important to its success and to address areas where improvement is needed. Board contributions, compliance factors, and measurable outcomes related to board products and process areas are key to agency commitment to ongoing support of the boards and to participant satisfaction and thus continued member involvement. In addition to evaluation of these factors in improving board effectiveness, the agency draws on the experience of members to create best practices for the EM SSAB, as a unique form of public involvement. Four areas that have been identified by local board Chairpersons as important to their local board operations are - Enhancing communication between technical and non-technical board members; - Building on common ground toward recommendations; - Public involvement in EM SSAB local board activities; - The EM SSAB annual work plan process. The first three areas are addressed below by current or former chairpersons of the EM SSAB: Ralph Phelps, former Chairperson of the Northern New Mexico Citizens' Advisory Board; Susan Leckband, former Chairperson and current Vice Chairperson of the Hanford Advisory Board; and Val Francis, Vice Chairperson of the Portsmouth (PORTS) SSAB. In addition, Eric Roberts, facilitator of the PORTS SSAB, has contributed to the section on public involvement. In a separate paper for this session, Ralph Young, Chairperson of the Paducah Citizens' Advisory Board addresses the EM SSAB annual work plan process. (authors)

Alexander, Catherine [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States)] [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States); Freeman, Jenny [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States)] [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States); Cantrell, Yvette [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)] [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy...  

Broader source: Energy.gov (indexed) [DOE]

Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report U.S....

342

Zajac, R.N. 1999. Understanding the seafloor landscape in relation to assessing and managing impacts on coastal environments. Pp 211-227 in: J.S. Gray, W. Ambrose Jr., A. Szaniawska (eds) Biogeochemical Cycling and Sediment  

E-Print Network [OSTI]

of organisms, and have borne much of man's long history of development and associated environmental impacts IN RELATION TO IMPACT ASSESSMENT AND ENVIRONMENTAL MANAGEMENT IN COASTAL MARINE SEDIMENTS ROMAN N. ZAJAC impacts on coastal environments. Pp 211-227 in: J.S. Gray, W. Ambrose Jr., A. Szaniawska (eds

Zajac, Roman N.

343

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

344

assessment program emap: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The Human Resource Management (HRM) specialization started as a new IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 22710) MissionVision Statement...

345

Environmental Assessment and Finding of No Significant Impact: Interim Measures for the Mixed Waste Management Facility Groundwater at the Burial Ground Complex at the Savannah River Site  

SciTech Connect (OSTI)

The U. S. Department of Energy (DOE) prepared this environmental assessment (EA) to analyze the potential environmental impacts associated with the proposed interim measures for the Mixed Waste Management Facility (MW) groundwater at the Burial Ground Complex (BGC) at the Savannah River Site (SRS), located near Aiken, South Carolina. DOE proposes to install a small metal sheet pile dam to impound water around and over the BGC groundwater seepline. In addition, a drip irrigation system would be installed. Interim measures will also address the reduction of volatile organic compounds (VOCS) from ''hot-spot'' regions associated with the Southwest Plume Area (SWPA). This action is taken as an interim measure for the MWMF in cooperation with the South Carolina Department of Health and Environmental Control (SCDHEC) to reduce the amount of tritium seeping from the BGC southwest groundwater plume. The proposed action of this EA is being planned and would be implemented concurrent with a groundwater corrective action program under the Resource Conservation and Recovery Act (RCRA). On September 30, 1999, SCDHEC issued a modification to the SRS RCRA Part B permit that adds corrective action requirements for four plumes that are currently emanating from the BGC. One of those plumes is the southwest plume. The RCRA permit requires SRS to submit a corrective action plan (CAP) for the southwest plume by March 2000. The permit requires that the initial phase of the CAP prescribe a remedy that achieves a 70-percent reduction in the annual amount of tritium being released from the southwest plume area to Fourmile Branch, a nearby stream. Approval and actual implementation of the corrective measure in that CAP may take several years. As an interim measure, the actions described in this EA would manage the release of tritium from the southwest plume area until the final actions under the CAP can be implemented. This proposed action is expected to reduce the release of tritium from the southwest plume area to Fourmile Branch between 25 to 35 percent. If this proposed action is undertaken and its effectiveness is demonstrated, it may become a component of the final action in the CAP. This document was prepared in compliance with the National Environmental Policy Act (NEPA) of 1969, as amended; the requirements of the Council on Environmental Quality Regulations for Implementing NEPA (40 CFR 1500-1508); and the DOE Regulations for Implementing NEPA (10 CFR 1021). NEPA requires the assessment of environmental consequences of Federal actions that may affect the quality of the human environment. Based on the potential for impacts described herein, DOE will either publish a Finding of No Significant Impact (FONSI) or prepare an environmental impact statement (EM).

N /A

1999-12-08T23:59:59.000Z

346

A Roadmap to Risk-Aware Business Process Management  

E-Print Network [OSTI]

that resources are utilized as efficient as possible and services are managed in an effective way. From vulnerabilities [11][12]. The introduced model consists of four interconnected layers: (1) Business process layerA Roadmap to Risk-Aware Business Process Management Stefan Jakoubi, Thomas Neubauer Secure Business

347

Managing Critical Management Improvement Initiatives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

348

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

349

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

350

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

351

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

352

Independent Oversight Assessment, DOE Office of Environmental...  

Broader source: Energy.gov (indexed) [DOE]

of Environmental Management Headquarters - November 2012 November 2012 Assessment of Safety Culture at the U.S. Department of Energy Office of Environmental Management...

