Powered by Deep Web Technologies
Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

DOE O 206.1, Department of Energy Privacy Program  

Directives, Delegations, and Requirements

The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act ...

2009-01-16T23:59:59.000Z

2

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Information Resources - FOIAXpress Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Depamnf!l1tal Elel1l~nt&$ite july 23, 2009 Office of Information Resources Office of Management DOE Headquarters, Germantown, Germantown Computer Center Server Room Nameonl1fol'l11i1tion Sysleijlprl'f 'Project FOIAXpress ExhibitProj~tUID TBD NeWPIA ~ Update D Please indicate whether this is a new

3

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Workforce Development for Teachers and Scientists Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextineword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 1, 2009 U.S. Department of Energy; Office of Science; Office of Workforce Development for Teachers and Scientists (WDTS) System location - Pacific Northwest National Laboratory, Richland, WA Name of Information iPASS System for DOE Office of Science laboratory fellowship programs, including

4

Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Privacy Act Code of Federal Regulations (CFR) for the Privacy Act is 10CFR 1008 Privacy Act of 1974 and Amendments (as of Jan 2, 1991) From GPO US Code on CD-ROM (GPO S/N 052-001-004-00439-6) $30.00 -CITE- 5 USC Sec. 552a -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -STATUTE- (a) Definitions. - For purposes of this section - (1) the term 'agency' means agency as defined in section 552(e) (FOOTNOTE 1) of this title; (FOOTNOTE 1) See References in Text note below. (2) the term 'individual' means a citizen of the United States or an alien lawfully admitted for permanent residence (3) the term 'maintain' includes maintain, collect, use, or disseminate;

5

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

'" '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Oeparbn~ntal Element" Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Freedom of Information Act/Privacy

6

PRIVACY IMPACT ASSESSMENT: Occupational Medicine Assistant PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medicine Medicine - Assistant PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Deparlment of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT iDafe 'Depauwerltal El.ment& iSlte June 10, 2009 Idaho National Laboratory Name :of,lnfonnation Systetnol"'ITiPtoJect Occupational Medicine - Assistant Exhlblt;ProJect UID Indirect funded Occupational Safety and Health NewPIA 0 Update D N T 'tl I Contact Information arne I e . , Phone, Email System Owner Local Privacy Act Offtcer

7

PRIVACY IMPACT ASSESSMENT: INL E-IDR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL E-IDR (Invention Disclosure Record) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. I MODULE 1- PRIVACY NEEDS ASSESSMENT Date O..parlmental Element & Site 6/10/09 Idaho National Laboratory Building: 654 BUilding Name: EROS Name of Information System or IT Project E-IDR (Invention Disclosure Record) Exhibit Project UID 61104 NewPIA GJ Update D N T 'tl I Contact Information arne, I e Ph E ' I one, mal System Owner Wendy Skinner Local Privacy Act

8

PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visitor Visitor Dosimeter Badge Tracking PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetexUneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 11, 2009 Deparbnental Idaho National Laboratory Element & Site Building 616 Willow Creek Building Name of Information Visitor Dosimeter Badge Tracking System or IT Project Exhibit Project UID 217975 New PIA ~ Update D Name, Title I Contact Information Phone, Email Lynn Rockhold System Owner I' 1\ I \ \ ( y P II 114 I' "I

9

PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Integrated Safety Management Workshop Registration PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element&·Slte 16/Jun/09 Idaho National Laboratory Engineering Research Office Building (EROB) Name of-Information System or IT Project Integrated Safety Management Workshop Registration Exhibit Project UID 207765 NewPIA D Update 0 DOE PIA - ISMS Workshop Finallxw.doc N T "tl I

10

PRIVACY IMPACT ASSESSMENT: Human Resources Personal Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Human Human Resources - Personal Information Change Request PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site Idaho National Engineering Laboratory Engineering Research Office Building (EROB) Name of Information Human Resources - Personal Information Change Request System or IT Project Business Enclave Exhibit Project UID 106800 NewPIA ~ Update D N T 'tl I Contact Information arne,

11

PRIVACY IMPACT ASSESSMENT: INL Manchester Software  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manchester Manchester Software 1099 Reporting PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program. Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date 06/09/09 Departmental Idaho National Laboratory Element &Site Building Name: lAB Name of Infonnatlon Manchester Software 1099 Reporting System or IT Project Exhibit Project UID 202021 New PIA GJ Update D Name, Title I Contact Information Phone, Email Bryan Larson, System Owner 208-526-8685 Technical Lead, Manchester

12

PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCIO OCIO - HSPD-12 Physical and Logical System PIA Template Version 4- June, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of the Chief Information Officer DOE Headquarters, Forrestal, 8H-065 Name of Information System or IT Project HSPD-12 Physical and Logical Access System Exhibit Project UID Project's Unique 10: 019-60-01-17-01-8062-04-404-140 (2010 UID) NewPIA D Update ~ HSPD-12

13

PRIVACY IMPACT ASSESSMENT: INL Energy Employees' Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided In the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Building 616 Willow Creek Building Name of Information Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) System or IT ProJect Tracking Database Exhibit Project

14

PRIVACY IMPACT ASSESSMENT: OCCUPATIONAL MEDICINE- INL OCCUPATIONAL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCCUPATIONAL OCCUPATIONAL MEDICINE- INL OCCUPATIONAL MEDICAL SUVEILLANCE SYSTEM (OMSS) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Dllte DepartmentAll Element~&Slte 06-16-2009 Idaho National Laboratory Building Number: WCB Building Name: WCB Name of Information System!«)r IT Project Occupational Medical Surveillance System (OMSS) ExhlbllProJect UIO 72 NewPIA D Update 0 DOE PIA - OMSS Finallxw.doc

15

PRIVACY IMPACT ASSESSMENT: Occupational Safety Health Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Occupational Occupational Safety & Health - Occupational Injury & Illness System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1 J Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 12, 2009 Departmental Idaho National Laboratory Element & Site Name of Infonnatlon Occupational Injury & Illness System (01&15) System or IT Project Exhibit Project UID 136 New PIA ~ Update D Name, Title Contact Information Phone, Email Anthony J. Kavran (208) 526-5826

16

1 Modules and exactness  

E-Print Network (OSTI)

Suppose that R is an associative ring with 1. In most commutative cases, R is either the integers Z or some field k. Example: Suppose that k is a field and G is a group. The group-algebra k(G) over k is the direct sum k(G) = ? k, g?G with elements written as finite sums ? g?G ?g g, with ?g ? k and all but finitely many ?g = 0. The rule (?g g)(?h h) = (?g?h) (gh) defines the algebra structure on k(G), with multiplicative identity 1 = 1 e, where e is the identity element of G. A k(G)-module M is a k-vector space M, with bilinear map ? : k(G) M ? M with (r, m) ? ? r?m, such that r?(s?m) = (rs)? m and 1 ? m = m, or equivalently M is a k-vector 1 space equipped with a group homomorphism G ? Autk(M). k(G)-modules are often called G-modules for that reason. Not even that is the most enlightened way to describe a k(G)-module. A group G can be thought of as a category (actually a groupoid) with one object ? and a morphism ? g ? ? ? for every g ? G. Then a k(G)-module is a functor M: G ? k ? Mod which takes values in the category of k-vector spaces. NB: Ive only based these notions on fields k and their vector spaces to make them seem real. The object k could be a ring; then k(G) is a k-algebra still and a k(G)-module is a k-module M equipped with a group homomorphism G ? Autk(M). Now we recall some basic definitions and facts about R-modules. Suppose that f: M ? N is an R-module homomorphism. Then the kernel ker(f) of f is defined by ker(f) = {all x ? M such that f(x) = 0}. ker(f) is plainly a submodule of M. The image 2 im(f) of f is the submodule of N consisting of all y ? N such that y = f(x) for some x ? M. The cokernel of f cok(f) is defined to be the quotient A sequence cok(f) = N / im(f). M f ? ? M ? g ? ? M of R-module homomorphisms is said to be exact if ker(g) = im(f). Equivalently, the sequence is exact if g f = 0 and for all y ? M ? with g(y) = 0 there is an x ? M such that f(x) = y. A sequence M1 ? M2 ? ? Mn of R-module homomorphisms is said to be exact if ker = im everywhere. Example 1.1. The sequence 0 ? ker(f) ? M f ? ? N ? cok(f) ? 0 is exact for all R-module homomorphisms f. Note that 0 ? M f ? ? N is exact if and only if f is a monomorphism (injective), and that

unknown authors

2009-01-01T23:59:59.000Z

17

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1  

E-Print Network (OSTI)

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1 , George Danezis2 , and Markulf additional information about the individual meter readings. 1 Introduction. Smart-grid deployments issue for electricity metering, and will be one significant use-case in the upcoming smart grid

Danezis, George

18

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written slibmisslons will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & SIte· June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Fernald Historical Records System exhIbit Project UIO 019-10-01-31-02-1014-00

19

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-. -. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Deparbnental Element & Site . June 4, 2009 Office of Legacy Management, Morgantown, WV :;:~:f~~r~;;:reC: LM Records Handling System (LMRHS01) - Electronic Records Keeping System exhibit Project UID 019-10-01-31-02-1014-00

20

PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* * PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT D.. June 16, 2009 Deparlnient~", Element &Site Idaho National Laboratory N.....,e,df'llnformatlon 10th International Nuclear Graphite Specialists Meeting registration web site. ,SY8tem,orIT Project exhibit Project UID Enterprise Architecture Application 10 - 223419 NewPIA D Update 0 System

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM ROCKY FLATS ENVIRONMENTAL RECORDS DATABASE PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site June 4,2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Rocky Flats Environmental Records System or IT Project Database exhibit Project UID 019-10-01-31-02-1014-00

22

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

23

PRIVACY IMPACT ASSESSMENT: INL PERSONNEL SECURITY SECIMS PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PERSONNEL PERSONNEL SECURITY - SECIMS PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element;& Site Name of Infonnatlon Syetemor Ilf Project Exhibit ProJect UIO NewPIA D Update ~ June 11, 2009 Idaho National Laboratory Willow Creek Building RIOT-Center INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE 311 DOE PIA - SECIMS Finallxw.doc N T 'tl I Contact Information arne I e . , Phone, Email

24

PRIVACY IMPACT ASSESSMENT: IDAHO NATIONAL LABORATORY-TRAIN PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IDAHO IDAHO NATIONAL LABORATORY-TRAIN PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-wrltten submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Name of Infonnatlon SY8tem or IT Project Training Records and Information Network (TRAIN) Exhibit Project UID 70 NewPIA [!J Update D N T Otl I Contact Information ame, I e Ph E " I one, mal SY8tem Owner Carla J. Drake, Manager (208) 526-0841 Systems Approach

25

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Energy Employees Occupational Illness System or IT Project Compensation Program Act exhibit

26

PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Education Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Elernent'& (Site 24/Jun/09 Idaho National Laboratory Information Operations and Research Center (IORC) Nameofll,f..,rrnatlon INL Education Programs System or IfPi'()ject Business Enclave Exhibit Proj.ctlUO NA NewPIA D Update [~] DOE PIA - INL Education Program Finallxw.doc N T "tl I Contact Information arne,

27

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft Human Resource  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft - Human Resource System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT June 11, 2009 oep"rtrnental Element &Site Idaho National Laboratory (INL) Building Number: REC 608 Building Name: IORC Name 'of Infonnatlon System, or IT Project INL PeopleSoft - Human Resource System exhibit ProJect UID 157044 NewPIA D Update ~ _____ i DOE PIA - Peoplesoft Final.doc

28

Localization privacy  

Science Conference Proceedings (OSTI)

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification ... Keywords: RFID, localization privacy, location privacy, location-aware applications, object localization

Mike Burmester

2012-01-01T23:59:59.000Z

29

Education of Risk Professionals Module 1  

Science Conference Proceedings (OSTI)

This report provides documentation for Module 1 in the Electric Power Research Institute EPRI) Education of Risk Professionals Probabilistic Risk Assessment PRA) training program. Module 1 is the first of six training modules in the Education of Risk Professionals series. Each module is one week in length, and the entire training program is typically scheduled over 10 months. Accompanying this report are the Microsoft PowerPoint slide presentations for Module 1, which contain speaker notes that offer de...

2009-12-23T23:59:59.000Z

30

PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessments, for requirements and additional gUidance for conducting a PIA: http:www.directives.doe.govpdfsdoedoetexUneword206o2061.pdf MODULE I - PRIVACY NEEDS...

31

Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Privacy Privacy/Security This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

32

Energy Privacy Steering Committee  

Energy.gov (U.S. Department of Energy (DOE))

TheDepartment of Energy (DOE) Privacy Steering Committee (EPSC) advises the Senior Agency Official for Privacy (SAOP) and the Departments Privacy Program regardingpolicies and program...

33

Differential privacy under fire  

Science Conference Proceedings (OSTI)

Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ ...

Andreas Haeberlen; Benjamin C. Pierce; Arjun Narayan

2011-08-01T23:59:59.000Z

34

WRAP Module 1 waste analysis plan  

Science Conference Proceedings (OSTI)

The purpose of this waste analysis plan is to document the necessary characterization, sampling, screening, analysis, and waste acceptance criteria for waste received at the WRAP Module 1. Waste expected to be received at WRAP Module 1 includes newly generated and retrieved waste. The newly generated waste will undergo verification prior to treatment, storage, or disposal. Retrieved waste from the burial grounds or above ground storage will undergo further characterization (as needed), treatment, supercompaction, and repackaging

Mayancsik, B.A.

1995-09-22T23:59:59.000Z

35

Department of Energy Idaho - Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies No Fear Act Site Map Privacy Phone Book You are here: DOE-ID Home > Privacy Privacy General Disclaimer This system is made available by an agency of the United States...

36

Understanding privacy policies  

Science Conference Proceedings (OSTI)

Their is growing recognition that users of web-based systems want to understand, if not control, what customer's data is stored by whom, for what purpose, for what duration, and with whom it is shared. We inform current language-based privacy efforts ... Keywords: Clone detection, Domain-specific languages, Empirical study, Language understanding, Language usage, P3P, Policy compliance, Policy enforcement, Privacy, Privacy policies, Software language engineering, Software linguistics, Software metrics, Web-based systems

Ralf Lmmel; Ekaterina Pek

2013-04-01T23:59:59.000Z

37

WIPP Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP Privacy Policy and Disclaimers NOTICE: The Waste Isolation Pilot Plant (WIPP) Internet Server is provided as a service of the Department of Energy (DOE) for distribution of...

38

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

39

Relations among privacy notions  

Science Conference Proceedings (OSTI)

This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation ... Keywords: Adversarial model, anonymity, privacy notions, unlinkability

Jens-Matthias Bohli; Andreas Pashalidis

2011-05-01T23:59:59.000Z

40

The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness  

E-Print Network (OSTI)

. Specifically, we detail how and why: 1. existing privacy mechanisms are leveraged for use in home-based video

Greenberg, Saul

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Privacy in (mobile) Telecommunications Services  

Science Conference Proceedings (OSTI)

Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion ... Keywords: data protection, ethics, location data, privacy, telecommunications, traffic data

Jacques Penders

2004-12-01T23:59:59.000Z

42

Privacy-friendly Energy-metering via Homomorphic Encryption  

E-Print Network (OSTI)

revealed is minimal. There is one issue though, for leakage or fraud detection and smart-grid optimizationPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation, 17 Nov 2009. www.ipc.on.ca/images/Resources/pbd-smartpriv-smartgrid Standards, 1 Dec 2009. http://epic.org/privacy/ smartgrid/EPIC_Smart_Grid-Cybersecurity_12-01-09.2.pdf. [Har

Jacobs, Bart

43

Microsoft PowerPoint - FinalModule1.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Introduction to Earned Value 1: Introduction to Earned Value Management Prepared by: Module 1 - Introduction 1 Prepared by: Booz Allen Hamilton Module1: Introduction to Earned Value Welcome to Module 1. The objective of this module is to introduce you to Earned Value and lay the blueprint for the succeeding modules. This module will include the following topics: * Earned Value Management defined * The differences between Traditional Management and Earned Value Management * How Earned Value Management fits into a Program and Project environment * The framework necessary for proper Earned Value implementation Module 1 - Introduction 2 Prepared by: Booz Allen Hamilton What is Earned Value Management? Earned Value Management (EVM) is a systematic approach to the integration and measurement of cost, schedule, and technical (scope) accomplishments

44

NETL: Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Privacy Policy Privacy Policy National Energy Technology Laboratory strives to protect the privacy of website visitors. Information collected is strictly limited to the following: Information Collected and Stored Automatically The IP address, a number that is automatically assigned to each computer that connects to the World Wide Web; Date and time of website access; Pages browsed. NETL reviews this information in an effort to make the website more useful and informative. This information is used solely as a source of anonymous statistical information; NETL does not track or record information about individuals or their visits. This information is NOT shared with anyone beyond NETL website home page staff, except when required by law enforcement investigation.