353

Joint environmental assessment 1997--2001 of the California Department of Food and Agriculture Curly Top Virus Control Program for Bureau of Land Management and Department of Energy  

SciTech Connect (OSTI)

The DOE, Naval Petroleum reserves in California (NPRC), proposes to sign an Amendment to the Cooperative Agreement and Supplement with the California Department of Food and Agriculture (CDFA) to extend the term of the Curly Top Virus Control Program (CTVCP) in California. This program involves Malathion spraying on NPRC lands to control the beet leafhopper, over a five year period from 1997 through 2001. It is expected that approximately 330 acres on Naval Petroleum Reserve Number 1 (NPR-1) and approximately 9,603 acres on Naval Petroleum Reserve Number 2 (NPR-2) will be treated with Malathion annually by CDFA during the course of this program. The actual acreage subject to treatment can vary from year to year. Pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as amended, the potential impacts of the proposed action were analyzed in a Joint Environmental Assessment (DOE/EA-1011) with the US Department of Interior, Bureau of Land Management (BLM) acting as lead agency, in consultation with the CDFA, and the DOE acting as a cooperating agency. Based on the analysis in the EA, DOE has determined that the conduct of the Curly Top Virus Control Program in California is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the NEPA. Therefore, the preparation of an Environmental Impact Statement is not required and DOE is consequently issuing a FONSI.

NONE

1997-03-01T23:59:59.000Z

354

4-Poster Tick Management and White-tailed Deer Management  

E-Print Network [OSTI]

the methodologies for Integrated Wildlife Damage Management approach #12;Environmental Assessment Purpose and NeedUpdate on: 4-Poster Tick Management and White-tailed Deer Management Tim Green Environmental been on hold until present #12;Environmental Assessment Current Status: Adopting two existing EAs - U

Homes, Christopher C.

355

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

356

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

357

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

358

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

359

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

360

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

362

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

363

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

364

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

365

Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on  

E-Print Network [OSTI]

OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having with national security establish practical responses to climate change and extreme weather events

366

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

367

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

368

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

369

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Universit de

370

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

371

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

372

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

373

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

374

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

375

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

376

2012 Annual Planning Summary for Legacy Management  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within Legacy Management.

377

Marginalized Monitoring: Adaptively Managing Urban Stormwater  

E-Print Network [OSTI]

environmental assessment, 28 Superfund decisionmaking, 29 Endangered Species Act decisionmaking, 30 and water management.Environmental Impacts Under Florida Water Law: From Water Wars Towards Adaptive Management ,water infrastructure problems. And yet, the environmental management

Scanlan, Melissa K; Tai, Stephanie

2013-01-01T23:59:59.000Z

378

Clemson University Construction Science and Management BS  

E-Print Network [OSTI]

shall be able to describe practices of effective management of personnel, materials, equipment, costsClemson University Construction Science and Management BS 2011 2012 Outcome Assessment Plan Mission / Purpose - The mission of the Department of Construction Science and Management undergraduate

Bolding, M. Chad

379

Cyber Assessment Methods For SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

May Robin Permann; Kenneth Rohde

2005-06-01T23:59:59.000Z

380

Cyber Assessment Methods for SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

Not Available

2005-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Assessing the assessments: Pharmaceuticals in the environment  

SciTech Connect (OSTI)

The relatively new issue of pharmaceutical contamination of the environment offers the opportunity to explore the application of values to the construction, communication and management of risk. The still-developing regulatory policies regarding environmental contamination with pharmaceuticals provide fertile ground for the introduction of values into the definition and management of risk. In this report, we summarize the current knowledge regarding pharmaceutical contamination of the environment and discuss specific attributes of pharmaceuticals that require special consideration. We then present an analysis showing that if values are incorporated into assessing, characterizing and managing risk, the results of risk assessments will more accurately reflect the needs of various stakeholders. Originating from an acknowledgement of the inherent uncertainty and value-laden nature of risk assessment, the precautionary principle (and later, the multi-criteria, integrated risk assessment), provides a direction for further research and policy development.

Enick, O.V. [Department of Biological Sciences, Simon Fraser University, Burnaby, BC, V5A 1S6 (Canada)], E-mail: oana.enick@gov.bc.ca; Moore, M.M. [Department of Biological Sciences, Simon Fraser University, Burnaby, BC, V5A 1S6 (Canada)], E-mail: mmoore@sfu.ca

2007-11-15T23:59:59.000Z

382

Farm Assessment for Water Resource Protection Field Assessment  

E-Print Network [OSTI]

Farm Assessment for Water Resource Protection WQ-42 Field Assessment for Water Resource Protection Extension Service · West Lafayette, IN 47907 Introduction The Field Assessment for Water Resource Protection management practices. You decide what actions to take. Field Assessment for Water Resource Protection

Holland, Jeffrey

383

Northeast Climate Science Center: Transposing Extreme Rainfall to Assess Climate Vulnerability  

Office of Energy Efficiency and Renewable Energy (EERE)

Climate models predict significant increases in the magnitude and frequency of extreme rainfalls. However, climate model projections of precipitation vary greatly across models. For communities...

384

Assessing the Vulnerability of Replicated Network George Dean Bissias, Brian Neil Levine, and Ramesh K. Sitaraman  

E-Print Network [OSTI]

, and Ramesh K. Sitaraman Dept. of Computer Science, Univ. of Massachusetts Amherst, USA {gbiss% of the substations from all generators; on a large wireless mesh network disrupting 5% of wireless links between autonomous systems (i.e., servers). In a power grid, each substation (i.e., client) connects to one

Massachusetts at Amherst, University of

385

Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak  

E-Print Network [OSTI]

care expenditures. Although the U.S. has had less severe animal disease outbreaks than those occurring in many other countries, this does not necessarily mean that the U.S. food supply chain is safe from disease related threats. Therefore...

Hughes, Randi Catherine

2011-08-08T23:59:59.000Z

386

Assessing the Impact of Potential Bridge Collapse on Road Network Vulnerability: a Case Study in Oklahoma.  

E-Print Network [OSTI]

??is study applied three different measures, which are unweighted increased travel time, increased travel time weighted by traffic flow, and decreased accessibility of cities, to (more)

Zhao, Yun

2011-01-01T23:59:59.000Z

387

THEORY AND PRACTICE IN ASSESSING VULNERABILITY TO CLIMATE CHANGE AND FACILITATING ADAPTATION  

E-Print Network [OSTI]

impacts at the household- and community-level in response to the current process of economic renovation. KELLY1,2, and W. N. ADGER2 1Climatic Research Unit, and 2Centre for Social and Economic Research the social and economic well-being of society at the centre of the analysis, focussing on the socio-economic

Kelly, Mick

388

A METHOD FOR RAPID VULNERABILITY ASSESSMENT OF STRUCTURES LOADED BY OUTSIDE BLASTS  

E-Print Network [OSTI]

military threats to a nuclear power plant in the year 1991 (Stritar et al, 1991). More recent examples cases not been assumed as design basis loads of nuclear power plant buildings and structures. Recent efforts have been recently devoted to the increased security of nuclear power plants (NPP) (see

Cizelj, Leon

389

1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity  

E-Print Network [OSTI]

of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

390

Can leading indicators assess country vulnerability? Evidence from the 200809 global financial crisis  

E-Print Network [OSTI]

, in contrast to the international debt crisis that began in Latin America in 1982 and the East Asia crisis countries were badly impacted by the global financial crisis of 2008­09. The crisis renewed interest

Wolfe, Patrick J.

391

Seismic Vulnerability Assessment Waste Characterization Reduction and Repackaging Building, TA-50-69  

SciTech Connect (OSTI)

This report presents the results of the seismic structural analyses completed on the Waste Characterization Reduction and Repackaging (WCRR) Building in support of ongoing safety analyses. WCRR is designated as TA-50-69 at Los Alamos National Laboratory, Los Alamos, New Mexico. The facility has been evaluated against Department of Energy (DOE) seismic criteria for Natural Phenomena Hazards (NPH) Performance Category II (PC 2). The seismic capacities of two subsystems within the WCRR building, the material handling glove box and the lift rack immediately adjacent to the Glove Box are also documented, and the results are presented.

M.W.Sullivan; J.Ruminer; I.Cuesta

2003-02-02T23:59:59.000Z

392

EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European  

E-Print Network [OSTI]

-08004 Barcelona, Spain Sart-Tilman B28, B-4000 Li`ege, Belgium Abstract -- This paper presents (Spain) AIA - Consulting and Engineering (Spain) CESI - Consulting and Engineering (Italy) SEMA Group

Wehenkel, Louis

393

V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a commandDepartment|

394

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

395

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

396

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

397

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

398

Enterprise Risk Management Program  

E-Print Network [OSTI]

..........................................................................23 Appendix C - ERM Program Goals, ERM Guiding Principles, and Institutional Risk Philosophy Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ........................................................................................................................3 Step 2: Risk Identification

Hayden, Nancy J.

399

Utility of Social Modeling for Proliferation Assessment - Preliminary Assessment  

SciTech Connect (OSTI)

This Preliminary Assessment draft report will present the results of a literature search and preliminary assessment of the body of research, analysis methods, models and data deemed to be relevant to the Utility of Social Modeling for Proliferation Assessment research. This report will provide: 1) a description of the problem space and the kinds of information pertinent to the problem space, 2) a discussion of key relevant or representative literature, 3) a discussion of models and modeling approaches judged to be potentially useful to the research, and 4) the next steps of this research that will be pursued based on this preliminary assessment. This draft report represents a technical deliverable for the NA-22 Simulations, Algorithms, and Modeling (SAM) program. Specifically this draft report is the Task 1 deliverable for project PL09-UtilSocial-PD06, Utility of Social Modeling for Proliferation Assessment. This project investigates non-traditional use of social and cultural information to improve nuclear proliferation assessment, including nonproliferation assessment, proliferation resistance assessments, safeguards assessments and other related studies. These assessments often use and create technical information about the States posture towards proliferation, the vulnerability of a nuclear energy system to an undesired event, and the effectiveness of safeguards. This project will find and fuse social and technical information by explicitly considering the role of cultural, social and behavioral factors relevant to proliferation. The aim of this research is to describe and demonstrate if and how social science modeling has utility in proliferation assessment.

Coles, Garill A.; Gastelum, Zoe N.; Brothers, Alan J.; Thompson, Sandra E.

2009-06-01T23:59:59.000Z

400

2008 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs) for each of the facilities, with the results submitted annually to U.S. Department of Energy (DOE) Headquarters. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) performed an annual review in fiscal year (FY) 2008 by evaluating operational factors and research results that impact the continuing validity of the PAs and CAs. This annual summary report presents data and conclusions from the FY 2008 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada Test Site relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

NSTec Environmental Management

2009-03-30T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Certified Professional in Supply Management (CPSM) Review Series: Exam 2: Effective Supply Management Performance  

E-Print Network [OSTI]

Materials and Inventory Management Organization/Department Assessment Planning Product and ServiceCertified Professional in Supply Management (CPSM) Review Series: Exam 2: Effective Supply Management Performance Dates: October 28, 2011 Location: Rutgers University Livingston Campus, Tillett Hall

402

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

403

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

404

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

405

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

406

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

407

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, HerbertE.

408

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

409

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

410

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

411

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Broader source: Energy.gov (indexed) [DOE]

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

412

Kiran Chandra Sapkota Livelihood strategies and vulnerability of urban poor  

E-Print Network [OSTI]

management of drinking water. 97.7 percent HHs have got the electricity and entertainment facilities, electric charge, etc. This study has tried to show five capital assets of urban poor in Khadi Pakha in local social institution but not represented in local government. Above 95 percent HHs involved

Richner, Heinz

413

addressing waste management: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

outside the Former Hazardous Waste Management Homes, Christopher C. 25 Beyond 70%: Assessing Alternative Waste Management Opportunities for Institutions. Open Access Theses and...