45

Privacy | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

issues. The Program is based on the Privacy Act of 1974, as implemented by Office of Management and Budget Circular A-130, the E-Government Act of 2002, and Departmental policies....

46

Privacy Policy | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Data.gov is committed to protecting the privacy and security of visitors to this website. Data.gov does not collect personal information when you visit our website...

47

The Privacy Act of 1974  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Act of 1974 Privacy Act of 1974 The Privacy Act of 1974, 5 U.S.C. §552a, governs an agency's collection, storage, and use of information about an individual. The Privacy Act protects the privacy of individuals by establishing fair information practices for the collection, maintenance, use, and dissemination of information by federal agencies. Frequently Asked Questions Who is an individual for the purposes of the Privacy Act? A (living) citizen of the United States or an alien lawfully admitted for permanent legal residence.  Deceased individuals are not covered by the Privacy Act, and their executors or next-of- kin can not pursue a Privacy Act claim on their behalf.

48

DOE Privacy Steering Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Steering Committee Charter Privacy Steering Committee Charter A. OBJECTIVE The purpose of the Department of Energy (DOE) Privacy Steering Committee (EPSC) is to advise the Senior Agency Official for Privacy (SAOP) and the Department's Privacy Program, providing recommendations to improve policies and program initiatives including breach response and notification, Privacy Impact Assessments, and other privacy matters. The EPSC is an essential component of DOE's ongoing efforts to identify processes to eliminate the unnecessary use of SSNs, and to safeguard Personally Identifiable Information (PII) while mitigating risks where the use of SSNs is authorized by a law, regulation or DOE Directive to fulfill a mission of the Department. B. AUTHORITY The EPSC is established at the direction of the Senior Agency Official for Privacy (SAOP).

49

Facebook: Threats to Privacy  

E-Print Network (OSTI)

End-users share a wide variety of information on Facebook, but a discussion of the privacy implications of doing so has yet to emerge. We examined how Facebook affects privacy, and found serious flaws in the system. Privacy on Facebook is undermined by three principal factors: users disclose too much, Facebook does not take adequate steps to protect user privacy, and third parties are actively seeking out end-user information using Facebook. We based our end-user findings on a survey of MIT students and statistical analysis of Facebook data from MIT, Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms of Fair Information Practices as recommended by the Federal Trade Commission. In light of the information available and the system that protects it, we used a threat model to analyze specific privacy risks. Specifically, university administrators are using Facebook for disciplinary purposes, firms are using it for marketing purposes, and intruders are exploiting security holes. For each threat, we analyze the efficacy of the current protection, and where solutions are inadequate, we make recommendations on how to address the issue.

Harvey Jones; Jos Hiram Soltren

2005-01-01T23:59:59.000Z

50

Privacy is a process, not a PET: a theory for effective privacy practice  

Science Conference Proceedings (OSTI)

Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that ... Keywords: framework, privacy, security, trust

Anthony Morton; M. Angela Sasse

2012-09-01T23:59:59.000Z

51

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

52

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

53

FOIA/Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act/Privacy Act Freedom of Information Act/Privacy Act The Oak Ridge Office of Chief Counsel is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. DOE continuously gathers site specific information about its facilities and record repositories. Links to DOE sites and major contractors are found at Energy.gov. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here or on another Department website, submit a Freedom of Information Act request electronically.

54

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

55

Smart Meter Privacy: A Utility-Privacy Framework  

E-Print Network (OSTI)

End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.

Rajagopalan, S Raj; Mohajer, Soheil; Poor, H Vincent

2011-01-01T23:59:59.000Z

56

DOE Privacy Best Practices/ Enabling Technologies Subcommittee...  

NLE Websites -- All DOE Office Websites (Extended Search)

More Documents & Publications Energy Privacy Steering Committee 90-day Interim Report on Shale Gas Production - Secretary of Energy Advisory Board Elements of a Federal Privacy...

57

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

58

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

59

PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

. . ,-) ')7 73?¥i5": )~"'f"YC-:;'~dt?f(~"'f9'FrrZ , . PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX Services Unclassified Information System Template - January 30, 2009, Version 2 Department of Energy Privacy Impact Assessment (pIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: hltp:llwww.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. (803) 819-22700 Dstlnson@moxprolect.com Dave Stinson, President and Chief Executive Officer, Shaw AREVA MOX Services, LLC NNSA Shaw AREVA MOX Services Savannah River Site, Aiken SC .. .. . ": .' . ' .... .- ...: ......

60

Integrating Security and Privacy Requirements into ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2011-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Managing Security and Privacy Risk in Healthcare ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2012-06-05T23:59:59.000Z

62

Information fusion in data privacy: A survey  

Science Conference Proceedings (OSTI)

In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for ... Keywords: Data privacy, Information fusion, Microaggregation, Record linkage

Guillermo Navarro-Arribas; Vicen Torra

2012-10-01T23:59:59.000Z

63

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

64

Microsoft Word - Privacy 0818.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Empowering Consumers ) DOE-HQ-2009-0003-0818 Empowering Consumers ) DOE-HQ-2009-0003-0818 And the Smart Grid: Data Access, Third Party ) (Noticed May 11, 2010) Use, and Privacy ) ) Comments of San Diego Gas & Electric Company San Diego Gas & Electric Company ("SDG&E") submits these comments in response to the above-enumerated Request for Information noticed by the Department on May 11, 2010. SDG&E is a regulated electric and gas utility operating pursuant to authorities granted to it by the Federal Energy Regulatory Commission and the State of California. SDG&E serves 3.4 million consumers in the San Diego and southern Orange County areas of California via 1.4 million electric meters and 830,000 gas meters. SDG&E's sister company, the Southern California Gas

65

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer....................................................................................................................5 13. Texas Public Information Act ..........................................................................................................................................6 1. Purpose The University of Texas at Austin (U. T. Austin) is committed to ensuring the privacy

Texas at Austin, University of

66

The Failure of Online Social Network Privacy Settings  

E-Print Network (OSTI)

Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously difficult to configure correctly; this raises the question of whether OSN users privacy settings match their sharing intentions. We present the results of an empirical evaluation that measures privacy attitudes and intentions and compares these against the privacy settings on Facebook. Our results indicate a serious mismatch: every one of the 65 participants in our study confirmed that at least one of the identified violations was in fact a sharing violation. In other words, OSN users privacy settings are incorrect. Furthermore, a majority of users cannot or will not fix such errors. We conclude that the current approach to privacy settings is fundamentally flawed and cannot be fixed; a fundamentally different approach is needed. We present recommendations to ameliorate the current problems, as well as provide suggestions for future research. 1 Related Work To the best of our knowledge this is the first attempt to measure the correctness of privacy settings by first surveying users sharing intentions, to aid the process of identifying potential violations, then confirming the potential violations with the user. We argue that this method produces a more accurate evaluation compared

Michelle Madejski; Maritza Johnson; Steven M. Bellovin

2011-01-01T23:59:59.000Z

67

Privacy-enhanced web personalization  

Science Conference Proceedings (OSTI)

Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing ...

Alfred Kobsa

2007-01-01T23:59:59.000Z

68

PRA Fundamentals Computer Based Training Module 2.1  

Science Conference Proceedings (OSTI)

This product is a computer based training (CBT) module on Probabilistic Risk Assessment (Module 2 PRA Fundamentals). This product is a computer based training module on Probabilistic Risk Assessment (PRA CBT Module 2 - PRA Fundamentals). The PRA CBT is the second module and it titled PRA Fundamentals. This module is designed to provide a high level intriduction to the fundamentals of PRAs for nuclear power plants. It is the second module in the series. WindowsXP/Vista/Windows 7.

2010-11-30T23:59:59.000Z

69

OpenTag: Privacy protection for RFID  

E-Print Network (OSTI)

Radio frequency identification's use in retail is good for pervasive computing, but raises considerable privacy issues. OpenTag programmable tags address privacy issues while remaining fully compatible with the supply-chain ...

Holtzman, Henry N.

70

Privacy: is there an app for that?  

Science Conference Proceedings (OSTI)

Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ... Keywords: Facebook, adverse privacy events, privacy, social networking applications

Jennifer King; Airi Lampinen; Alex Smolen

2011-07-01T23:59:59.000Z

71

COLLECTION AND USE OF SOCIAL SECURITY NUMBERS Privacy Policy and Procedure Manual Version: 8-1-12  

E-Print Network (OSTI)

; radiation exposure monitoring 10 CFR 20.1801- 20.1802; PL 109-58, Sec. 652; FAC 64E-5.320 - 5.321; F.S. 404 Imperative Radiation Control & Radiation Services Federal & State security & regulatory requirements Sec. 6109, I.R.C.; UF-1.300 Authorized Study Abroad Services (UF International Center) Florida Prepaid

Slatton, Clint

72

DOE Privacy Steering Committee Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees April 23, 2009 April 23, 2009 Subcommittee Charge/Outcomes Members Chairs* Best Practices/ Enabling Technologies Subcommittee Charge of the Subcommittee The Best Practices/ Enabling Technologies Subcommittee will serve as a forum for the development and promotion of Privacy best practices, as well as for the review of available technologies that support and enable the mission of Privacy. Best practices may be drawn from the public and private sectors. Technology solutions may include consideration of enterprise licensing agreements, and experience of other Federal agencies. Best Practices and Technology will assess agency and industry solutions to develop implementation and performance measurement benchmarks.

73

Impact of Personal Privacy Devices for WAAS Aviation Users  

E-Print Network (OSTI)

Impact of Personal Privacy Devices for WAAS Aviation Users Grace Xingxin Gao, Kazuma Gunning, Todd or monitored. Figure 1 lists some examples of PPDs currently for sale on Internet. They are low-cost jamming [3], potentially aviation users. Figure 1. PPDs for Sale on Internet Aviation users rely on Wide Area

Stanford University

74

Design and performance of the LAMPF 1-1/4 MW klystron modulator  

SciTech Connect

From 11th modulator symposium; New York, New York, USA (18 Sep 1973). A design for a very reliable single-triode modulator for a 11/4 MW modulating-anode klystron is presented. The operating voltage is 86 kV and the variable pulse length ranges from 200 4mmsec to 1.2 msec. The basic modulator circuit, which uses a novel Zener diode bias circuit, and several of the individual components are described in detail. Over 140,000 high-voltage hours have been accumulated on these modulators. The principal failure mechanism is grid emission from the triode. These failures can be anticipated and repaired during a normal maintenance period. The triode is then reprocessed and reused. Tube life data and a summary of the failures modes are presented. (auth)

Tallerico, P.J.; Cady, R.L.; Doss, J.D.

1974-04-30T23:59:59.000Z

75

An online experiment of privacy authorization dialogues for social applications  

Science Conference Proceedings (OSTI)

Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them. Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ... Keywords: information privacy, online social networks (osns), privacy awareness and control, privacy notice and consent, third-party applications (apps)

Na Wang; Jens Grossklags; Heng Xu

2013-02-01T23:59:59.000Z

76

Privacy in the Smart Grid Smart Grid 101  

E-Print Network (OSTI)

Privacy in the Smart Grid #12;Smart Grid 101 Energy and information flows in many directions, from Distributed Generation & StorageThird party services #12;#12;Smart Grid Hopes/Promises #1 ­Better Utilization Grid Hopes/ Promisses (II) "The Smart Grid will:" · Reduce CO2 emissions by up to 480 MMT by 2020

Hoepman, Jaap-Henk

77

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

78

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

79

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

80

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Implementation plan for WRAP Module 1 operational readiness review  

Science Conference Proceedings (OSTI)

The Waste Receiving and Processing Module 1 (WRAP 1) will be used to receive, sample, treat, and ship contact-handled (CH) transuranic (TRU), low-level waste (LLW), and low-level mixed waste (LLMW) to storage and disposal sites both on the Hanford site and off-site. The primary mission of WRAP 1 is to characterize and certify CH waste in 55-gallon and 85-gallon drums; and its secondary function is to certify CH waste standard waste boxes (SWB) and boxes of similar size for disposal. The WRAP 1 will provide the capability for examination (including x-ray, visual, and contents sampling), limited treatment, repackaging, and certification of CH suspect-TRU waste in 55-gallon drums retrieved from storage, as well as newly generated CH LLW and CH TRU waste drums. The WRAP 1 will also provide examination (X-ray and visual only) and certification of CH LLW and CH TRU waste in small boxes. The decision to perform an Operational Readiness Review (ORR) was made in accordance with WHC-CM-5-34, Solid Waste Disposal Operations Administration, Section 1.4, Operational Readiness Activities. The ORR will ensure plant and equipment readiness, management and personnel readiness, and management programs readiness for the initial startup of the facility. This implementation plan is provided for defining the conduct of the WHC ORR.

Irons, L.G.

1994-11-04T23:59:59.000Z

82

Engineering Technical Training Modules - Throttle Valves 1.0  

Science Conference Proceedings (OSTI)

The purpose of this training module is to provide an understanding of specifying throttle valves in a nuclear power plant. The module provides the student with an understanding of the different types of throttle valves, how to select a throttle valve, understand the flow characteristics of different throttle valves, and understanding negative characteristics that can occur when the wrong valve is chosen for different applications. Prior to using this module, the student should understand the fundamental...

2011-06-29T23:59:59.000Z

83

Engineering Technical Training Modules - Flow Measurement Version 1.0  

Science Conference Proceedings (OSTI)

The purpose of this training module is to provide an understanding of calculating flow and the various types of flow measurement devices. The module also provides information related to device selection, installation, failure modes, calibration, and instrument error. This computer-based training (CBT) module is intended for use by new engineers as well as engineers changing jobs where basic knowledge of this subject is a new requirement. This training is intended to help individuals acquire basic knowled...

2011-10-21T23:59:59.000Z

84

Validated 140-1 and 140-2 Cryptographic Modules  

Science Conference Proceedings (OSTI)

... internet to a building's existing electrical ... The module hosts four commercial cryptographic algorithms for ... Street Suite 400 San Francisco, CA 94107 ...

2013-08-14T23:59:59.000Z

85

OTLOT Modules for HECO (Sub-Transmission & Distribution), Version 1.0  

Science Conference Proceedings (OSTI)

The HECO Overhead Transmission Line Inspection Online Training (OTLOT) Module, Version 1.0, is a CD or web-based application for training on overhead and underground line components and inspections. Description The HECO OTLOT Module provides approximately one hour of instruction to users. A browser interface helps the user navigate through the interactive training. As the user moves through the module, it provides instruction and assessment. At the end of the module, the user receives a final scored asse...

2008-12-19T23:59:59.000Z

86

Computer Based Training: Engineering Technical Training Modules - Valve Actuator v1.0  

Science Conference Proceedings (OSTI)

Valve Actuator ETTM, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace. The purpose of this training module is to provide a basic understanding of the various types of power valve actuators used in nuclear power plants and their characteristics. This module will also provide an understanding of valve actuator applications, selection, accessory requirements, and capabilities. This computer-based training (CBT) module is intend...

2009-12-04T23:59:59.000Z

87

Photovoltaic Module Reliability Workshop 2012: February 28 - March 1, 2012  

SciTech Connect

NREL's Photovoltaic (PV) Module Reliability Workshop (PVMRW) brings together PV reliability experts to share information, leading to the improvement of PV module reliability. Such improvement reduces the cost of solar electricity and promotes investor confidence in the technology--both critical goals for moving PV technologies deeper into the electricity marketplace.

Kurtz, S.