414

Flexible Work Arrangements Manager Guidelines  

E-Print Network [OSTI]

Flexible Work Arrangements Manager Guidelines The Ohio State University Office of Human Resources Page 1 of 2 Flexible Work Arrangement ­ Manager Assessment Issued 07/15/10 When you receive a proposal your manager to review for a decision. Remember that granting a flexible work arrangement may help

Jones, Michelle

415

EA-1170: Final Environmental Assessment | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

70: Final Environmental Assessment EA-1170: Final Environmental Assessment Area 5 Radioactive Waste Management Site Access Improvement at the Nevada Test Site The Department of...

416

EA-1117: Final Environmental Assessment | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Environmental Assessment EA-1117: Final Environmental Assessment Management of Spent Nuclear Fuel on the Oak Ridge Reservation, Oak Ridge, Tennessee This EA evaluates the...

417

Information related to low-level mixed waste inventory, characteristics, generation, and facility assessment for treatment, storage, and disposal alternatives considered in the U.S. Department of Energy Waste Management Programmatic Environmental Impact Statement  

SciTech Connect (OSTI)

This report was prepared to support the analysis of risks and costs associated with the proposed treatment of low-level mixed waste (LLMW) under management of the US Department of Energy (DOE). The various waste management alternatives for treatment of LLMW have been defined in the DOE`s Office of Waste Management Programmatic Environmental Impact Statement. This technical memorandum estimates the waste material throughput expected at each proposed LLMW treatment facility and analyzes potential radiological and chemical releases at each DOE site resulting from treatment of these wastes. Models have been developed to generate site-dependent radiological profiles and waste-stream-dependent chemical profiles for these wastes. Current site-dependent inventories and estimates for future generation of LLMW have been obtained from DOE`s 1994 Mixed Waste Inventory Report (MWIR-2). Using treatment procedures developed by the Mixed Waste Treatment Project, the MWIR-2 database was analyzed to provide waste throughput and emission estimates for each of the different waste types assessed in this report. Uncertainties in the estimates at each site are discussed for waste material throughputs and radiological and chemical releases.

Wilkins, B.D.; Dolak, D.A.; Wang, Y.Y.; Meshkov, N.K.

1996-12-01T23:59:59.000Z

418

Pacific Gas and Electric Company's Compressed Air Management Program: A Performance Assessment Approach to Improving Industrial Compressed Air System Operation and Maintenance  

E-Print Network [OSTI]

equipment: ? AEC MicroDataLogger. Four channel data recorder. ? Veris Hawkeye self-contained split-core kW transducer. Samples voltage and current in a three-phase circuit to produce a 4-20mA output proportional to true RMS power with 1% full scale... Commission 1997 Utility Sales Data. 3. US Bureau of the Census - 1994 Manufacturing Energy Consumption Survey (MECS). 4. US DOE Motor Chal1enge Market Assessment Inventory (MAl). 5. US DOE Office of Industrial Technology Industrial Assessment...

Qualmann, R. L.; Zeller, W.; Baker, M.

419

Save Energy Now (SEN) Assessment Helps Expand Energy Management Program at Shaw Industries: Flooring Company Saves $872,000 Annually by Improving Steam System Efficiency  

SciTech Connect (OSTI)

This case study describes how the Shaw Industries plant #20 in Dalton, Georgia, achieved annual savings of $872,000 and 93,000 MMBtu after receiving a DOE Save Energy Now energy assessment and implementing recommendations to improve the efficiency of its steam system.

Not Available

2008-07-01T23:59:59.000Z

420

Framework for the systematic assessment of a material control and accounting system  

SciTech Connect (OSTI)

Procedures are described for the systematic assessment of a Material Control and Accounting (MC and A) system, in terms of compliance to the proposed MC and A Upgrade Rule. The applicability of these assessment procedures to specific Rule provisions is discussed. Special attention is given to the statistical performance of individual subsystems, and their vulnerability to compromise by insider collusion.

Schechter, R.S.; Sacks, I.J.

1981-04-22T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Socio-economic and climate change impacts on agriculture: an integrated assessment, 19902080  

E-Print Network [OSTI]

,b). A consensus has emerged that developing countries are more vulnerable to climate change than developedSocio-economic and climate change impacts on agriculture: an integrated assessment, 1990­2080 Gu University, NY, USA A comprehensive assessment of the impacts of climate change on agro-ecosystems over

422

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

423

Network Management Network Management  

E-Print Network [OSTI]

that pertain to the operation, administration, maintenance, and provisioning of networked systems Operation deals with keeping the network up (and the service provided by the network) Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

424

Corporate Functional Management Evaluation of the LLNL Radiation Safety Organization  

SciTech Connect (OSTI)

A Corporate Assess, Improve, and Modernize review was conducted at Lawrence Livermore National Laboratory (LLNL) to evaluate the LLNL Radiation Safety Program and recommend actions to address the conditions identified in the Internal Assessment conducted July 23-25, 2007. This review confirms the findings of the Internal Assessment of the Institutional Radiation Safety Program (RSP) including the noted deficiencies and vulnerabilities to be valid. The actions recommended are a result of interviews with about 35 individuals representing senior management through the technician level. The deficiencies identified in the LLNL Internal Assessment of the Institutional Radiation Safety Program were discussed with Radiation Safety personnel team leads, customers of Radiation Safety Program, DOE Livermore site office, and senior ES&H management. There are significant issues with the RSP. LLNL RSP is not an integrated, cohesive, consistently implemented program with a single authority that has the clear roll and responsibility and authority to assure radiological operations at LLNL are conducted in a safe and compliant manner. There is no institutional commitment to address the deficiencies that are identified in the internal assessment. Some of these deficiencies have been previously identified and corrective actions have not been taken or are ineffective in addressing the issues. Serious funding and staffing issues have prevented addressing previously identified issues in the Radiation Calibration Laboratory, Internal Dosimetry, Bioassay Laboratory, and the Whole Body Counter. There is a lack of technical basis documentation for the Radiation Calibration Laboratory and an inadequate QA plan that does not specify standards of work. The Radiation Safety Program lack rigor and consistency across all supported programs. The implementation of DOE Standard 1098-99 Radiological Control can be used as a tool to establish this consistency across LLNL. The establishment of a site wide ALARA Committee and administrative control levels would focus attention on improved processes. Currently LLNL issues dosimeters to a large number of employees and visitors that do not enter areas requiring dosimetry. This includes 25,000 visitor TLDs per year. Dosimeters should be issued to only those personnel who enter areas where dosimetry is required.