2013-11-01T23:59:59.000Z

88

DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID TECHNOLOGIES October 5, 2010 i TABLE OF CONTENTS INTRODUCTION AND EXECUTIVE SUMMARY.................................................................... 1 Overview of Data Access and Privacy Concerns ....................................................................... 2 Summary of Recommendations .................................................................................................. 3 KEY FINDINGS ............................................................................................................................. 4 Consumer education and flexibility in both technology and pace of deployment will be critical to the long-term success of Smart Grid technologies. ................................................................ 7

89

Privacy in mobile technology for personal healthcare  

Science Conference Proceedings (OSTI)

Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables ... Keywords: HIPAA, Privacy framework, e-health, electronic health record, home healthcare, mHealth, medicine, mobile healthcare, personal health record

Sasikanth Avancha; Amit Baxi; David Kotz

2012-11-01T23:59:59.000Z

90

Protecting consumer privacy from electric load monitoring  

Science Conference Proceedings (OSTI)

The smart grid introduces concerns for the loss of consumer privacy; recently deployed smart meters retain and distribute highly accurate profiles of home energy use. These profiles can be mined by Non Intrusive Load Monitors (NILMs) to expose much of ... Keywords: load monitor, privacy, smart meter

Stephen McLaughlin; Patrick McDaniel; William Aiello

2011-10-01T23:59:59.000Z

91

POPCORN: privacy-preserving charging for emobility  

Science Conference Proceedings (OSTI)

Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will require protocols and standards that will control authentication, authorization, and billing of electric-vehicle charging. ... Keywords: electric vehicle charging, iso/iec 15118, privacy, privacy enhancing technologies, security

Christina Hfer, Jonathan Petit, Robert Schmidt, Frank Kargl

2013-11-01T23:59:59.000Z

92

Employing PRBAC for privacy preserving data publishing  

Science Conference Proceedings (OSTI)

Issues about privacy-preserving data mining have emerged globally, but still the main problem is that non-sensitive information or unclassified data, one is able to infer sensitive information that is not supposed to be disclosed. Based on our previous ... Keywords: access control, data mining, data publishing, privacy

Anour F. A. Dafa-Alla; Gyoyong Sohn; Keun Ho Ryu

2009-11-01T23:59:59.000Z

93

Towards the development of privacy-aware systems  

Science Conference Proceedings (OSTI)

Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, ... Keywords: Privacy policy, Privacy-Aware Access Control, Privacy-related legal requirements, Requirements Engineering

Paolo Guarda; Nicola Zannone

2009-02-01T23:59:59.000Z

94

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

98

Module Handbook Specialisation Photovoltaics  

E-Print Network (OSTI)

#12;Specialisation Photovoltaics, University of Northumbria Module 1/Photovoltaics: PHOTOVOLTAIC CELL AND MODULE TECHNOLOGY Module name: PHOTOVOLTAIC CELL AND MODULE TECHNOLOGY Section EUREC · Chemistry · Physics Target learning outcomes The module Photovoltaic Cell and Module Technology teaches

Habel, Annegret

99

Engineering Technical Training Modules - Jet Impingement 1.0  

Science Conference Proceedings (OSTI)

The purpose of this training module is to provide an understanding to engineers on the effects jet impingement on equipment and structures in a nuclear power plant which can cause a sudden rupture of high and moderate energy systems. The topics included provide an understanding of impulsive and impactive loads, pipe break effects, structural effects, effects on steel surfaces, and design and licensing considerations that need to understood. This computer-based training (CBT) module is intended for use by...

2011-06-29T23:59:59.000Z

100

Photovoltaic-module encapsulation design and materials selection: Volume 1  

DOE Green Energy (OSTI)

Encapsulation-material system requirements, material-selection criteria, and the status and properties of encapsulation materials and processes available to the module manufacturer are presented in detail. Technical and economic goals established for photovoltaic modules and encapsulation systems and their status are described for material suppliers to assist them in assessing the suitability of materials in their product lines and the potential of new-material products. A comprehensive discussion of available encapsulation technology and data is presented to facilitate design and material selection for silicon flat-plate photovoltaic modules, using the best materials available and processes optimized for specific power applications and geographic sites. A basis is provided for specifying the operational and environmental loads that encapsulation material systems must resist. Potential deployment sites for which cost effectiveness may be achieved at a module price much greater than $0.70/W/sub p/, are also considered; data on higher-cost encapsulant materials and processes that may be in use and other material candidates that may be justified for special application are discussed. Described are encapsulation-system functional requirements and candidate design concepts and materials that have been identified and analyzed as having the best potential to meet the cost and performance goals for the Flat-Plate Solar Array Project. The available data on encapsulant material properties, fabrication processing, and module life and durability characteristics are presented.

Cuddihy, E.; Carroll, W.; Coulbert, C.; Gupta, A.; Liang, R.

1982-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

DOE Order Self Study Modules - DOE G 441.1-1C Radiation Protection Programs Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41.1-1C 41.1-1C RADIATION PROTECTION PROGRAMS GUIDE NATIONAL NUCLEAR SECURITY ADMINISTRATION LEARNING AND CAREER DEVELOPMENT DEPARTMENT Change No: 1 DOE G 441.1-1C Level: Familiar Date: 12/1/08 1 DOE G 441.1-1C, RADIATION PROTECTION PROGRAMS GUIDE FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to 1. Match radiation protection-related terms to their definitions; 2. Discuss the elements that should be taken into consideration to determine the likelihood of an individual receiving a dose in excess of a regulatory monitoring threshold; 3. Give three examples of criteria that should trigger a formal as-low-as-is-

102

DOE G 414.1-4 and 404.1-2B Training module  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14.1-4 14.1-4 SAFETY SOFTWARE GUIDE FOR USE WITH 10 CFR 830, SUBPART A, QUALITY ASSURANCE REQUIREMENTS, AND DOE O 414.1C, QUALITY ASSURANCE DOE G 414.1-2B QUALITY ASSURANCE PROGRAM GUIDE DOE G 414.1-4 and DOE G 414.1-2B Familiar Level November 2011 1 DOE G 414.1-4 SAFETY SOFTWARE GUIDE FOR USE WITH 10 CFR 830, SUBPART A, QUALITY ASSURANCE REQUIREMENTS, AND DOE O 414.1C, QUALITY ASSURANCE DOE G 414.1-2B QUALITY ASSURANCE PROGRAM GUIDE FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources, you will be able to answer the following questions: 1. What is the purpose of DOE O 414.1D, attachment 3, Suspect/Counterfeit Items Prevention? 2. What are four ways of preventing introduction of suspect/counterfeit items (S/CIs) into

103

NETL: Your Rights under the FOIA, the Privacy Act, and other Privacy Laws  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA/Privacy Act FOIA/Privacy Act Your Rights under the FOIA, the Privacy Act, and other Privacy Laws The Freedom of Information Act and Privacy Act Division/Office is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here, submit a Freedom of Information Act request electronically. To assist obtaining publicly available information, we suggest you first conduct a search on the specific topic or information you are seeking using

104

Optical Modulator on Si Employing Ge Quantum Wells Jonathan E. Roth1*  

E-Print Network (OSTI)

Optical Modulator on Si Employing Ge Quantum Wells Jonathan E. Roth1* , Onur Fidaner1 , Rebecca K ; (230.5590) Quantum-well devices The recently demonstrated quantum confined Stark effect (QCSE) in germanium quantum wells is a likely candidate for creating optoelectronic modulators for monolithically

Miller, David A. B.

105

THERMOMECHANICS OF PV MODULES INCLUDING THE VISCOELASTICITY OF EVA Ulrich Eitner1,  

E-Print Network (OSTI)

in the cell distance is 170µm. Keywords: PV module, Encapsulation, Simulation, Reliability, Mechanics 1THERMOMECHANICS OF PV MODULES INCLUDING THE VISCOELASTICITY OF EVA Ulrich Eitner1, *, Matthias by a comparison to displacement experiments where the thermomechanical deformation of solar cells in a PV laminate

106

Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING NNSA) FEDERAL EMPLOYEES Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING NNSA) FEDERAL EMPLOYEES The familiar level of this module is divided into two sections. In the first section, we will discuss the objective, requirements, and the responsibilities assigned to the heads of field elements. In the second section, we will discuss the content of attachment 1, Functional Area Requirements. We have provided examples and a practice to help familiarize you with the material. The practice will also help prepare you for the criterion test. DOE Order Self Study Modules - DOE O 440.1B, Worker Protection Management for DOE (Including the National Nuclear Security Administration) Federal

107

Privacy and Preemption  

E-Print Network (OSTI)

legislation. As a Microsoft white paper from 2005 states, Supp. V 2005). Microsoft White Paper, supra note 1, at 4.in 2007, but 2005. A white paper by Brad Smith, Microsofts

Schwartz, Paul M.

2009-01-01T23:59:59.000Z

108

Engineering Technical Training Module (ETTM) - Instrumentation Sensing, Line Routing, and Separation Version 1.0  

Science Conference Proceedings (OSTI)

Engineering Technical Training Module (ETTM) Instrumentation Sensing, Line Routing, and Separation, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace.This course provides training for Power Plant Instrumentation Engineers on instrumentation sensing line devices, their functions, and recommended use in nuclear plants. This module will familiarize the student with guidelines for routing and ...

2013-08-08T23:59:59.000Z

109

Engineering Technical Training Module (ETTM) - Two-Phase Phenomenon 1.0  

Science Conference Proceedings (OSTI)

Engineering Technical Training Module (ETTM) Two-Phase Phenomenon, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace.This module provides an overview of two-phase flow and two-phase heat transfer, and their applications in nuclear power plant operation. Fundamental two-phase concepts, including flow patterns, void fraction, and boiling and condensation are described. Additionally, ...

2013-12-16T23:59:59.000Z

110

ETTM-HE (Heat Exchanger)CBT Module, Version 1.0  

Science Conference Proceedings (OSTI)

The Heat Exchangers Computer-Based Training/Engineering Technical Training Modules Course (HE CBT/ETTM) version 1.0 is a web-based training module that provides graphics and interactive features to enhance learning and theory of operation for a variety of heat exchangers. This application introduces the basic heat transfer principles of heat exchangers and how these principles apply to typical nuclear plant exchanger applications. This computer-based training (CBT) module is intended for use by new engi...

2006-10-31T23:59:59.000Z

111

"Order Module--DOE O 442.1, DEPARTMENT OF ENERGY EMPLOYEE CONCERNS PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"Order Module--DOE O 442.1, DEPARTMENT OF ENERGY EMPLOYEE CONCERNS "Order Module--DOE O 442.1, DEPARTMENT OF ENERGY EMPLOYEE CONCERNS PROGRAM "Order Module--DOE O 442.1, DEPARTMENT OF ENERGY EMPLOYEE CONCERNS PROGRAM The familiar level of this module is divided into two sections. In the first section, we will discuss the objectives, requirements, responsibilities, and definitions that are contained in the Order. In the second section, we will discuss the Guide. There is only one level of instruction for this Order. You will not be required to complete a practice for this module. Before continuing, you should obtain a copy of DOE O 442.1, DOE Employee Concerns Program, and its companion guide. Copies of these documents are available on the Office of Management and Administration's Web site at http://www.directives.doe.gov or though the course manager. It is not

112

Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES "The familiar level of...

113

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

114

2013 Privacy Awareness Training | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » 2013 Privacy Awareness Training 2013 Privacy Awareness Training October 11, 2013 5:00PM EDT Registration link: OLC Course type: Online Course Location: Online Course Description: This course is designed to address the importance of privacy, and to ensure that DOE employees are aware of the vital role they play in safeguarding privacy and protecting Personally Identifiable Information (PII). Audience: All Headquarters Federal and contractor employees and detailees with access to Federal information resources and all remote Federal and support services contractor employees provided access to the Federal Information Resources. This DOECAST does not apply to M&O contractors. M&O contractors should follow their respective guidelines for training.

115

A technology perspective on worldwide privacy regulations  

Science Conference Proceedings (OSTI)

In this paper we provide an overview of the worldwide privacy regulatory landscape from a technology perspective. We focus on data-centric definitions of personal information and then examine how these differ across different regulatory frameworks, such ...

D. A. Chapin; A. C. Nelson; B. S. Gerber

2009-03-01T23:59:59.000Z

116

Privacy Protection for Social Networking APIs  

E-Print Network (OSTI)

Social networking APIs integrate third-party content into the site and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications. Our study of 150 popular Facebook applications reveals that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications output, privacy-by-proxy can be accomplished without major changes to the platform architecture or applications by using new tags and data transformations.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

117

Transparent building-integrated PV modules. Phase 1: Comprehensive report  

DOE Green Energy (OSTI)

This Comprehensive Report encompasses the activities that have been undertaken by Kiss + Cathcart, Architects, in conjunction with Energy Photovoltaics, Incorporated (EPV), to develop a flexible patterning system for thin-film photovoltaic (PV) modules for building applications. There are two basic methods for increasing transparency/light transmission by means of patterning the PV film: widening existing scribe lines, or scribing a second series of lines perpendicular to the first. These methods can yield essentially any degree of light transmission, but both result in visible patterns of light and dark on the panel surface. A third proposed method is to burn a grid of dots through the films, independent of the normal cell scribing. This method has the potential to produce a light-transmitting panel with no visible pattern. Ornamental patterns at larger scales can be created using combinations of these techniques. Kiss + Cathcart, Architects, in conjunction with EPV are currently developing a complementary process for the large-scale lamination of thin-film PVs, which enables building integrated (BIPV) modules to be produced in sizes up to 48 in. x 96 in. Flexible laser patterning will be used for three main purposes, all intended to broaden the appeal of the product to the building sector: To create semitransparent thin-film modules for skylights, and in some applications, for vision glazing.; to create patterns for ornamental effects. This application is similar to fritted glass, which is used for shading, visual screening, graphics, and other purposes; and to allow BIPV modules to be fabricated in various sizes and shapes with maximum control over electrical characteristics.

NONE

1998-09-28T23:59:59.000Z

118

Order Module--DOE O 458.1, RADIATION PROTECTION OF THE PUBLIC AND THE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

58.1, RADIATION PROTECTION OF THE PUBLIC AND 58.1, RADIATION PROTECTION OF THE PUBLIC AND THE ENVIRONMENT Order Module--DOE O 458.1, RADIATION PROTECTION OF THE PUBLIC AND THE ENVIRONMENT The familiar level of this module is divided into two sections. In the first section, we will discuss the objectives and definitions related to the Order. In the second section, we will discuss the requirements in section four of the Order and the responsibilities of the field element managers for compliance with DOE O 458.1. We have provided examples and practices throughout the module to help familiarize you with the material. The practice will also help prepare you for the criterion test. DOE Order Self Study Modules - DOE O 458.1, Radiation Protection of the Public and the Environment More Documents & Publications

119

Privacy Protection for Social Networking Platforms, Web 2.0 Security and Privacy  

E-Print Network (OSTI)

Social networking platforms integrate third-party content into social networking sites and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacy-preserving API. Our design is motivated by an analysis of the data needs and uses of Facebook applications. We studied 150 popular Facebook applications and found that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications output, privacy-by-proxy can be accomplished by using new tags and data transformations without major changes to either the platform architecture or applications.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

120

Cast polycrystalline silicon photovoltaic cell and module manufacturing technology improvements. Annual subcontract report, 1 December 1993--30 November 1994  

DOE Green Energy (OSTI)

This report describes work performed under a 3-y contract to advance Solarex`s cast polycrystalline silicon manufacturing technology, reduce module production cost, increase module performance, and expand Solarex`s commercial production capacities. Specific objectives are to reduce manufacturing cost for polycrstalline silicon PV modules to less than $1.20/W and to increase manufacturing capacity by a factor of 3. Solarex is working on casting, wire saws, cell process, module assembly, frameless module development, and automated cell handling.

Wohlgemuth, J. [Solarex Corp., Frederick, MD (United States)

1995-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Order Module--DOE O 460.1C, PACKAGING AND TRANSPORTATION SAFETY, DOE O  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O 460.1C, PACKAGING AND TRANSPORTATION SAFETY, O 460.1C, PACKAGING AND TRANSPORTATION SAFETY, DOE O 460.2A, DEPARTMENTAL MATERIALS TRANSPORTATION AND PACKAGING MANAGEMENT Order Module--DOE O 460.1C, PACKAGING AND TRANSPORTATION SAFETY, DOE O 460.2A, DEPARTMENTAL MATERIALS TRANSPORTATION AND PACKAGING MANAGEMENT "The familiar level of this module is divided into two sections. The objectives and requirements of DOE O 460.1C and DOE O 460.2A will be discussed in the first and second sections, respectively. Several examples and practices throughout the module are provided to help familiarize you with the material. The practices will also help prepare you for the criterion test. Before continuing, you should obtain a copy of the Orders and implementation guides and manuals for this module. Copies of the Orders are available on the internet

122

HIPAA Security Job-Specific Training Module -Strong Health Page 1 of 2 HIPAA Security Compliance, v.1 (3/05) 0S1  

E-Print Network (OSTI)

HIPAA Security Job-Specific Training Module - Strong Health Page 1 of 2 HIPAA Security Compliance, v.1 (3/05) 0S1 URMC/Strong Health HIPAA Security Training Module POLICY SUMMARY: 0S1 (for full policy, refer to http://intranet.urmc.rochester.edu/policy/HIPAA/ ) HIPAA Security Compliance

Goldman, Steven A.

123

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule  

Science Conference Proceedings (OSTI)

Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared ... Keywords: HIPAA, obligations, policy analysis, privacy policy

Omar Chowdhury; Andreas Gampe; Jianwei Niu; Jeffery von Ronne; Jared Bennatt; Anupam Datta; Limin Jia; William H. Winsborough

2013-06-01T23:59:59.000Z

124

Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE 33.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES "The familiar level of this module is designed to summarize the basic information in DOE O 433.1B, Maintenance Management Program for DOE Nuclear Facilities. This Order canceled DOE O 433.1A. This module is divided into three sections. Section one contains the objective, general requirements, and the responsibilities assigned to field element managers. Section two includes the requirements in attachment 2 of the Order, Maintenance Management Program Requirements for DOE Nuclear Facilities. Section three is a summary of the guidance provided in DOE G 433.1-1, Facility Maintenance Management Program Guide for Use with DOE O 433.1.The

125

Order Module--DOE O 451.1B, NATIONAL ENVIRONMENTAL POLICY ACT COMPLIANCE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51.1B, NATIONAL ENVIRONMENTAL POLICY ACT 51.1B, NATIONAL ENVIRONMENTAL POLICY ACT COMPLIANCE PROGRAM Order Module--DOE O 451.1B, NATIONAL ENVIRONMENTAL POLICY ACT COMPLIANCE PROGRAM DOE O 451.1B, National Environmental Policy Act Compliance Program, replaces DOE O 451.1A of the same name. DOE O 451.1B is ten pages long. Due to the concise nature of this Order, this module will be limited to one level. To complete this module and satisfy the requirements for qualification 1. Obtain a copy of DOEO 451.1B. A copy of this document is available on the Office of Management and Administration's Web site at http://www.directives.doe.gov or through the course manager. 2. Review the objectives, requirements, and responsibilities sections of the Order. 3. When you are ready, ask the course manager for the criterion test.