Sygitowicz, L S

2008-03-20T23:59:59.000Z

425

APBI 402 / SOIL 502 SUSTAINABLE SOIL MANAGEMENT  

E-Print Network [OSTI]

1 APBI 402 / SOIL 502 SUSTAINABLE SOIL MANAGEMENT TERM 1 - 2014/15 Lead Instructors*: Maja Krzic indicators to assess sustainability of land management practices. Characterize the soil chemical environment 402-Sustainable Soil Management SOIL 502-Advanced Sustainable Soil Management Final exam 35% Final

Farrell, Anthony P.

426

DOE limited standard: Operations assessments  

SciTech Connect (OSTI)

Purpose of this standard is to provide DOE Field Element assessors with a guide for conducting operations assessments, and provide DOE Field Element managers with the criteria of the EM Operations Assessment Program. Sections 6.1 to 6.21 provide examples of how to assess specific areas; the general techniques of operations assessments (Section 5) may be applied to other areas of health and safety (e.g. fire protection, criticality safety, quality assurance, occupational safety, etc.).

NONE

1996-05-01T23:59:59.000Z

427

NS&T MANAGEMENT OBSERVATIONS  

SciTech Connect (OSTI)

The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of managements observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&Ts MOP.

Gianotto, David

2014-06-01T23:59:59.000Z

428

2009 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analysis  

SciTech Connect (OSTI)

The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Wate Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2009. This annual summary report presents data and conclusions from the FY 2009 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada Test Site relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

NSTec Environmental Management

2010-03-15T23:59:59.000Z

429

Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury  

SciTech Connect (OSTI)

The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

2010-01-01T23:59:59.000Z

430

Assessment of alternatives for management of ORNL retrievable transuranic waste. Nuclear Waste Program: transuranic waste (Activity No. AR 05 15 15 0; ONL-WT04)  

SciTech Connect (OSTI)

Since 1970, solid waste with TRU or U-233 contamination in excess of 10 ..mu..Ci per kilogram of waste has been stored in a retrievable fashion at ORNL, such as in ss drums, concrete casks, and ss-lined wells. This report describes the results of a study performed to identify and evaluate alternatives for management of this waste and of the additional waste projected to be stored through 1995. The study was limited to consideration of the following basic strategies: Strategy 1: Leave waste in place as is; Strategy 2: Improve waste confinement; and Strategy 3: Retrieve waste and process for shipment to a Federal repository. Seven alternatives were identified and evaluated, one each for Strategies 1 and 2 and five for Strategy 3. Each alternative was evaluated from the standpoint of technical feasibility, cost, radiological risk and impact, regulatory factors and nonradiological environmental impact.

Not Available

1980-10-01T23:59:59.000Z

431

A framework for combining social impact assessment and risk assessment  

SciTech Connect (OSTI)

An increasing focus on integrative approaches is one of the current trends in impact assessment. There is potential to combine impact assessment with various other forms of assessment, such as risk assessment, to make impact assessment and the management of social risks more effective. We identify the common features of social impact assessment (SIA) and social risk assessment (SRA), and discuss the merits of a combined approach. A hybrid model combining SIA and SRA to form a new approach called, risk and social impact assessment (RSIA) is introduced. RSIA expands the capacity of SIA to evaluate and manage the social impacts of risky projects such as nuclear energy as well as natural hazards and disasters such as droughts and floods. We outline the three stages of RSIA, namely: impact identification, impact assessment, and impact management. -- Highlights: A hybrid model to combine SIA and SRA namely RSIA is proposed. RSIA can provide the proper mechanism to assess social impacts of natural hazards. RSIA can play the role of ex-post as well as ex-ante assessment. For some complicated and sensitive cases like nuclear energy, conducting a RSIA is necessary.

Mahmoudi, Hossein, E-mail: mahmoudi@uni-hohenheim.de [Department of Social Sciences in Agriculture, University of Hohenheim (Germany) [Department of Social Sciences in Agriculture, University of Hohenheim (Germany); Environmental Sciences Research Institute, Shahid Beheshti University, G.C. (Iran, Islamic Republic of); Renn, Ortwin [Department of Technology and Environmental Sociology (and DIALOGIK), University of Stuttgart (Germany)] [Department of Technology and Environmental Sociology (and DIALOGIK), University of Stuttgart (Germany); Vanclay, Frank [Department of Cultural Geography, Faculty of Spatial Sciences, University of Groningen, Groningen (Netherlands)] [Department of Cultural Geography, Faculty of Spatial Sciences, University of Groningen, Groningen (Netherlands); Hoffmann, Volker [Department of Social Sciences in Agriculture, University of Hohenheim (Germany)] [Department of Social Sciences in Agriculture, University of Hohenheim (Germany); Karami, Ezatollah [College of Agriculture, Shiraz University, Shiraz (Iran, Islamic Republic of)] [College of Agriculture, Shiraz University, Shiraz (Iran, Islamic Republic of)