126

Order Module--DOE O 420.1B, FACILITY SAFETY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE O 420.1B, FACILITY SAFETY DOE O 420.1B, FACILITY SAFETY Order Module--DOE O 420.1B, FACILITY SAFETY To ensure that new DOE hazard category 1, 2, and 3 nuclear facilities are designed and constructed in a manner that ensures adequate protection to the public, workers, and the environment from nuclear hazards. To ensure that major modifications to hazard category 1, 2, and 3 nuclear facilities comply with the design and construction requirements for new hazard category 1, 2, and 3 nuclear facilities. To ensure that new DOE nuclear reactors comply with the requirements of DOE O 420.1B and the design requirements of DOE O 5480.30, Nuclear Reactor Safety Design Criteria. DOE Order Self Study Modules - DOE O 420.1B Facility Safety More Documents & Publications Order Module--DOE O 420.2B, SAFETY OF ACCELERATOR FACILITIES

127

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

128

Privacy Rights and Protection: Foreign Values in Modern Thai Context  

Science Conference Proceedings (OSTI)

The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other ... Keywords: Buddhism, Thai culture, data protection, human rights, privacy protection, privacy rights, smart ID cards

Krisana Kitiyadisai

2005-03-01T23:59:59.000Z

129

Keeping up appearances: understanding the dimensions of incidental information privacy  

Science Conference Proceedings (OSTI)

We conducted a survey of 155 participants to examine privacy concerns relating to the viewing of incidental information (i.e. traces of previous activity unrelated to the task at hand) in web browsers. We have identified several dimensions of privacy ... Keywords: collaboration, incidental information, privacy, survey, web browsing

Kirstie Hawkey; Kori M. Inkpen

2006-04-01T23:59:59.000Z

130

Efficient zero-knowledge identification schemes which respect privacy  

Science Conference Proceedings (OSTI)

At first glance, privacy and zero-knowledgeness seem to be similar properties. A scheme is private when no information is revealed on the prover and in a zero-knowledge scheme, communications should not leak provers' secrets. Until recently, privacy ... Keywords: identification, privacy, zero-knowledge

Julien Bringer; Herv Chabanne; Thomas Icart

2009-03-01T23:59:59.000Z

131

SmokeScreen: flexible privacy controls for presence-sharing  

Science Conference Proceedings (OSTI)

Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present ... Keywords: location privacy, mobile computing, pervasive computing, presence-sharing, social networks

Landon P. Cox; Angela Dalton; Varun Marupadi

2007-06-01T23:59:59.000Z

132

Verification of data pattern for interactive privacy preservation model  

Science Conference Proceedings (OSTI)

The research problem of privacy-preserving data publishing is to release microdata in an aggregated form using distinguished techniques that will effectively conceal sensitive and private information but can be used by external users to exercise data ... Keywords: data mining, differential privacy, privacy preservation

Sujoy Ray; Mohammad Fahim Nizam; Swagata Das; Benjamin C. M. Fung

2011-03-01T23:59:59.000Z

133

Computer Based Training: Engineering Technical Training Modules - Finite Element Analysis v1.0  

Science Conference Proceedings (OSTI)

Finite Element Analysis ETTM, Version 1.0 is a computer45based training module that allows users to access training when desired and review it at their own pace. This module provides information about the basics of finite element analysis and modeling. This training should be used for position specific and/or continuing training for individuals involved with finite element analysis. This computer-based training (CBT) module is intended for use by new engineers as well as engineers changing jobs where bas...

2009-12-01T23:59:59.000Z

134

STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you be informed of the following: (1) you are entitled to request to be informed about the information about  

E-Print Network (OSTI)

Part: 68 Mail Stop: STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you: STEP 4: Vendor, email invoice to ldarling@stuact.tamu.edu or mail invoice to SOFC Mail Stop 1236. STEP contact person: (Please notify SOFC @ 845-1114 if event is cancelled) Vendor phone number: Faculty

Behmer, Spencer T.

135

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor  

E-Print Network (OSTI)

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem

Sankar, Lalitha

136

FOIA Reading Room - privacy act  

NLE Websites -- All DOE Office Websites (Extended Search)

Reading Room - pricacy act Reading Room - pricacy act CH Frequently Requested Documents Under FOIA Administrative Electronic FOIA Form Privacy Act Advisory (Microsoft Word(tm) document) DOE-CH Government Purchase Card Cardholders: December 2012 CH Organizational Chart: Current Version Policies and Procedures - Office of Science (including Chicago Office) Office of Hearings and Appeals Decisions Department of Justice Cases and Legal Documents Department of Energy Directives DOE Office of Inspector General Reports Responses Under FOIA FY10 Management and Operating Contracts "FY2012 Laboratory Performance Report Cards" The following management and operating prime contracts under the jurisdiction of DOE-CH have been renewed and posted for your convenience. Modifications that change, delete, or add language to any portion of these contracts (referred to as "M" Mods) will be posted as expeditiously as possible after execution. It is at the discretion of the Contractors whether or not they include modifications that change the amount obligated by the Government. Ames Laboratory - Contract No. No.DE-AC02-07CH11358

137

Computer Based Training: Engineering Technical Training Module (ETTM) Relief and Safety Valves v1.0  

Science Conference Proceedings (OSTI)

Relief and Safety Valves ETTM, Version 1.0 is a computer45based training module that allows users to access training when desired and review it at their own pace. This module provides information about the types of valves, requirements surrounding their performance, characteristics and selection of these valves, as well as testing requirements. Additionally, it describes design considerations and system interactions. This training should be used for position specific and/or continuing training for indivi...

2009-11-02T23:59:59.000Z

138

Engineering Technical Training Module (ETTM) - Level Measurement v1.0  

Science Conference Proceedings (OSTI)

Engineering Technical Training Module (ETTM) Level Measurement, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace.Accurate fluid level measurements are critical to the safe operation and efficient energy production within a power plant. Knowledge of several fluid properties, such as pressure, gravity, and density effects, are reviewed before introducing the methods and devices used to measure fluid ...

2013-10-08T23:59:59.000Z

139

Engineering Technical Training Module (ETTM) - Instrument Setpoint Determination (ETTM-ISD) v1.0  

Science Conference Proceedings (OSTI)

Engineering Technical Training Module (ETTM) Instrument Setpoint Determination, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace.Automatic actuation of process instrumentation and controls in a nuclear power plant keeps the plant running efficiently and can be used as a safety-related measure in response to events outside the normal operation. Setpoints determine the threshold at which ...

2013-10-29T23:59:59.000Z

140

NETL: Contact Info and Privacy Act Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Info and Privacy Act Advisory To contact us: National Energy Technology Laboratory 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940 Phone: 412-386-6167 PRIVACY ACT ADVISORY: Authority: 5 U.S.C. 301, 5 U.S.C. 552, Freedom of Information Act (FOIA); and Title 10, Code of Federal Regulations, Part 1004. Purpose: To allow individuals to file electronic FOIA requests; to track all FOIA requests from receipt to response to compile statistics for the Annual FOIA Report; to research and respond to FOIA requests; to maintain case files to comply with records disposal requirements; and to maintain an administrative record to support any litigation. Routine Use: Records related to the FOIA request will be maintained in DOE-55 "Freedom of Information and Privacy Act (FOIA/PA) Requests for Records." A record

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Order Module--DOE O 151.1C, COMPREHENSIVE EMERGENCY MANAGEMENT SYSTEM |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

151.1C, COMPREHENSIVE EMERGENCY MANAGEMENT 151.1C, COMPREHENSIVE EMERGENCY MANAGEMENT SYSTEM Order Module--DOE O 151.1C, COMPREHENSIVE EMERGENCY MANAGEMENT SYSTEM The familiar level of this module is designed to summarize the basic information in DOE O 151.1C, Comprehensive Emergency Management System. This module is divided into two sections. in the first section, we will discuss the objectives and responsibilities of DOE O 151.1C, Comprehensive Emergency Management System. In the second section, we will discuss the requirements included in chapters III through XI in the Order. The information provided will meet the relevant requirements in the following DOE Functional Area Qualification Standards: DOE-STD-1177-2004, Emergency Management DOE-STD-1151-2002, Facility Representative DOE-STD-1137-2007, Fire Protection Engineering

142

Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40.1B, WORKER PROTECTION PROGRAM FOR DOE 40.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING NNSA) FEDERAL EMPLOYEES Order Module--DOE O 440.1B, WORKER PROTECTION PROGRAM FOR DOE (INCLUDING NNSA) FEDERAL EMPLOYEES The familiar level of this module is divided into two sections. In the first section, we will discuss the objective, requirements, and the responsibilities assigned to the heads of field elements. In the second section, we will discuss the content of attachment 1, Functional Area Requirements. We have provided examples and a practice to help familiarize you with the material. The practice will also help prepare you for the criterion test. DOE Order Self Study Modules - DOE O 440.1B, Worker Protection Management for DOE (Including the National Nuclear Security Administration) Federal Employees

143

Discriminatory Lossy Source Coding: Side Information Privacy  

E-Print Network (OSTI)

A lossy source coding problem is studied in which a source encoder communicates with two decoders, one with and one without correlated side information with an additional constraint on the privacy of the side information at the uninformed decoder. Two cases of this problem arise depending on the availability of the side information at the encoder. The set of all feasible rate-distortion-equivocation tuples are characterized for both cases. The difference between the informed and uninformed cases and the advantages of encoder side information for enhancing privacy are highlighted for a binary symmetric source with erasure side information and Hamming distortion.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

144

Analyzing Facebook privacy settings: User expectations vs. reality  

E-Print Network (OSTI)

The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy. In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36 % of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users expectations only 37 % of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.

Yabing Liu; Balachander Krishnamurthy; Krishna P. Gummadi

2011-01-01T23:59:59.000Z

145

Friends Only: Examining a Privacy-Enhancing Behavior in Facebook  

E-Print Network (OSTI)

Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study we explore privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. Drawing on a sample survey of undergraduate Facebook users, we examine a particular privacy-enhancing practice: having a friends-only Facebook profile. Particularly, we look at the association between network composition, expectancy violations, interpersonal privacy practices and having a friends-only profile. We find that expectancy violations by weak ties and increased levels of interpersonal privacy management are positively associated with having a friends-only profile. We conclude with a discussion of how these findings may be integrated into the design of systems to facilitate interaction while enhancing individual privacy. Author Keywords Social network sites, social networking, Facebook, privacy,

Fred Stutzman; Jacob Kramer-duffield

2010-01-01T23:59:59.000Z

146

Cast polycrystalline silicon photovoltaic module manufacturing technology improvements. Semiannual subcontract report, January 1--June 30, 1995  

DOE Green Energy (OSTI)

The objective of this three-year program is to advance Solarex`s cast polycrystalline silicon manufacturing technology, reduce module production cost, increase module performance and expand Solarex`s commercial production capacities. Two specific objectives of this program are to reduce the manufacturing cost for polycrystalline silicon PV modules to less than $1.20/watt and to increase the manufacturing capacity by a factor of three. To achieve these objectives, Solarex is working in the following technical areas: casting, wire saws, cell process, module assembly, frameless module development, and automated cell handling. Accomplishments reported include: Cast first successful larger ingot producing 73% larger volume of usable Si; Increased the size of the ingot even further and cast an ingot yielding nine 11.4 {times} 11.4 cm bricks, representing a 125% increase in usable Si from a single casting; Operated the wire-saw in a semi-operational mode, producing 459,000 wafers at 94.1% overall yield; Reduced the cost of wire-saw consumables, spare parts, and waste disposal; Developed a cost-effective back surface field process that increases cell efficiency by 5% and began production trials; Developed a plan for increasing the capacity in the module assembly area; Completed qualification testing of modules built using Spire`s automated tabbing and stringing machine; Selected, tested, and qualified a low-cost electrical termination system; Completed long-term UV testing of experimental back sheets; Qualified the structure and adhesive-tape system for mounting frameless modules; and ARRI completed a study of the fracture properties of cast polycrystalline Si wafers and provided the information necessary to calculate the maximum stresses allowable during wafer handling.

Wohlgemuth, J. [Solarex Corp., Frederick, MD (United States)

1996-02-01T23:59:59.000Z

147

Cryptographic Module Validation Program FIPS 140-1 and ...  

Science Conference Proceedings (OSTI)

... 1 Kingston DataTraveler DT4000 Series USB Flash Drive ... Windows 8, Windows Server 2012, and Windows RT Enhanced DSS and Diffie- Hellman ...

2013-08-26T23:59:59.000Z

148

Validated 140-1 and 140-2 Cryptographic Modules  

Science Conference Proceedings (OSTI)

... Supports Windows Mobile, MAC iOS, MAC OSX and Google Android, in version 1.0.2, though not operationally tested. ...

2013-08-14T23:59:59.000Z

149

Order Module--DOE O 452.1D, NUCLEAR EXPLOSIVE AND WEAPON SURETY PROGRAM,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Order Module--DOE O 452.1D, NUCLEAR EXPLOSIVE AND WEAPON SURETY Order Module--DOE O 452.1D, NUCLEAR EXPLOSIVE AND WEAPON SURETY PROGRAM, DOE O 452.2D, NUCLEAR EXPLOSIVE SAFETY Order Module--DOE O 452.1D, NUCLEAR EXPLOSIVE AND WEAPON SURETY PROGRAM, DOE O 452.2D, NUCLEAR EXPLOSIVE SAFETY "To prevent accidents and inadvertent or unauthorized use of U.S. nuclear weapons and nuclear explosives. In conjunction with the Department of Defense (DoD), to protect the public health and safety by providing dual-agency judgment and responsibility for the safety, security, and use control (surety) of nuclear weapons. To establish nuclear explosive surety standards and nuclear weapon design surety requirements. To address surety vulnerabilities during all phases of the nuclear weapon life cycle and to upgrade surety during weapon stockpile refurbishments and/or new weapon

150

C4PS: colors for privacy settings  

Science Conference Proceedings (OSTI)

The ever increasing popularity of Facebook and other Online Social Networks has left a wealth of personal and private data on the web, aggregated and readily accessible for broad and automatic retrieval. Protection from both undesired recipients and ... Keywords: access control, online social networks, privacy

Thomas Paul; Martin Stopczynski; Daniel Puscher; Melanie Volkamer; Thorsten Strufe

2012-04-01T23:59:59.000Z

151

PHEmail: designing a privacy honoring email system  

Science Conference Proceedings (OSTI)

Controlling one's personal and private information could help alleviate one of the greatest harms facing the Internet today - the loss of attention due to the over abundance of unsolicited email (spam). If one could control the dissemination and usage ... Keywords: design, email application, privacy, social network, spam

David Nguyen; Khai Truong

2003-04-01T23:59:59.000Z

152

Privacy, Technology, and Aging: A Proposed Framework  

E-Print Network (OSTI)

the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five, adoption, and use of home-based ubiquitous technologies are highly contextual, individualized and aging can inform the development of a privacy framework for home-based technologies that can contribute

Camp, L. Jean

153

CBT: Basic Atomic and Nuclear Physics Module, Version 1.0.03/2004  

Science Conference Proceedings (OSTI)

The Computer Based Training (CBT) Basic Atomic and Nuclear Physics Module, Version 1.0 (Without Tests) 03/2004 is a computer-based course that follows the curriculum outlined in INPO's Guidelines for Training and Qualification of Engineering Personnel, ACAD 98-004. This product is a derivative of EPRI product 1003509, Computer Based Training Basic Atomic and Nuclear Physics Module Version 1.0. It contains the same instructional material; however, the pretests and posttests included in that product have b...

2004-04-09T23:59:59.000Z

154

Waste receiving and processing facility module 1, detailed design report  

Science Conference Proceedings (OSTI)

WRAP 1 baseline documents which guided the technical development of the Title design included: (a) A/E Statement of Work (SOW) Revision 4C: This DOE-RL contractual document specified the workscope, deliverables, schedule, method of performance and reference criteria for the Title design preparation. (b) Functional Design Criteria (FDC) Revision 1: This DOE-RL technical criteria document specified the overall operational criteria for the facility. The document was a Revision 0 at the beginning of the design and advanced to Revision 1 during the tenure of the Title design. (c) Supplemental Design Requirements Document (SDRD) Revision 3: This baseline criteria document prepared by WHC for DOE-RL augments the FDC by providing further definition of the process, operational safety, and facility requirements to the A/E for guidance in preparing the design. The document was at a very preliminary stage at the onset of Title design and was revised in concert with the results of the engineering studies that were performed to resolve the numerous technical issues that the project faced when Title I was initiated, as well as, by requirements established during the course of the Title II design.

Not Available

1993-10-01T23:59:59.000Z

155

arXiv:1205.2726v1[cs.DB]11May2012 Non-Interactive Differential Privacy: a Survey  

E-Print Network (OSTI)

by a McKinsey publication, this data has significant economic value, yet its release has potential, France Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$10.00. 1.1 Motivation In a recent report by McKinsey [31

Paris-Sud XI, Université de

156

Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START UP OR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE O 425.1D, VERIFICATION OF READINESS TO START UP DOE O 425.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES "The familiar level of this module is divided into three sections. In the first section we will discuss the purpose of DOE O 425.1D and the requirements for 1) determining the level of readiness review (RR), 2) determining the startup authorization authority (SAA), and 3) the startup notification report. In the second section we will discuss 1) the requirements applicable to DOE ORRs and DOE RAs, and 2) the core requirements. In the third section we will discuss the 1) requirements for DOE field element and headquarters line management oversight of the startup or restart process, 2) requirements for the records management program, and

157

Order Module--DOE O 430.1B, REAL PROPERTY ASSET MANAGEMENT | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30.1B, REAL PROPERTY ASSET MANAGEMENT 30.1B, REAL PROPERTY ASSET MANAGEMENT Order Module--DOE O 430.1B, REAL PROPERTY ASSET MANAGEMENT "The objective of DOE O 430.1B, Real Property Asset Management, is to establish a corporate, holistic, and performance-based approach to real property life-cycle asset management that links real property asset planning, programming, budgeting, and evaluation to program mission projections and performance outcomes. To accomplish the objective, this Order identifies requirements and establishes reporting mechanisms and responsibilities for real property asset management. This Order implements DOE P 580.1, Management Policy for Planning, Programming, Budgeting, Operation, Maintenance and Disposal of Real Property, dated 5/20/02. DOE Order Self Study Modules - DOE O 430.1B Real Property Asset Management

158

Engineering Technical Training Module (ETTM) - Missile Impact v1.0  

Science Conference Proceedings (OSTI)

Engineering Technical Training Module (ETTM) Missile Impact, Version 1.0 is a computer-based training module that allows users to access training when desired and review it at their own pace.In the design of the safety related structures in the nuclear facilities, the effects of missile impacts on the structure should be taken into considerations. The source of the missile can be tornado, hurricane, or accidents such as a plane crash. Missiles can be as small as a steel rebar ...

2013-08-27T23:59:59.000Z

159

Fusion in the entwined category of Yetter--Drinfeld modules of a rank-1 Nichols algebra  

E-Print Network (OSTI)

We rederive a popular nonsemisimple fusion algebra in the braided context, from a Nichols algebra. Together with the decomposition that we find for the product of simple Yetter-Drinfeld modules, this strongly suggests that the relevant Nichols algebra furnishes an equivalence with the triplet W-algebra in the (p,1) logarithmic models of conformal field theory. For this, the category of Yetter-Drinfeld modules is to be regarded as an \\textit{entwined} category (the one with monodromy, but not with braiding).

A. M. Semikhatov

2011-09-27T23:59:59.000Z

160

Waste Receiving and Processing Facility Module 1 Data Management System Software Requirements Specification  

Science Conference Proceedings (OSTI)

This document provides the software requirements for Waste Receiving and Processing (WRAP) Module 1 Data Management System (DMS). The DMS is one of the plant computer systems for the new WRAP 1 facility (Project W-026). The DMS will collect, store and report data required to certify the low level waste (LLW) and transuranic (TRU) waste items processed at WRAP 1 as acceptable for shipment, storage, or disposal.

Brann, E.C. II

1994-09-09T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access, Third Party Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities...

162

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company NBP RFI: Data Access, Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company...

163

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer.......................................................................................................................5 13. Texas Public Information Act.............................................................................................. Error! Bookmark not defined. 1. Purpose The University of Texas at Austin (U. T. Austin) is committed

Texas at Austin, University of

164

Development of flame retardant PV module encapsulants: Volume 1. Final report  

DOE Green Energy (OSTI)

This Phase 1 final report covers the work performed by Springborn Testing and Research, Inc., for the period October 1, 1997 to June 30, 1998 under the Department of Energy Cooperative Agreement Number DE-FC36-97GO10255, entitled Development of Flame Retardant PV Module Encapsulants. While use of roof-mounted arrays has always been an attractive means of deploying PV, only within recent years have such building integrated concepts (BIPV) found renewed interest among module makers and end-users. Prior to building integrated and rooftop applications, flammability requirements for modules have not been a great industry concern. However, with growing interest in BIPV and the requirement for building code requirements for commercial and industrial structures, flammability issues have become a barrier to entry for many module constructions into this potentially huge domestic market for PV. The overall goal of the 3 phase PV BONUS two project is to develop and commercialize a line of fire retardant encapsulation materials to serve the emerging building integrated and building mounted PV market. The objectives of the Phase 1 effort are limited to concept development and business planning activities.

Galica, J.P.

1998-06-01T23:59:59.000Z

165

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

unwarranted invasions of their privacy stemming from federal agencies' collection, maintenance, use, and disclosure of personal information about them. Therefore, unlike the...

166

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and information systems. 42 The SAOPCPO plays a key role, in conjunction with the CIO, CISO, the Chief Security Officer, and other officials having privacy related...

167

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

168

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

169

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

170

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

Science Conference Proceedings (OSTI)

Participatory sensing applications rely on individuals to share personal data to produce aggregated models and knowledge. In this setting, privacy concerns can discourage widespread adoption of new applications. We present a privacy-preserving participatory sensing scheme based on negative surveys for both continuous and multivariate categorical data. Without relying on encryption, our algorithms enhance the privacy of sensed data in an energy and computation efficient manner. Simulations and implementation on Android smart phones illustrate how multidimensional data can be aggregated in a useful and privacy-enhancing manner.

Forrest, Stephanie [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln; Groat, Michael [University of New Mexico, Albuquerque; Edwards, Benjamin [University of New Mexico, Albuquerque; Horey, James L [ORNL

2013-01-01T23:59:59.000Z

171

Order Module--DOE O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING Order Module--DOE O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING To ensure the DOE receives timely and accurate information about events that have affected or could adversely affect the health, safety, and security of the public or workers, the environment, the operations of DOE facilities, or the credibility of the Department. This will be accomplished through timely collection, reporting, analysis, and dissemination of data pertaining to environment, safety, and health issues as required by law, or regulations, or in support of United States political commitments to the International Atomic Energy Agency (IAEA). DOE Order Self Study Modules - DOE O 231.1A Environment, Safety, and Health Reporting

172

Order Module--DOE O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

231.1B, ENVIRONMENT, SAFETY, AND HEALTH 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING Order Module--DOE O 231.1B, ENVIRONMENT, SAFETY, AND HEALTH REPORTING To ensure the DOE receives timely and accurate information about events that have affected or could adversely affect the health, safety, and security of the public or workers, the environment, the operations of DOE facilities, or the credibility of the Department. This will be accomplished through timely collection, reporting, analysis, and dissemination of data pertaining to environment, safety, and health issues as required by law, or regulations, or in support of United States political commitments to the International Atomic Energy Agency (IAEA). DOE Order Self Study Modules - DOE O 231.1A Environment, Safety, and Health Reporting More Documents & Publications

173

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

174

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

175

Privacy-Preserving Friends Troubleshooting Network  

E-Print Network (OSTI)

Abstract Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topeer systems to tackle a new problem: automatic misconfiguration troubleshooting. In this setting, machine configurations from peers are shared to diagnose misconfigurations on a sick machine. The key challenges are preserving privacy of individual configuration data and ensuring the integrity of peer contributions. To this end, we construct the Friends Troubleshooting Network (FTN), a peer-to-peer overlay network, where the links between peer machines reflect the friendship of their owners. Our FTN manifests recursive trust rather than transitive trust. To achieve privacy, we use the general scheme of a historyless and futureless random-walk for routing, during which search is carried out simultaneously with secure parameter aggregation for the purpose of troubleshooting. Our design has been guided by the characteristics of a real-world friends network, the MSN Instant Messenger (IM) network. We have prototyped our FTN system and analyzed the tradeoff between privacy and protocol efficiency. I.

Qiang Huang; Helen J. Wang; Nikita Borisov

2005-01-01T23:59:59.000Z

176

Cast polycrystalline silicon photovoltaic module manufacturing technology improvements. Annual subcontract report, January 1, 1995--December 31, 1995  

DOE Green Energy (OSTI)

The objective of this three-year program is to advance Solarex`s cast polycrystalline silicon manufacturing technology, reduce module production cost, increase module performance and expand Solarex`s commercial production capacities. Two specific objectives of this program are to reduce the manufacturing cost for polycrystalline silicon PV modules to less than $1.20/watt and to increase the manufacturing capacity by a factor of three.

Wohlgemuth, J. [Amoco/Enron Solar, Frederick, MD (United States)

1996-06-01T23:59:59.000Z

177

GridLAB-D Technical Support Document: Residential End-Use Module Version 1.0  

SciTech Connect

1.0 Introduction The residential module implements the following end uses and characteristics to simulate the power demand in a single family home: Water heater Lights Dishwasher Range Microwave Refrigerator Internal gains (plug loads) House (heating/cooling loads) The house model considers the following four major heat gains/losses that contribute to the building heating/cooling load: 1. Conduction through exterior walls, roof and fenestration (based on envelope UA) 2. Air infiltration (based on specified air change rate) 3. Solar radiation (based on CLTD model and using tmy data) 4. Internal gains from lighting, people, equipment and other end use objects. The Equivalent Thermal Parameter (ETP) approach is used to model the residential loads and energy consumption. The following sections describe the modeling assumptions for each of the above end uses and the details of power demand calculations in the residential module.

Taylor, Zachary T.; Gowri, Krishnan; Katipamula, Srinivas

2008-07-31T23:59:59.000Z

178

The Engineering Design of the 1.5 m Diameter Solenoid for the MICERFCC Modules  

SciTech Connect

The RF coupling coil (RFCC) module of MICE is where muonsthat have been cooled within the MICE absorber focus (AFC) modules arere-accelerated to their original longitudinal momentum. The RFCC moduleconsists of four 201.25 MHz RF cavities in a 1.4 meter diameter vacuumvessel. The muons are kept within the RF cavities by the magnetic fieldgenerated by a superconducting coupling solenoid that goes around the RFcavities. The coupling solenoid will be cooled using a pair of 4 K pulsetube cooler that will generate 1.5 W of cooling at 4.2 K. The magnet willbe powered using a 300 A two-quadrant power supply. This report describesthe ICST engineering design of the coupling solenoid forMICE.

Wang, L.; Green, M.A.; Xu, F.Y.; Wu, H.; Li, L.K.; Gou, C.S.; Liu, C.S.; Han, G.; Jia, L.X.; Li, D.; Prestemon, S.O.; Virostek, S.P.

2007-08-27T23:59:59.000Z

179

DOE Order Self Study Modules - DOE O 422.1, Conduct of Operations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

422.1 422.1 CONDUCT OF OPERATIONS DOE O 422.1 Conduct of Operations Familiar Level June 2011 1 June 2011 DOE O 422.1 CONDUCT OF OPERATIONS FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What is the purpose of DOE O 422.1, Conduct of Operations? 2. What are the typical methods of implementing DOE O 422.1 guidelines? 3. What are the specific requirements as described in attachment 2 of DOE O 422.1? 4. How do the DOE Technical Standards support the specific requirements in DOE O 422.1 Note: If you think that you can complete the practice at the end of this level without working through the instructional material and/or the examples, complete the practice

180

Flat Plate PV Module Eligibility Listing Procedure Updated 6/28/12 Senate Bill 1 (SB1) defines the solar incentive programs for California, and flat plate PV  

E-Print Network (OSTI)

the solar incentive programs for California, and flat plate PV modules1 must be listed on the SB1 compliant programs for investor owned utility (IOU) territories, the California Solar Initiative (CSI) and the New module list to be eligible for incentives in California. Senate Bill 1 encompasses two staterun

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security and privacy threats in IoT architectures  

Science Conference Proceedings (OSTI)

In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. ... Keywords: IoT architecture, energy consumption, future internet, privacy, security, trust

Denis Kozlov; Jari Veijalainen; Yasir Ali

2012-02-01T23:59:59.000Z

182

RFID, privacy and the perception of risk: A strategic framework  

Science Conference Proceedings (OSTI)

Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively ... Keywords: Privacy, RFID, Risk perception, Technology acceptance

Frdric Thiesse

2007-06-01T23:59:59.000Z

183

Do online social network friends still threaten my privacy?  

Science Conference Proceedings (OSTI)

A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that third ... Keywords: attribute prediction, facebook, homophily, online social networks, privacy

Sebastian Labitzke; Florian Werling; Jens Mittag; Hannes Hartenstein

2013-02-01T23:59:59.000Z

184

Privacy-friendly energy-metering via homomorphic encryption  

Science Conference Proceedings (OSTI)

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication ... Keywords: homomorphic encryption, privacy, smart-metering

Flavio D. Garcia; Bart Jacobs

2010-09-01T23:59:59.000Z

185

Secure and privacy-preserving execution model for data services  

Science Conference Proceedings (OSTI)

Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service ... Keywords: RDF views, data services, privacy preservation

Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Michael Mrissa, Hajer Taktak

2013-06-01T23:59:59.000Z

186

Class-Restricted Clustering and Microperturbation for Data Privacy  

Science Conference Proceedings (OSTI)

The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly ... Keywords: confidentiality, data perturbation, information theory, microaggregation, minimum spanning tree

Xiao-Bai Li, Sumit Sarkar

2013-04-01T23:59:59.000Z

187

A PLA-based privacy-enhancing user modeling framework and its evaluation  

Science Conference Proceedings (OSTI)

Reconciling personalization with privacy has been a continuing interest in user modeling research. This aim has computational, legal and behavioral/attitudinal ramifications. We present a dynamic privacy-enhancing user modeling framework that supports ... Keywords: Compliance, Disclosure behavior, Performance evaluation, Privacy laws, Privacy preferences, Product line architecture, User experiment, User modeling

Yang Wang; Alfred Kobsa

2013-03-01T23:59:59.000Z

188

Judicial support systems: ideas for a privacy ontology-based case analyzer  

Science Conference Proceedings (OSTI)

Nowadays, ontology is applied as an integral part of many applications in several domains, especially in the world of law. The ontology based judicial support system is believed as a useful tool to support, for example, the legal argumentation assistant ... Keywords: privacy directives, privacy ontology, privacy ontology structure, privacy principles, woolf reforms

Yan Tang; Robert Meersman

2005-10-01T23:59:59.000Z

189

Privacy Act | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act Print Text Size: A A A RSS Feeds FeedbackShare Page General Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

190

Department of Energy Adopts Rules to Protect Consumer Privacy | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy March 15, 2010 - 4:17pm Addthis The Weatherization Assistance Program (WAP) enables states to provide financial assistance to qualifying consumers who want to improve the energy-efficiency of their homes. In response to concerns about the potential disclosure by the States of personal information they collect from WAP applicants, the Department has issued an interim final rule that requires states to apply the standards of the Freedom of Information Act that protect the privacy of potentially sensitive personal information. These protections will ensure a consistent and balanced approach towards the twin goals of consumer privacy and government transparency. The entire

191

DOE Order Self Study Modules - DOE O 151.1C Comprehensive Emergency Management System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O 151.1C O 151.1C COMPREHENSIVE EMERGENCY MANAGEMENT SYSTEM NATIONAL NUCLEAR SECURITY ADMINISTRATION SERVICE CENTER Change No: 3 DOE O 151.1C Level: Familiar Date: 12/1/08 1 DOE O 151.1C COMPREHENSIVE EMERGENCY MANAGEMENT SYSTEM FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to: 1. List the objectives of DOE O 151.1C, Comprehensive Emergency Management System (EMS); 2. Describe the responsibilities assigned to the following positions or groups for implementation and management of the EMS: Cognizant/field element managers Site/facility managers 3. State the purpose of a hazard survey; 4. List three phases of the planning process that should be addressed in an

192

DOE Order Self Study Modules - DOE O 225.1B, Accident Investigation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

225.1B 225.1B ACCIDENT INVESTIGATIONS DOE O 225.1B Accident Investigations Familiar Level June 2011 1 June 2011 DOE ORDER O 225.1B ACCIDENT INVESTIGATIONS FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to: 1. State the purpose of implementing U.S. Department of Energy (DOE) O 225.1B. 2. Discuss the responsibilities of the heads of field elements for accident investigations. 3. Discuss the responsibilities of the appointing official in an accident investigation. 4. Discuss the responsibilities of the Accident Investigation Board Chairperson. 5. Discuss the criteria identified in appendix A of DOE O 225.1B. Note: If you think that you can complete the practice at the end of this level without

193

DOE Order Self Study Modules - DOE O 420.1B Facility Safety  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.1B 0.1B FACILITY SAFETY NATIONAL NUCLEAR SECURITY ADMINISTRATION LEARNING AND CAREER DEVELOPMENT DEPARTMENT CHANGE NO: 2 DOE O 420.1B Level: Familiar Date: 12/1/08 1 DOE ORDER O 420.1B FACILITY SAFETY FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the listed resources, you will be able to perform the following: 1. State the purpose of implementing DOE O 420.1B. 2. State who is responsible for complying with the requirements of this Order. 3. State the general and design requirements for nuclear safety. 4. State the general programmatic requirements for an acceptable fire protection program. 5. State the fire protection design requirements for a comprehensive fire protection

194

DOE Order Self Study Modules - DOE O 430.1B Real Property Asset Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.1B 0.1B REAL PROPERTY ASSET MANAGEMENT NATIONAL NUCLEAR SECURITY ADMINISTRATION SERVICE CENTER Change No: 1 DOE: O 430.1B Level: Familiar Date: 12/1/04 1 DOE O 430.1B REAL PROPERTY ASSET MANAGEMENT FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources, you will be able to perform the following: 1. State when a site is required to have and maintain a ten-year site plan (TYSP). What is needed when a TYSP is not required? 2. Discuss contractor requirements for real property asset planning. 3. Discuss the vehicles used to establish land-use planning and management. 4. Define the term "value engineering." 5. Discuss how repair costs associated with real property asset deficiencies are

195

DOE Order Self Study Modules - DOE O 435.1 Radioactive Waste Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5.1 5.1 RADIOACTIVE WASTE MANAGEMENT ALBUQUERQUE OPERATIONS OFFICE Change No: 0 DOE O 435.1 Level: Familiar Date: 6/15/01 1 DOE O 435.1 RADIOACTIVE WASTE MANAGEMENT FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to 1. Discuss the purpose and scope of DOE O 435.1, Radioactive Waste Management. Note: If you think that you can complete the practice at the end of this level without working through the instructional material and/or the examples, complete the practice now. The course manager will check your work. You will need to complete the practice in this level successfully before taking the criterion test.