2013-11-15T23:59:59.000Z

432

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

433

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

434

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

435

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

436

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

437

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

438

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

439

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

440

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

442

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

443

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

444

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

445

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Universit de

446

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

447

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

448

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

449

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

450

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

451

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

452

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

453

Public health assessment for tri-county landfill waste management of Illinois, South Elgin, Kane County, Illinois, Region 5. Cerclis No. ILD048306183. Final report  

SciTech Connect (OSTI)

The Tri-County and Elgin Landfills pose a public health hazard because the concentrations of lead in downgradient private wells are high enough to be a long-term health concern. Completed exposure pathways include the exposure to contaminated water from on- and off-site private wells (inhalation, ingestion, dermal contact; past, present, future). Contaminants of concern in on-site groundwater include bis(2-chloroethyl)ether, vinyl chloride, antimony, arsenic, barium, cadmium, fluoride, lead, manganese, nickel, nitrate + nitrite, and thallium. Chemicals of concern in on-site surface soil and sediments include PCBs, arsenic, cadmium, and nickel. Contaminants of concern in on-site subsurface soil include PCBs, arsenic, cadmium, lead, and nickel. This public health assessment recommends health professionals education and community health education be conducted for the community impacted by the landfills.

NONE

1995-08-29T23:59:59.000Z

454

Final environmental assessment for the U.S. Department of Energy, Oak Ridge Operations receipt and storage of uranium materials from the Fernald Environmental Management Project site  

SciTech Connect (OSTI)

Through a series of material transfers and sales agreements over the past 6 to 8 years, the Fernald Environmental Management Project (FEMP) has reduced its nuclear material inventory from 14,500 to approximately 6,800 metric tons of uranium (MTU). This effort is part of the US Department of energy`s (DOE`s) decision to change the mission of the FEMP site; it is currently shut down and the site is being remediated. This EA focuses on the receipt and storage of uranium materials at various DOE-ORO sites. The packaging and transportation of FEMP uranium material has been evaluated in previous NEPA and other environmental evaluations. A summary of these evaluation efforts is included as Appendix A. The material would be packaged in US Department of Transportation-approved shipping containers and removed from the FEMP site and transported to another site for storage. The Ohio Field Office will assume responsibility for environmental analyses and documentation for packaging and transport of the material as part of the remediation of the site, and ORO is preparing this EA for receipt and storage at one or more sites.

NONE

1999-06-01T23:59:59.000Z

455

Soil erosion and climate change: Assessing potential impacts and adaptation practices  

SciTech Connect (OSTI)

Changes in climate associated with changes in atmospheric concentrations of CO{sub 2} and other greenhouse gases might affect soil erosion by wind and water. Changes in erosion could in turn cause changes in productivity and sustainability of agricultural systems, and changes in air quality (PM{sub 10}) and water quality (sediment transport). Substantial effects on productivity may, however, only occur several decades after climate changes. This paper presents a procedure for assessing the potential effects of climate change on erosion and productivity. A preliminary screening process is used to identify and prioritize regions and management systems. Subsequent simulation of selected sites with the EPIC model is used to investigate potential practices to adapt agricultural systems to climate change. In some cases, proposed adaptation strategies might reduce sustainability if they are not matched to environmental conditions found at specific sites. As an example, the assessment procedure is applied to evaluate vulnerability and adaptation practices for a 20% increase in mean monthly wind speeds in the US corn belt.

Lee, J.J.; Phillips, D.L.; Benson, V.W.

1999-07-01T23:59:59.000Z

456

The Niobrara River Basin Study: Using Various Models to Assess  

E-Print Network [OSTI]

Seminar Series Brandi Flyr, Ph.D. Integrated Water Management Division Nebraska Department of Natural;#12;Integrated Water Management Identify Management Setting Assess Water Resources Understand & Predict Set effects of various water management strategies in order to develop water management tools #12;Goals

Farritor, Shane

457

SUBCONTRACT MANAGEMENT  

Energy Savers [EERE]

0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

458

Colorado Forestry Best Management Practices  

E-Print Network [OSTI]

Colorado Forestry Best Management Practices Forest Stewardship Guidelines for Water Quality Management Practices (BMPs) for forestry activities. BMPs are a set of water-quality protection measures-harvest sites in southwest Colorado to assess Colorado forestry BMP application and effectiveness. Sites were

Stephens, Graeme L.

459

Energy Efficiency Improvement and Cost Saving Opportunities for the U.S. Iron and Steel Industry An ENERGY STAR(R) Guide for Energy and Plant Managers  

E-Print Network [OSTI]

strategic energy management program..Chapter 8) Strategic Energy Management Programs Assessments8.1 Strategic Energy Management Programs Understanding how

Worrell, Ernst

2011-01-01T23:59:59.000Z

460

2013 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada; Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2013. This annual summary report presents data and conclusions from the FY 2013 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2013 include the following: Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2013 Evaluation of new or revised waste streams by special analysis Development of version 4.115 of the Area 5 RWMS GoldSim PA/CA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2013 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. The conclusion of the annual review is that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates that no significant changes have occurred. The FY 2013 PA results, generated with the Area 5 RWMS v4.115 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2013. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter the CAs results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Yucca Flat Underground Test Area (Corrective Action Unit [CAU] 97) source term, is scheduled for FY 2024, following the completion of the Corrective Action Decision Document/Corrective Action Plan in FY 2015. Inclusion of the Frenchman Flat Underground Test Area (CAU 98) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 Closure Report in FY 2015. Near-term R&D efforts will focus on continuing development of the PA, CA, and inventory models for the Area 3 and Area 5 RWMS.