196

DOE Order Self Study Modules - DOE O 442.1 Department of energy Employee Concerns Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2.1 2.1 DEPARTMENT OF ENERGY EMPLOYEE CONCERNS PROGRAM ALBUQUERQUE OPERATIONS OFFICE Change No: 0 DOE O 442.1 Level: Familiar Date: 6/15/01 1 DOE O 442.1 DOE EMPLOYEE CONCERNS PROGRAM FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to perform the following: 1. State three examples of criteria that should be used to assess the significance of an employee's concern. 2. Describe three classifications of employee occupational safety and health concerns that are used for determining safety significance. 3. Discuss the objective of implementing DOE O 442.1, DOE Employee Concerns Program. 4. Discuss the four alternatives for processing concerns.

197

RECYCLING OF CdTe PHOTOVOLTAIC MODULES: RECOVERY OF CADMIUM AND TELLURIUM Vasilis Fthenakis1, Paul Duby2, Wenming Wang1, Christopher Graves2 & Anuta Belova2  

E-Print Network (OSTI)

RECYCLING OF CdTe PHOTOVOLTAIC MODULES: RECOVERY OF CADMIUM AND TELLURIUM Vasilis Fthenakis1, Paul the recovery of tellurium. Keywords: Photovoltaic, Recycling, CdTe 1. INTRODUCTION Photovoltaic modules on a larger scale cell (i.e., 5 L) which prod

198

Research on stable, high-efficiency, amorphous silicon multijunction modules. Annual subcontract report, 1 May 1991--30 April 1992  

DOE Green Energy (OSTI)

This report describes work to demonstrate a multijunction module with a ``stabilized`` efficiency (600 h, 50{degrees}C, AM1.5) of 10.5%. Triple-junction devices and modules using a-Si:H alloys with carbon and germanium were developed to meet program goals. ZnO was used to provide a high optical transmission front contact. Proof of concept was obtained for several important advances deemed to be important for obtaining high (12.5%) stabilized efficiency. They were (1) stable, high-quality a-SiC:H devices and (2) high-transmission, textured ZnO. Although these developments were not scaled up and included in modules, triple-junction module efficiencies as high as 10.85% were demonstrated. NREL measured 9.62% and 9.00% indoors and outdoors, respectively. The modules are expected to lose no more than 20% of their initial performance. 28 refs.

Catalano, A.; Bennett, M.; Chen, L.; D`Aiello, R.; Fieselmann, B.; Li, Y.; Newton, J.; Podlesny, R.; Yang, L. [Solarex Corp., Newtown, PA (United States). Thin Film Div.

1992-08-01T23:59:59.000Z

199

Genetic Background Modulates Gene Expression Profile Induced by Skin Irradiation in Ptch1 Mice  

Science Conference Proceedings (OSTI)

Purpose: Ptch1 germ-line mutations in mice predispose to radiation-induced basal cell carcinoma of the skin, with tumor incidence modulated by the genetic background. Here, we examined the possible mechanisms underlying skin response to radiation in F1 progeny of Ptch1{sup neo67/+} mice crossed with either skin tumor-susceptible (Car-S) or -resistant (Car-R) mice and X-irradiated (3 Gy) at 2 days of age or left untreated. Methods and Materials: We conducted a gene expression profile analysis in mRNA samples extracted from the skin of irradiated or control mice, using Affymetrix whole mouse genome expression array. Confirmation of the results was done using real-time reverse-transcriptase polymerase chain reaction. Results: Analysis of the gene expression profile of normal skin of F1 mice at 4 weeks of age revealed a similar basal profile in the nonirradiated mice, but alterations in levels of 71 transcripts in irradiated Ptch1{sup neo67/+} mice of the Car-R cross and modulation of only eight genes in irradiated Ptch1{sup neo67/+} mice of the Car-S cross. Conclusions: These results indicate that neonatal irradiation causes a persistent change in the gene expression profile of the skin. The tendency of mice genetically resistant to skin tumorigenesis to show a more complex pattern of transcriptional response to radiation than do genetically susceptible mice suggests a role for this response in genetic resistance to basal cell tumorigenesis.

Galvan, Antonella; Noci, Sara [Department of Experimental Oncology and Laboratories, Fondazione IRCCS Istituto Nazionale Tumori, Milan (Italy); Mancuso, Mariateresa; Pazzaglia, Simonetta; Saran, Anna [ENEA Laboratories, Rome (Italy); Dragani, Tommaso A. [Department of Experimental Oncology and Laboratories, Fondazione IRCCS Istituto Nazionale Tumori, Milan (Italy)], E-mail: tommaso.dragani@istitutotumori.mi.it

2008-12-01T23:59:59.000Z

200

Order Module--DOE G 450.4-1B, INTEGRATED SAFETY MANAGEMENT SYSTEM GUIDE |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

G 450.4-1B, INTEGRATED SAFETY MANAGEMENT SYSTEM G 450.4-1B, INTEGRATED SAFETY MANAGEMENT SYSTEM GUIDE Order Module--DOE G 450.4-1B, INTEGRATED SAFETY MANAGEMENT SYSTEM GUIDE This Guide has two purposes. One purpose is to assist DOE contractors in developing, describing, and implementing an ISMS to comply with DOE P 450.4, Safety Management system Policy; DOE P 450.5, Line Environment, Safety, and Health Oversight; DOE P 450.6, Secretarial Policy Statement Environment, Safety and Health; DOE P 411.1, Safety Management FRAM; and the following provisions of the DEAR: 48 CFR 970.5223-1, which requires integration of environment, safety, and health into work planning and execution; 48 CFR 970.5204-2, which deals with laws, regulations, and DOE directives; and 48 CFR 970.1100-1, which requires performance-based contracting.

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Order Self Study Modules - DOE O 231.1A Environment, Safety, and Health Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

231.1B 231.1B ENVIRONMENT, SAFETY, AND HEALTH REPORTING DOE O 231.1B Familiar Level August 2011 1 DOE O 231.B ENVIRONMENT, SAFETY, AND HEALTH REPORTING FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What is the purpose of DOE O 231.1B? 2. Who must be provided limited access to OSHA Form No. 300? 3. What happens to accident records when the contract between DOE and one of its contractors is terminated? 4. Under what conditions must a work-related injury be reported to the Chief Health, Safety and Security Officer? 5. What is the purpose of the radiological source registry and tracking database? 6. Which DOE position is responsible to report total hours worked by DOE employees each

202

Order Module--DOE Order 422.1, CONDUCT OF OPERATIONS | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

422.1, CONDUCT OF OPERATIONS 422.1, CONDUCT OF OPERATIONS Order Module--DOE Order 422.1, CONDUCT OF OPERATIONS The general approach to implementing DOE O 422.1 is for contractors to develop, for DOE line management approval, documentation demonstrating implementation of the requirements in the contractor requirements document (CRD). DOE line management means the Federal officials such as Secretarial Officers and heads of field elements responsible for DOE facilities and operations. It is necessary to provide a conduct of operations matrix, which is a list of CRD requirements, citing the specific documentation that implements each item, or providing justification for each item that is not implemented. DOE line management must determine which facilities, other than hazard category 1, 2, and 3 nuclear facilities, require implementation

203

Innovative Characterization of Amorphous and Thin-Film Silicon for Improved Module Performance: 1 February 2005 - 31 July 2008  

DOE Green Energy (OSTI)

Electron spin resonance and nuclear magnetic resonance was done on amorphous silicon samples (modules with a-Si:H and a-SixGe1-x:H intrinsic layer) to study defects that contribute to Staebler-Wronski effect.

Taylor, P. C.; Williams, G. A.

2009-09-01T23:59:59.000Z

204

Order Module--DOE Order 225.1B, ACCIDENT INVESTIGATIONS | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Order 225.1B, ACCIDENT INVESTIGATIONS Order 225.1B, ACCIDENT INVESTIGATIONS Order Module--DOE Order 225.1B, ACCIDENT INVESTIGATIONS DOE O 225.1B prescribes organizational responsibilities, authorities, and requirements for conducting investigations of certain accidents occurring at DOE sites, facilities, areas, operations, and activities. The purpose of the accident investigation is to understand and identify the causes that contributed to the accident so those deficiencies can be addressed and corrected. This, in turn, is intended to prevent recurrence and promote improved environmental protection and safety and health of DOE employees, contractors, and the public. Moreover, accident investigations are used to promote the values and concepts of a learning organization. The department's integrated safety management (ISM) feedback and improvement

205

Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific  

Office of Scientific and Technical Information (OSTI)

Privacy Impact Assessment Privacy Impact Assessment Name of Project: Web Domains Maintained by the Office of Scientific and Technical Information (OSTI) Bureau: U.S. Department of Energy, Office of Science Project's Unique ID: N/A Contact Information: [Mailing address for 1 through 5 below is: DOE Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831.] Who is the person completing this document? (Name, title, organization, and contact information.) Valerie S. Allen, Technical Information Specialist allenv@osti.gov, Telephone 865-576-3469 Who is the system owner? (Name, organization, and contact information.) Judy C. Gilmore, OSTI Acting Assistant Director for Program Integration gilmorej@osti.gov, Telephone 865-576-5600 Who is the system manager for this system or application? (Name,

206

Multi-User Privacy: The Gray-Wyner System and Generalized Common Information  

E-Print Network (OSTI)

The problem of preserving privacy when a multivariate source is required to be revealed partially to multiple users is modeled as a Gray-Wyner source coding problem with K correlated sources at the encoder and K decoders in which the kth decoder, k = 1, 2, ...,K, losslessly reconstructs the kth source via a common link and a private link. The privacy requirement of keeping each decoder oblivious of all sources other than the one intended for it is introduced via an equivocation constraint at each decoder such that the total equivocation summed over all decoders is E. The set of achievable rates-equivocation tuples is completely characterized. Using this characterization, two different definitions of common information are presented and are shown to be equivalent.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

207

How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Submit a Privacy Act Request How to Submit a Privacy Act Request Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Privacy Act Request Form .pdf file (99KB) Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act How to Submit a Privacy Act Request Print Text Size: A A A RSS Feeds FeedbackShare Page Related Links Privacy Act Request Form .pdf file (99KB) You may request your own Privacy Act records by submitting a request in

208

Order Module--DOE O 435.1 RADIOACTIVE WASTE MANAGEMENT | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35.1 RADIOACTIVE WASTE MANAGEMENT 35.1 RADIOACTIVE WASTE MANAGEMENT Order Module--DOE O 435.1 RADIOACTIVE WASTE MANAGEMENT DOE Order 5820.2A, Radioactive Waste Management, was issued by DOE in September 1988. As early as 1990, DOE began analyzing, assessing, and reviewing the process of implementing the Order. DOE revised the Order on radioactive waste management for several reasons: - After thorough technical reviews and analyses, DOE and the Defense Nuclear Facilities Safety Board concluded that DOE Order 5820.2A did not adequately address the Department's radioactive waste management and disposal practices. -There had been significant advances in radioactive waste management practices and changes in DOE since the Order was issued in 1988. - Risk-based and performance-based requirements were determined to be

209

Order Module--DOE O 414.1D, QUALITY ASSURANCE | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14.1D, QUALITY ASSURANCE 14.1D, QUALITY ASSURANCE Order Module--DOE O 414.1D, QUALITY ASSURANCE "To ensure that DOE, including NNSA, products and services meet or exceed customers' requirements and expectations. To achieve quality for all work based upon the following principles: All work, as defined in this Order, is conducted through an integrated and effective management system. Management support for planning, organization, resources, direction, and control is essential to quality assurance (QA). Performance and quality improvement require thorough, rigorous assessments and effective corrective actions. All personnel are responsible for achieving and maintaining quality. Risks and adverse mission impacts associated with work processes are minimized while maximizing reliability and performance of work products.

210

Order Module--DOE O 435.1 RADIOACTIVE WASTE MANAGEMENT | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O 435.1 RADIOACTIVE WASTE MANAGEMENT O 435.1 RADIOACTIVE WASTE MANAGEMENT Order Module--DOE O 435.1 RADIOACTIVE WASTE MANAGEMENT DOE Order 5820.2A, Radioactive Waste Management, was issued by DOE in September 1988. As early as 1990, DOE began analyzing, assessing, and reviewing the process of implementing the Order. DOE revised the Order on radioactive waste management for several reasons: - After thorough technical reviews and analyses, DOE and the Defense Nuclear Facilities Safety Board concluded that DOE Order 5820.2A did not adequately address the Department's radioactive waste management and disposal practices. -There had been significant advances in radioactive waste management practices and changes in DOE since the Order was issued in 1988. - Risk-based and performance-based requirements were determined to be

211

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

212

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

213

Imagined communities: awareness, information sharing, and privacy on the facebook  

Science Conference Proceedings (OSTI)

Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. ...

Alessandro Acquisti; Ralph Gross

2006-06-01T23:59:59.000Z

214

Weatherization Assistance for Low-Income Persons: Maintaining the Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weatherization Assistance for Low-Income Persons: Maintaining the Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Amending regulations to require all States and other service providers that participate in the Weatherization Assistance Program (WAP) to treat all requests for information concerning applicants and recipients of WAP funds in a manner consistent with the Federal government's treatment of information requested under the Freedom of Information Act (FOIA), 5 U.S.C. 552, including the privacy protections contained in Exemption (b)(6) of the FOIA, 5 U.S.C. 552(b)(6). Weatherization Assistance for Low-Income Persons: Maintaining the Privacy

215

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

216

Bunker: a privacy-oriented platform for network tracing  

Science Conference Proceedings (OSTI)

ISPs are increasingly reluctant to collect and store raw network traces because they can be used to compromise their customers' privacy. Anonymization techniques mitigate this concern by protecting sensitive information. Trace anonymization can be performed ...

Andrew G. Miklas; Stefan Saroiu; Alec Wolman; Angela Demke Brown

2009-04-01T23:59:59.000Z

217

Privacy-preserving anonymization of set-valued data  

Science Conference Proceedings (OSTI)

In this paper we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of transactional data that contains detailed information about items bought together by individuals. Even after removing all personal ...

Manolis Terrovitis; Nikos Mamoulis; Panos Kalnis

2008-08-01T23:59:59.000Z

218

A privacy-aware architecture for a web rating system  

Science Conference Proceedings (OSTI)

Net Trust is a fraud-detection application that enhances security while protecting privacy. Net Trust identifies fraudulent Web sites by aggregating individual opinions, user-selected browsing histories, and third-party information. In this paper, we ...

C. Viecco; A. Tsow; L. J. Camp

2009-03-01T23:59:59.000Z

219

A privacy-preserving index for range queries  

Science Conference Proceedings (OSTI)

Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in database outsourcing scenarios where trust in the service provider is limited. ...

Bijit Hore; Sharad Mehrotra; Gene Tsudik

2004-08-01T23:59:59.000Z

220

Proceedings of the Sixth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Sixth Symposium On Usable Privacy and Security! This year's program features 16 technical papers, two workshops, 17 posters, 11 posters published in the past year at other conferences, a panel, five discussion sessions, and an invited ...

Lorrie Faith Cranor

2010-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Flybynight: mitigating the privacy risks of social networking  

E-Print Network (OSTI)

Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users ' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users ' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user?s reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.

Matthew M. Lucas; Nikita Borisov

2008-01-01T23:59:59.000Z

222

Intelligent content-based privacy assistant for facebook  

E-Print Network (OSTI)

AbstractAlthough most online social networks now offer fine-grained controls of information sharing, these are rarely used, both because their use imposes additional burden on the user and because there are too many control settings for an average user to handle. To mitigate this problem, we have developed an Intelligent Privacy Assistant for Facebook that partially automates the assignment of sharing permissions, taking into account the content of the information published and users high-level sharing policies. The Assistant uses a novel social web privacy language, employs named entity recognition algorithms to annotate sensitive parts of published information and an answer set programming system to evaluate users privacy policies and determine the list of safe recipients. On a test scenario, the Assistant reached 73.8 % and 95.2 % performance in correctly determining safe and unsafe recipients, respectively. Keywords-privacy protection, social web, information extraction, policies, Facebook I.

Michal Jakob; Zbyn?k Moler; Michal P?chou?ek; Roman Vaculn

2011-01-01T23:59:59.000Z

223

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

(PA) of 1974 | National Nuclear Security Administration (PA) of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act (PA) of 1974 Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 Privacy Act (PA) of 1974 The purpose of the Privacy Act of 1974 (Act), Title 5, United States Code,

224

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

225

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

226

A 1 MEGAWATT POLYPHASE BOOST CONVERTER-MODULATOR FOR KLYSTRON PULSE APPLICATION  

SciTech Connect

This paper describes electrical design criteria and first operational results a 140 kV, 1 MW average, 11 MW peak, zero-voltage-switching 20 kHz polyphase bridge, boost converter/modulator for klystron pulse application. The DC-DC converter derives the buss voltages from a standard 13.8 kV to 2300 Y substation cast-core transformer. Energy storage and filtering is provided by self-clearing metallized hazy polypropylene traction capacitors. Three ''H-Bridge'' Insulated Gate Bipolar Transistor (IGBT) switching networks are used to generate the polyphase 20 kHz transformer primary drive waveforms. The 20 kHz drive waveforms are chirped the appropriate duration to generate the desired klystron pulse width. PWM (pulse width modulation) of the individual 20 kHz pulses is utilized to provide regulated output waveforms with adaptive feedforward and feedback techniques. The boost transformer design utilizes amorphous nanocrystalline material that provides the required low core loss at design flux levels and switching frequencies. Resonant shunt-peaking is used on the transformer secondary to boost output voltage and resonate transformer leakage inductance. With the appropriate transformer leakage inductance and peaking capacitance, zero-voltage-switching of the IGBT's is attained, minimizing switching losses. A review of these design parameters and the first results of the performance characteristics will be presented.

W.A. REASS; J.D. DOSS; R.F. GRIBBLE

2001-06-01T23:59:59.000Z

227

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

SciTech Connect

Participatory sensing applications rely on individuals to share local and personal data with others to produce aggregated models and knowledge. In this setting, privacy is an important consideration, and lack of privacy could discourage widespread adoption of many exciting applications. We present a privacy-preserving participatory sensing scheme for multidimensional data which uses negative surveys. Multidimensional data, such as vectors of attributes that include location and environment fields, pose a particular challenge for privacy protection and are common in participatory sensing applications. When reporting data in a negative survey, an individual participant randomly selects a value from the set complement of the sensed data value, once for each dimension, and returns the negative values to a central collection server. Using algorithms described in this paper, the server can reconstruct the probability density functions of the original distributions of sensed values, without knowing the participants actual data. As a consequence, complicated encryption and key management schemes are avoided, conserving energy. We study trade-offs between accuracy and privacy, and their relationships to the number of dimensions, categories, and participants. We introduce dimensional adjustment, a method that reduces the magnification of error associated with earlier work. Two simulation scenarios illustrate how the approach can protect the privacy of a participant's multidimensional data while allowing useful population information to be aggregated.

Groat, Michael [University of New Mexico, Albuquerque; Forrest, Stephanie [University of New Mexico, Albuquerque; Horey, James L [ORNL; Edwards, Benjamin [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln

2012-01-01T23:59:59.000Z

228

A rhetorical analysis of the right to privacy  

E-Print Network (OSTI)

Although no guarantee exists in the Constitution to a right to privacy, it is now generally accepted that individuals have a right to be "let alone.'' In this thesis, I will propose an alternative formulation of the right to privacy, using insights gleaned from rhetorical and communication theory. I will bring "outside'' perspectives to the legal problem of privacy. The right to privacy as established in Griswold holds promise as a coherent interpretive model for evaluating the constitutionality of statutes concerning civil liberties. The systematic consideration of Kenneth Burke's writings on constitutions helps to clarify disputes in methods of constitutional interpretation, and helps to defend the right to privacy against texualists and original intent theorists. Expanding the analysis of privacy to its cultural implications, Michel Foucault's concept of "governmentality'' aids in charting the foundations of the power relationships animating contemporary society. New technologies and the Internet threaten to monopolize on the distribution of power in society. Consequently these technologies threaten the fulfillment of the ideal of a liberal political order. The understanding of the shift in the distribution of power within society facilitates recognition of the importance of subtle manifestation of resistance to the totalizing power of these technologies.

Spatz, George Reynolds

1999-01-01T23:59:59.000Z

229

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

230

Waste Receiving and Processing Facility Module 2A: Advanced Conceptual Design Report. Volume 1  

Science Conference Proceedings (OSTI)

This ACDR was performed following completed of the Conceptual Design Report in July 1992; the work encompassed August 1992 to January 1994. Mission of the WRAP Module 2A facility is to receive, process, package, certify, and ship for permanent burial at the Hanford site disposal facilities the Category 1 and 3 contact handled low-level radioactive mixed wastes that are currently in retrievable storage at Hanford and are forecast to be generated over the next 30 years by Hanford, and waste to be shipped to Hanford from about DOE sites. This volume provides an introduction to the ACDR process and the scope of the task along with a project summary of the facility, treatment technologies, cost, and schedule. Major areas of departure from the CDR are highlighted. Descriptions of the facility layout and operations are included.

Not Available

1994-03-01T23:59:59.000Z

231

Computer Based Training: Engineering Technical Training Modules - Concrete Anchors v1.0  

Science Conference Proceedings (OSTI)

Concrete Anchors, ETTM, is a computer based training module that allows users to access training when desired and review it at their own pace. It provides graphics and limited interactive features to enhance learning. This module provides information about the basics of structural mechanics and the fundamentals of the dynamic response of structural systems. This computer-based training (CBT) module is intended for use by new engineers as well as engineers changing jobs where basic knowledge of this subje...

2010-01-26T23:59:59.000Z

232

How to Read the Modules Documentation FiPy 3.0.1 ...  

Science Conference Proceedings (OSTI)

... Next topic. subpackage Package. This Page. Show Source. Quick search. Enter search terms or a module, class or function name. Contact. ...

2013-08-30T23:59:59.000Z

233

Selective collision based medium access control protocol for proactive protection of privacy for RFID  

Science Conference Proceedings (OSTI)

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our ...

JuSung Park; Jeonil Kang; DaeHun Nyang

2005-12-01T23:59:59.000Z

234

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing  

E-Print Network (OSTI)

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing CARMAN NEUSTAEDTER, S. and Boyle, M. (2006). Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing

Greenberg, Saul

235

Privacy-preserving data mining through data publishing and knowledge model sharing  

Science Conference Proceedings (OSTI)

For the past decade or so, the needs for organizations to share data for knowledge discovery and data mining have increased significantly. Meanwhile, privacy issues have become widely recognized and motivated the research on privacy-preserving data mining ...

Hongwei Tian / Weining Zhang

2012-01-01T23:59:59.000Z

236

A framework for context-aware privacy of sensor data on mobile systems  

Science Conference Proceedings (OSTI)

We study the competing goals of utility and privacy as they arise when a user shares personal sensor data with apps on a smartphone. On the one hand, there can be value to the user for sharing data in the form of various personalized services and recommendations; ... Keywords: Android, behavioral privacy, context-awareness, inferences, ipShield, model-based privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Matthew P. Johnson; Mani B. Srivastava

2013-02-01T23:59:59.000Z

237

Home is safer than the cloud!: privacy concerns for consumer cloud storage  

Science Conference Proceedings (OSTI)

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ... Keywords: cloud storage, cross-cultural, privacy, social factors, usability

Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan ?apkun

2011-07-01T23:59:59.000Z

238

The language of privacy: Learning from video media space analysis and design  

Science Conference Proceedings (OSTI)

Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy ... Keywords: Human-computer interaction, autonomy, computer-supported cooperative work (CSCW), confidentiality, environmental psychology, privacy, social interaction, solitude, user interface design, video media spaces

Michael Boyle; Saul Greenberg

2005-06-01T23:59:59.000Z

239

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University  

Science Conference Proceedings (OSTI)

Computer Science research and practice are raising growing privacy concerns among the public and government. Computer technology's increasing ability to capture, organize, interpret and share data about individuals raises questions about what privacy ... Keywords: data mining, ethics, face recognition, institutional review board, personal assistants, privacy, privacy technology, surveillance

Latanya Sweeney

2004-03-01T23:59:59.000Z

240

BEAM TEST of the ATLAS SILICON DETECTOR MODULES with BINARY READOUT in the CERN H8 BEAM in 1996 1  

E-Print Network (OSTI)

, Spain, 21 Univ. of Wisconsin, Madison, WI, USA ABSTRACT Results are reported from a beam testBEAM TEST of the ATLAS SILICON DETECTOR MODULES with BINARY READOUT in the CERN H8 BEAM in 1996 1 F readout. Readout will be AC­coupled from n­type implant strips in n­bulk crystals. After radiation induced

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Design and Evaluation of an Architecture for Location Privacy  

E-Print Network (OSTI)

Many operators of cellphone networks now offer location-based services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a persons location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operators customers in a privacy-preserving way. We propose an architecture for location-based services based on Trusted Computing and Secure Logging. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors the composition or the timing of information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks. We present an implementation of our architecture and demonstrate its usefulness by building two sample location-based services on top of it. The evaluation of our architecture shows that its processing delay is hardly noticeable and that timing attacks are very unlikely to succeed. 1

Urs Hengartner

2008-01-01T23:59:59.000Z

242

Carousel Trackers with 1-Sun or 3-Sun Modules for Commercial Building Rooftops  

Science Conference Proceedings (OSTI)

The goal is lower cost solar electricity. Herein, two evolutional steps are described toward achieving this goal. The first step is to follow the sun with a solar tracker. Herein, a carousel tracker is described for mounting on commercial building flat rooftops in order to produce more kWh per kW relative to fixed PV modules. The second evolutionary improvement is to produce lower cost 3-sun CPV modules where two thirds of the expensive single crystal silicon material is replaced by less expensive mirror material. This paper describes the performance and durability of two prototype installations demonstrating these evolutionary innovations. In the first case, the installation and operation of 2 carousels equipped with traditional flat plate modules is described. In the second case, the operation of a carousel equipped with new 3-sun CPV modules is described. Both systems have been operating as expected for several months through the winter of 2007.

Gehl, Anthony C [ORNL; Maxey, L Curt [ORNL; Fraas, Dr. Lewis [JX Crystals, Inc.; Avery, James E. [JX Crystals, Inc.; Minkin, Leonid M [ORNL; Huang, H, [JX Crystals, Inc.

2008-01-01T23:59:59.000Z

243

Engineering Technical Training Module Water and Steam Properties (ETTM: WSP) Version 1.0  

Science Conference Proceedings (OSTI)

The purpose of this training module is to provide a foundational understanding on the engineering principals and properties of water and steam and how they apply in nuclear power plant applications. The topics that are included are steam tables, specific heat, the energy equation and how it applies to different plant systems, and example problems for analyzing different plant equipment to understand their water/steam properties. This computer-based training (CBT) module is intended for use by new engine...

2011-09-16T23:59:59.000Z

244

Computer Based Training: Engineering Technical Training Module - Centrifugal Pump Vibration 1.0  

Science Conference Proceedings (OSTI)

The Centrifugal Pump Vibration is a computer based training module that allows users to access training when desired and review it at their own pace. It provides graphics and limited interactive features to enhance learning. This module reviews the basic engineering principles used to calculate heat transfer and how to apply these principles to typical nuclear plant applications. The calculation of heat transfer in plant systems is an important element of many engineering calculations. Students should re...

2010-08-12T23:59:59.000Z

245

Engineering Technical Training Modules - Medium Voltage System Protection and Coordination Version 1.0  

Science Conference Proceedings (OSTI)

The purpose of this training module is to provide a basic understanding of protective relaying and coordination typically provided for medium voltage power systems. This module provides a discussion on current and potential transformers, the protective relays typically used as well as considerations for equipment protection and coordination or selective tripping. Medium voltage motor, transformer, and bus protection applications are covered. Lesson 4 focuses on emergency diesel generator protection in n...

2011-08-09T23:59:59.000Z

246

Engineering Technical Training Modules - Battery Chargers and Inverters (ETTM - BSI) Version 1.0  

Science Conference Proceedings (OSTI)

ETTM Battery Chargers and Inverters is a computer based training module that allows users to access training when desired and review it at their own pace. It provides graphics and limited interactive features to enhance learning. The scope and purpose of this training module is to discuss the principles involved in the operations of battery chargers and inverters, and to consider industry practices used in employing these components in a typical nuclear power plant application. Although the battery is an...

2010-11-30T23:59:59.000Z

247

Thermionic modules  

DOE Patents (OSTI)

Modules of assembled microminiature thermionic converters (MTCs) having high energy-conversion efficiencies and variable operating temperatures manufactured using MEMS manufacturing techniques including chemical vapor deposition. The MTCs incorporate cathode to anode spacing of about 1 micron or less and use cathode and anode materials having work functions ranging from about 1 eV to about 3 eV. The MTCs also exhibit maximum efficiencies of just under 30%, and thousands of the devices and modules can be fabricated at modest costs.

King, Donald B. (Albuquerque, NM); Sadwick, Laurence P. (Salt Lake City, UT); Wernsman, Bernard R. (Clairton, PA)

2002-06-18T23:59:59.000Z

248

Computational Investigation of Glycosylation Effects on a Family 1 Carbohydrate-Binding Module  

DOE Green Energy (OSTI)

Carbohydrate-binding modules (CBMs) are ubiquitous components of glycoside hydrolases, which degrade polysaccharides in nature. CBMs target specific polysaccharides, and CBM binding affinity to cellulose is known to be proportional to cellulase activity, such that increasing binding affinity is an important component of performance improvement. To ascertain the impact of protein and glycan engineering on CBM binding, we use molecular simulation to quantify cellulose binding of a natively glycosylated Family 1 CBM. To validate our approach, we first examine aromatic-carbohydrate interactions on binding, and our predictions are consistent with previous experiments, showing that a tyrosine to tryptophan mutation yields a 2-fold improvement in binding affinity. We then demonstrate that enhanced binding of 3-6-fold over a nonglycosylated CBM is achieved by the addition of a single, native mannose or a mannose dimer, respectively, which has not been considered previously. Furthermore, we show that the addition of a single, artificial glycan on the anterior of the CBM, with the native, posterior glycans also present, can have a dramatic impact on binding affinity in our model, increasing it up to 140-fold relative to the nonglycosylated CBM. These results suggest new directions in protein engineering, in that modifying glycosylation patterns via heterologous expression, manipulation of culture conditions, or introduction of artificial glycosylation sites, can alter CBM binding affinity to carbohydrates and may thus be a general strategy to enhance cellulase performance. Our results also suggest that CBM binding studies should consider the effects of glycosylation on binding and function.

Taylor, C. B.; Talib, M. F.; McCabe, C.; Bu, L.; Adney, W. S.; Himmel, M. E.; Crowley, M. F.; Beckham, G. T.

2012-01-27T23:59:59.000Z

249

Microsoft Word - Privacy_Contact_Listing_September_21_2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Department of Energy US Department of Energy Privacy Act Officers Contact Listing As of September 21, 2010 Chief Privacy Officer Jerry Hanley U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 jerry.hanley@hq.doe.gov Phone: (202) 586-0483 Fax: (202) 586-0575 Operations Offices Chicago Office Miriam Legan U.S. Department of Energy Chicago Office 9800 S. Cass Avenue Argonne, IL 60439 miriam.legan@ch.doe.gov Phone: 630-252-2041 Fax: 630-252-2183 Idaho Operations Office Clayton Ogilvie U.S. Department of Energy 1955 Fremont Ave. MS 1203 Idaho Falls, Idaho 83415

250

On mental privacy: the having of mental states  

E-Print Network (OSTI)

In three chapters this thesis seeks to demonstrate that (i) there historically has been no consensus in the use of the term 'mental privacy' and that several problematic doctrines are based on confused accounts of this term; (ii) there are contemporary debates which are maintained, in large order, by the opposing sides subscribing to different notions of mental privacy; and (iii) a preliminary investigation makes clear that both mental states with propositional content and mental states with non-propositional content are private in that both require the agent to have the state.