Shott, Gregory [NSTec] [NSTec

2014-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Environmental Health and Safety Assessment  

E-Print Network [OSTI]

Environmental Health and Safety Assessment Program Manual 7/15/2013 #12;Environmental Health/26/2013. The most recent version of this document is available electronically at: http://sp.ehs.cornell.edu/env/general-environmental-management/environmental.........................................................................................................................4 #12;Environmental Health and Safety Assessment Program Manual Approved by: (Barb English) Last

Pawlowski, Wojtek

462

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

463

The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study  

SciTech Connect (OSTI)

Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

2006-12-15T23:59:59.000Z

465

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

466

14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association  

E-Print Network [OSTI]

) exposure to air pollution, and (3) social and health vulnerability. These three scores are then added and playgrounds because these are land uses where air pollution sensitive populations (very young, elderly14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association em · feature Whether

Rohs, Remo

467

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

468

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

469

The role of Health Impact Assessment in the setting of air quality standards: An Australian perspective  

SciTech Connect (OSTI)

The approaches used for setting or reviewing air quality standards vary from country to country. The purpose of this research was to consider the potential to improve decision-making through integration of HIA into the processes to review and set air quality standards used in Australia. To assess the value of HIA in this policy process, its strengths and weaknesses were evaluated aligned with review of international processes for setting air quality standards. Air quality standard setting programmes elsewhere have either used HIA or have amalgamated and incorporated factors normally found within HIA frameworks. They clearly demonstrate the value of a formalised HIA process for setting air quality standards in Australia. The following elements should be taken into consideration when using HIA in standard setting. (a) The adequacy of a mainly technical approach in current standard setting procedures to consider social determinants of health. (b) The importance of risk assessment criteria and information within the HIA process. The assessment of risk should consider equity, the distribution of variations in air quality in different locations and the potential impacts on health. (c) The uncertainties in extrapolating evidence from one population to another or to subpopulations, especially the more vulnerable, due to differing environmental factors and population variables. (d) The significance of communication with all potential stakeholders on issues associated with the management of air quality. In Australia there is also an opportunity for HIA to be used in conjunction with the NEPM to develop local air quality standard measures. The outcomes of this research indicated that the use of HIA for air quality standard setting at the national and local levels would prove advantageous. -- Highlights: Health Impact Assessment framework has been applied to a policy development process. HIA process was evaluated for application in air quality standard setting. Advantages of HIA in the air quality standard setting process are demonstrated.

Spickett, Jeffery, E-mail: J.Spickett@curtin.edu.au [WHO Collaborating Centre for Environmental Health Impact Assessment (Australia) [WHO Collaborating Centre for Environmental Health Impact Assessment (Australia); Faculty of Health Sciences, School of Public Health, Curtin University, Perth, Western Australia (Australia); Katscherian, Dianne [WHO Collaborating Centre for Environmental Health Impact Assessment (Australia) [WHO Collaborating Centre for Environmental Health Impact Assessment (Australia); Faculty of Health Sciences, School of Public Health, Curtin University, Perth, Western Australia (Australia); Harris, Patrick [CHETRE UNSW Research Centre for Primary Health Care and Equity, University of New South Wales (Australia)] [CHETRE UNSW Research Centre for Primary Health Care and Equity, University of New South Wales (Australia)

2013-11-15T23:59:59.000Z

470

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

471

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

472

CERTIFICATE OF REGISTRATION Quality Management Systems  

E-Print Network [OSTI]

CERTIFICATE OF REGISTRATION Quality Management Systems INDIAN AGRICULTURAL STATISTICS RESEARCH Certifications Limited Certifies that the Management System of the above mentioned Company has been assessed and meets the requirements established by the following rules: ISO 9001 :2008 The Management System Includes

Rodriguez, Carlos

473

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

474

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

475

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

476

E-Print Network 3.0 - assessment benefits environmental Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Ecology 3 Willingness to Pay Data Potential problems with WTP method Summary: Environmental Impact Assessment Risk Assessment and Management Precautionary...

477

E-Print Network 3.0 - assessment center technical Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

assessment, coastal and marine spatial planning, understanding climate... change, and ecosystem-based fishery management. Developing and implementing the Habitat Assessment......

478

E-Print Network 3.0 - assessment lead abstract Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Network Management Information for Light-Path Assessment Summary: Institute of Technology Abstract - In this work, we consider assessing wavelength availability using partial......

479

Groundwater Data Package for Hanford Assessments  

SciTech Connect (OSTI)

This report presents data and interpreted information that supports the groundwater module of the System Assessment Capability (SAC) used in Hanford Assessments. The objective of the groundwater module is to predict movement of radioactive and chemical contaminants through the aquifer to the Columbia River or other potential discharge locations. This data package is being revised as part of the deliverables under the Characterization of Systems Project (#49139) aimed at providing documentation for assessments being conducted under the Hanford Assessments Project (#47042). Both of these projects are components of the Groundwater Remediation and Closure Assessments Projects, managed by the Management and Integration Project (#47043).

Thorne, Paul D.; Bergeron, Marcel P.; Williams, Mark D.; Freedman, Vicky L.

2006-01-31T23:59:59.000Z

480

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

Jay Yang, Shanchieh

Note: This page contains sample records for the topic "management vulnerability assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

5 Management Plan The management plan described in this section is a culmination of extraordinary efforts by the  

E-Print Network [OSTI]

work together to "derive" and establish the key elements of the Management Plan. Assessment290 5 Management Plan The management plan described in this section is a culmination as a laborious result of carrying out the assessment and inventory work and formation of the vision, goals

482

2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of version 2.102 of the Area 3 RWMS GoldSim PA model; and (5) Development of version 4.113 of the Area 5 RWMS GoldSim PA model. Analysis of the latest available data using the Area 5 RWMS v4.113 GoldSim PA model indicates that all performance objectives can be met. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. In FY 2011, there were no operational changes, monitoring results, or R and D results for the Area 3 RWMS that would impact PA validity. Despite the increase in waste volume and inventory at the Area 3 RWMS since 1996 when the PA was approved, the facility performance evaluated with the Area 3 RWMS PA GoldSim model, version 2.0 (with the final closure inventory), remains well below the performance objectives set forth in U.S. Department of Energy Order DOE O 435.1, 'Radioactive Waste Management' (DOE, 2001). The conclusions of the Area 3 RWMS PA remain valid. A special analysis was prepared to update the PA and CA results for the Area 3 RWMS in FY 2011. Release of the special analysis is planned for FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. Inclusion of the Frenchman Flat Underground Test Area (UGTA) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the closure report for the Frenchman Flat UGTA corrective action unit (CAU) in FY 2015. An industrial site, CAU 547, with corrective action sites near the Area 3 RWMS was found to have a significant plutonium inventory in 2009. CAU 547 will be evaluated for inclusion of future revisions or updates of the Area 3 RWMS CA. The revision of the Area 3 RWMS CA, which will include the UGTA source terms, is expected in FY 2024, following the completion of the Yucca Flat CAU Corrective Action Decision Document, scheduled for FY 2023. Near-term R and D efforts will focus on continuing development of the Are

NSTec Environmental Management

2012-03-20T23:59:59.000Z

483

Medical Surveillance n Based on risk assessment  

E-Print Network [OSTI]

Surveillance Risk Assessment 2.12 #12;n Top management n overall safety policy n resource allocation n2.12 #12;Medical Surveillance Criteria n Based on risk assessment n Pre-placement n evaluate of numbers exists n Predict an outcome given similar events Medical Surveillance Risk Assessment 2.12 #12;n

Collins, Gary S.

484

2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: ? Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA ? Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012 ? Evaluation of new or revised waste streams by special analysis ? Development of version 4.114 of the Area 5 RWMS GoldSim PA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2012 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. A special analysis using the Area 3 RWMS v2.102 GoldSim PA model was prepared to update the PA results for the Area 3 RWMS in FY 2012. The special analysis concludes that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates no significant changes other than an increase in the inventory disposed. The FY 2012 PA results, generated with the Area 5 RWMS v4.114 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Underground Test Area source term (Corrective Action Unit [CAU] 97), is scheduled for FY 2024, following the completion of the Yucca Flat CAU 97 Corrective Action Decision Document/Corrective Action Plan in FY 2016. Inclusion of the Frenchman Flat CAU 98 results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 closure report in FY 2015. Near-term R&D efforts will focus on continuing development of the Area 3 and Area 5 RWMS GoldSim PA/CA and inventory models.

Shott, G. [National Security Technologies, LLC

2013-03-18T23:59:59.000Z

485

Industrial Assessment Center  

SciTech Connect (OSTI)

Since its inception, the University of Florida Industrial Assessment Center has successfully completed close to 400 energy assessments of small to medium manufacturing facilities in Florida, southern Georgia and southern Alabama. Through these efforts, recommendations were made that would result in savings of about $5 million per year, with an implementation rate of 20-25%. Approximately 80 engineering students have worked for the UF-IAC, at least 10 of whom went on to work in energy related fields after graduation. Additionally, through the popular course in Industrial Energy Management, many students have graduated from the University of Florida with a strong understanding and support of energy conservation methods.

Dr. Diane Schaub

2007-03-05T23:59:59.000Z

486

Project Management Plan Resident Management System (RMS)  

E-Print Network [OSTI]

1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

US Army Corps of Engineers

487

2nd Plant Managers Forum Achieving best practices in plant management under financial crisis  

E-Print Network [OSTI]

market conditions Achieving optimum energy management goals by creating and implementing a strategic and managing health and safety hazards within your business Effectively assessing and handling the potential assess and handle the potential risks in your supply chain As corporate environment is quickly changing

Jayaram, Bhyravabotla

488

Research, assessment, and manage-ment have traditionally focused on  

E-Print Network [OSTI]

Marinhos e Sustentabilidade Instituto Nacional de Recursos Biológicos (INRB, I.P./IPIMAR) Avenida de

489

Analytical and Experimental Assessment of Seismic Vulnerability of Beam-Column Joints without Transverse Reinforcement in Concrete Buildings  

E-Print Network [OSTI]

of the upper block of the beam-column joint subassemblybeam-column joints. The third block of this research is theand corner joints. The second building block in the current

Hassan, Wael M.

2011-01-01T23:59:59.000Z

490

Water Poverty in Sub-Saharan African nation: GIS based index for assessing vulnerability in relation to climate change data  

E-Print Network [OSTI]

Access to safe water is currently a privilege for the citizens of many developing countries in Asia and Africa. In the last few decades changes in climate have increased concentrations of greenhouse gasses. The results of global warming have had a...

Trakosa, Anastasia

2008-08-13T23:59:59.000Z

491

Analytical and Experimental Assessment of Seismic Vulnerability of Beam-Column Joints without Transverse Reinforcement in Concrete Buildings  

E-Print Network [OSTI]

Deformations in Reinforced Concrete BeamColumn Joints?,P. , ?Update to ASCE/SEI 41 Concrete Provisions?, EarthquakeEffective Stiffness of Reinforced Concrete Columns?, Pacific

Hassan, Wael M.

2011-01-01T23:59:59.000Z

492

Submission by The Netherlands on the future of the IPCC The Fifth Assessment has been a particularly turbulent period for the Intergovernmental Panel on  

E-Print Network [OSTI]

mistakes in the Fourth Assessment, and the delayed response to these, unveiled serious vulnerabilities wants to retain significance in the future. Current practice · IPCC produces extensive assessments the recommendations by the IAC in 2010, there is room for further improvement. The demands the IPCC will be confronted

Haak, Hein

493

Open Source Course Management and Assessment System  

E-Print Network [OSTI]

... #12;Shared Resource Library · Dynamic Graphing #12;Shared Resource Library · Same Resource, multiple terms mean · Re-use possible on any level #12;24 Resource Assembly Writes module about energy usage · Assistance in resource selection (,,amazon.com") · Quality control Dynamic Metadata #12

494

PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15, 2010Energy6 Frontera Generation Limited15INL

495

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core dam