Dembitzer, Simon David

1998-01-01T23:59:59.000Z

251

Security and privacy issues for the network of the future  

Science Conference Proceedings (OSTI)

The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service ... Keywords: networks, privacy, security

Giannis F. Marias; Joo Barros; Markus Fiedler; Andreas Fischer; Harald Hauff; Ralph Herkenhoener; Antonio Grillo; Alessandro Lentini; Luisa Lima; Charlott Lorentzen; Wojciech Mazurczyk; Hermann de Meer; Paulo F. Oliveira; George C. Polyzos; Enric Pujol; Krzysztof Szczypiorski; Joo P. Vilela; Tiago T. V. Vinhoza

2012-09-01T23:59:59.000Z

252

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

253

Model-based context privacy for personal data streams  

Science Conference Proceedings (OSTI)

Smart phones with increased computation and sensing capabilities have enabled the growth of a new generation of applications which are organic and designed to react depending on the user contexts. These contexts typically define the personal, social, ... Keywords: context streams, context-awareness, dynamic bayesian networks, information leakage, privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Mani Srivastava; Harris Teague

2012-10-01T23:59:59.000Z

254

Analysis of privacy in online social networks of runet  

Science Conference Proceedings (OSTI)

In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situations and staying in touch with people already known. An important aspect of ... Keywords: information revelation, privacy, security, social networking sites, trust

Slava Kisilevich; Florian Mansmann

2010-09-01T23:59:59.000Z

255

Protecting the sink location privacy in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. ... Keywords: Location privacy, Receiver, Sink, WSN

Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu

2013-06-01T23:59:59.000Z

256

Location privacy and resilience in wireless sensor networks querying  

Science Conference Proceedings (OSTI)

Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms-those would just protect the message content. However, communication patterns ... Keywords: Location privacy, Probabilistic algorithm, Resiliency, Security, Wireless sensor networks

Roberto Di Pietro; Alexandre Viejo

2011-03-01T23:59:59.000Z

257

Privacy nudges for social media: an exploratory Facebook study  

Science Conference Proceedings (OSTI)

Anecdotal evidence and scholarly research have shown that a significant portion of Internet users experience regrets over their online disclosures. To help individuals avoid regrettable online disclosures, we employed lessons from behavioral decision ... Keywords: facebook, nudge, online disclosure, privacy, soft paternalism

Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, Lorrie Faith Cranor

2013-05-01T23:59:59.000Z

258

Trusting to learn: trust and privacy issues in serious games  

Science Conference Proceedings (OSTI)

Organizations are increasingly investing in technology-enhanced learning systems to improve their employees' skills. Serious games are one example; the competitive and fun nature of games is supposed to motivate employee participation. But any system ... Keywords: privacy, serious games, technology-enhanced learning, trust

Miguel Malheiros; Charlene Jennett; Will Seager; M. Angela Sasse

2011-06-01T23:59:59.000Z

259

Private sector video surveillance in Toronto: not privacy compliant!  

Science Conference Proceedings (OSTI)

We report on the findings of a fieldwork study conducted on private sector video surveillance and signage in the Toronto area. The presence and operation of over 140 video surveillance camera schemes by large service providing corporations, in 2 major ... Keywords: PIPEDA, privacy, private sector, regulation, video surveillance

Andrew Clement; Joseph Ferenbok; Roxanna Dehghan; Laura Kaminker; Simeon Kanev

2012-02-01T23:59:59.000Z

260

Locanyms: towards privacy-preserving location-based services  

Science Conference Proceedings (OSTI)

Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based Services (LBS), personalizing the services ... Keywords: location-based services, privacy, ubiquitous computing

Sebastien Gambs; Marc-Olivier Killijian; Matthieu Roy; Moussa Traore

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Stalking online: on user privacy in social networks  

Science Conference Proceedings (OSTI)

With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and knowledge discovery technologies have ... Keywords: attacks, privacy, social networks, web

Yuhao Yang; Jonathan Lutes; Fengjun Li; Bo Luo; Peng Liu

2012-02-01T23:59:59.000Z

262

Security and privacy for geospatial data: concepts and research directions  

Science Conference Proceedings (OSTI)

Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among ... Keywords: GIS, geospatial data, privacy, security

Elisa Bertino; Bhavani Thuraisingham; Michael Gertz; Maria Luisa Damiani

2008-11-01T23:59:59.000Z

263

Measuring long-term location privacy in vehicular communication systems  

Science Conference Proceedings (OSTI)

Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many vehicular applications rely on continuous and detailed location information ... Keywords: Accumulated information, Entropy, Location privacy, Metric, Vehicular communication systems

Zhendong Ma; Frank Kargl; Michael Weber

2010-07-01T23:59:59.000Z

264

Trust enhanced ubiquitous payment without too much privacy loss  

Science Conference Proceedings (OSTI)

Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. ... Keywords: context, payment, privacy, trust, ubicomp

Jean-Marc Seigneur; Christian Damsgaard Jensen

2004-03-01T23:59:59.000Z

265

Proceedings of the Ninth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, ...

Lorrie Faith Cranor, Lujo Bauer, Konstantin Beznosov

2013-07-01T23:59:59.000Z

266

Privacy-preserving smart metering with multiple data Consumers  

Science Conference Proceedings (OSTI)

The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about ... Keywords: Data privacy, Multiparty computation, Smart grid

Cristina Rottondi, Giacomo Verticale, Antonio Capone

2013-05-01T23:59:59.000Z

267

Module process optimization and device efficiency improvement for stable, low-cost, large-area, cadmium telluride-based photovoltaic module production. Final subcontract report, 1 July 1990--30 April 1994  

DOE Green Energy (OSTI)

This report describes work performed under a three-phase subcontract. The objectives of the program include (1) achievement of active-area efficiencies of greater than 14% on small cells; (2) achievement of aperture-area efficiencies of greater than 13% on 0.09-m{sup 2} (1 ft{sup 2}) modules; (3) achievement of aperture-area efficiencies of greater than 12.5% on 0.37-m{sup 2} (4 ft{sup 2}) modules; and achievement of greater than 20-year module life (based on life testing extrapolations) with no greater than 10% efficiency degradation. The results obtained and described herein include the following: (1) efficiencies of 12.7% were achieved on small-area devices; (2) 0.09-m{sup 2} (1 ft{sup 2}) modules achieved greater than 8% aperture-area efficiency, but work for further efficiency improvement was redirected toward the 0.37-M{sup 2} (4 if) modules; (3) 0.37-m{sup 2} (4 ft{sup 2}) modules achieved 26.5-W output, which calculates to 8.0% aperture-area efficiency; (4) consistent prototype production was focused on and substantially achieved within Phase 2; (5) life testing at the National Renewable Energy Laboratory showed no inherent stability problems with the CdTe technology, and the accuracy of module measurement was satisfactorily resolved; and (6) a ``cradle-to-cradle`` recycling program was begun based upon the philosophy that the establishment of such mechanisms will be required to ensure maximum recapture and recycling of all manufacturing waste materials and/or modules returned from the field.

Albright, S.P.; Johnson, S.X. [Golden Photon, Inc., CO (United States)

1994-06-01T23:59:59.000Z

268

Research on stable, high-efficiency amorphous silicon multijunction modules. Annual subcontract report, 1 January 1992--28 February 1993  

DOE Green Energy (OSTI)

This report describes the progress made during Phase 2 of the R&D program to obtain high-efficiency amorphous alloy multijunction PV (photovoltaic) modules. The highlight of the work includes: (1) demonstration of world-record small-area efficiency of 11.2% after one-sun light-soaking at 50{degrees}C for 600 h using a dual band gap, double-junction structure; and (2) demonstration of initial module efficiency of 10.6% over 0.09-m{sup 2} (1-ft{sup 2}) area using the same double-junction approach. In addition, fundamental studies on material properties and cell performance have shown an interesting correlation between microstructure in the material and cell efficiency both in the initial and light-degraded conditions.

Guha, S. [United Solar Systems Corp., Troy, MI (US)

1993-07-01T23:59:59.000Z

269

DOE Order Self Study Modules - DOE O 433.1B, Maintenance Management Program for DOE Nuclear Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.1B 3.1B MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES DOE O 433.1B Familiar Level August 2011 1 DOE O 433.1B MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources, you will be able to answer the following questions: 1. What is the objective of DOE O 433.1B, Maintenance Management Program for DOE Nuclear Facilities? 2. What is the purpose for quantitative indicators in maintenance management? 3. What are three types of environmental controls included in a maintenance shop? 4. What is the relationship between DOE G 433.1-1 and DOE O 433.1A? 5. What is the purpose for post-maintenance testing? 6. What is the objective of a good equipment maintenance history program?

270

Process development for automated solar cell and module production. Task 4. Automated array assembly. Quarterly report No. 1  

DOE Green Energy (OSTI)

Work has been divided into five phases. The first phase is to modify existing hardware and controlling computer software to: (1) improve cell-to-cell placement accuracy, (2) improve the solder joint while reducing the amount of solder and flux smear on the cell's surface, and (3) reduce the system cycle time to 10 seconds. The second phase involves expanding the existing system's capabilities to be able to reject broken cells and make post-solder electrical tests. Phase 3 involves developing new hardware to allow for the automated encapsulation of solar modules. This involves three discrete pieces of hardware: (1) a vacuum platen end effector for the robot which allows it to pick up the 1' x 4' array of 35 inter-connected cells. With this, it can also pick up the cover glass and completed module, (2) a lamination preparation station which cuts the various encapsulation components from roll storage and positions them for encapsulation, and (3) an automated encapsulation chamber which interfaces with the above two and applies the heat and vacuum to cure the encapsulants. Phase 4 involves the final assembly of the encapsulated array into a framed, edge-sealed module completed for installation. For this we are using MBA's Glass Reinforced Concrete (GRC) in panels such as those developed by MBA for JPL under contract No. 955281. The GRC panel plays the multiple role of edge frame, substrate and mounting structure. An automated method of applying the edge seal will also be developed. The final phase (5) is the fabrication of six 1' x 4' electrically active solar modules using the above developed equipment. Progress is reported. (WHK)

Hagerty, J. J.

1980-10-15T23:59:59.000Z

271

Research on stable, high-efficiency amorphous silicon multijunction modules. Annual subcontract report, 1 January 1991--31 December 1991  

DOE Green Energy (OSTI)

This report describes the progress made during Phase 1 of research and development program to obtain high-efficiency amorphous silicon alloy multijunction modules. Using a large-area deposition system, double-and triple-junction cells were made on stainless steel substrates of over 1 ft{sup 2} area with Ag and ZnO predeposited back reflector. Modules of over 1 ft{sup 2} were produced with between 9.2% and 9.9 initial aperture-area efficiencies as measured under a USSC Spire solar simulator. Efficiencies as measured under the NREL Spire solar simulator were found to be typically 15% to 18% lower. The causes for this discrepancy are now being investigated. The modules show about 15% degradation after 600 hours of one-sun illumination at 50{degrees}C. To optimize devices for higher stabilized efficiency, a new method was developed by which the performance of single-junction cells after long-term, one-sun exposure at 50{degrees}C can be predicted by exposing cells to short-term intense light at different temperatures. This method is being used to optimize the component cells of the multijunction structure to obtain the highest light-degraded efficiency.

Banerjee, A.; Chen, E.; Clough, R.; Glatfelter, T.; Guha, S.; Hammond, G.; Hopson, M.; Jackett, N.; Lycette, M.; Noch, J.; Palmer, T.; Pawlikiewicz, A.; Rosenstein, I.; Ross, R.; Wolf, D.; Xu, X.; Yang, J.; Younan, K.

1992-04-01T23:59:59.000Z

272

SCALE: A modular code system for performing standardized computer analyses for licensing evaluation. Control modules -- Volume 1, Revision 4  

SciTech Connect

SCALE--a modular code system for Standardized Computer Analyses Licensing Evaluation--has been developed by Oak Ridge National Laboratory at the request of the US Nuclear Regulatory Commission. The SCALE system utilizes well-established computer codes and methods within standard analysis sequences that (1) allow an input format designed for the occasional user and/or novice, (2) automate the data processing and coupling between modules, and (3) provide accurate and reliable results. System development has been directed at problem-dependent cross-section processing and analysis of criticality safety, shielding, heat transfer, and depletion/decay problems. Since the initial release of SCALE in 1980, the code system has been heavily used for evaluation of nuclear fuel facility and package designs. This revision documents Version 4.2 of the system. This manual is divided into three volumes: Volume 1--for the control module documentation, Volume 2--for the functional module documentation, and Volume 3 for the documentation of the data libraries and subroutine libraries.

Landers, N.F.; Petrie, L.M.; Knight, J.R. [Oak Ridge National Lab., TN (United States)] [and others

1995-04-01T23:59:59.000Z

273

Research on stable, high-efficiency amorphous silicon multijunction modules. Semiannual subcontract report, 1 January 1990--30 June 1991  

DOE Green Energy (OSTI)

This report describes research to improve the understanding of amorphous silicon alloys and other relevant non-semiconductor materials for use in high-efficiency, large-area multijunction modules. The research produced an average subcell initial efficiency of 8.8% over a 1-ft{sup 2} area using same-band-gap, dual-junction cells deposited over a ZnO/AlSi back reflector. An initial efficiency of 9.6% was achieved using a ZnO/Ag back reflector over smaller substrates. A sputtering machine will be built to deposit a ZnO/Ag back reflector over a 1-ft{sup 2} area so that a higher efficiency can also be obtained on larger substrates. Calculations have been performed to optimize the grid pattern, bus bars, and cell interconnects on modules. With our present state of technology, we expect a difference of about 6% between the aperture-area and active-area efficiencies of modules. Preliminary experiments show a difference of about 8%. We can now predict the performance of single-junction cells after long-term light exposure at 50{degree}C by exposing cells to short-term intense light at different temperatures. We find that single-junction cells deposited on a ZnO/Ag back reflector show the highest stabilized efficiency when the thickness of the intrinsic layers is about 2000 {angstrom}. 8 refs.

Guha, S. [United Solar Systems Corp., Troy, MI (United States)

1991-12-01T23:59:59.000Z

274

Privacy Act Advisory | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Advisory Privacy Act Advisory Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Advisory Exemptions How to Submit a FOIA Request Fee Waiver and Reduction Criteria Electronic Reading Room ISC Conventional Reading Rooms Reference Links Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Freedom of Information Act (FOIA) Privacy Act Advisory Print Text Size: A A A RSS Feeds FeedbackShare Page To Contact Us Freedom of Information Act/Privacy Act Officer U.S. Department of Energy SC Integrated Support Center - Chicago

275

DOE Order Self Study Modules - DOE O 425.1D, Verification of Readiness to Startup or Restart Nuclear Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5.1D 5.1D VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES DOE O 425.1D Familiar Level June 2011 1 DOE O 425.1D VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources, you will be able to perform the following: 1. What is the purpose of DOE O 425.1D, Verification of Readiness to Startup or Restart Nuclear Facilities? 2. What are the requirements for determining the level of readiness review [operational readiness reviews (ORRs) and readiness assessments (RAs)]? 3. What are the requirements for determining the startup authorization authority? 4. What are the requirements for startup notification reports?

276

DOE Order Self Study Modules - DOE O 458.1, Radiation Protection of the Public and the Environment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

58.1 58.1 RADIATION PROTECTION OF THE PUBLIC AND THE ENVIRONMENT DOE O 458.1 Familiar Level August 2011 1 DOE O 458.1 RADIATION PROTECTION OF THE PUBLIC AND THE ENVIRONMENT FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the objectives of DOE O 458.1? 2. What are the definitions for the following terms?  Residual radioactive material  Public dose  ALARA  Soil column ( in the context of radiation protection of the environment) 3. What are three basic considerations that should be observed in an ALARA process for DOE radioactive activities? 4. What are four elements that must be included in dose evaluations to demonstrate

277

SCALE: A modular code system for performing Standardized Computer Analyses for Licensing Evaluation. Volume 1, Part 2: Control modules S1--H1; Revision 5  

SciTech Connect

SCALE--a modular code system for Standardized Computer Analyses Licensing Evaluation--has been developed by Oak Ridge National Laboratory at the request of the US Nuclear Regulatory Commission. The SCALE system utilizes well-established computer codes and methods within standard analysis sequences that (1) allow an input format designed for the occasional user and/or novice, (2) automated the data processing and coupling between modules, and (3) provide accurate and reliable results. System development has been directed at problem-dependent cross-section processing and analysis of criticality safety, shielding, heat transfer, and depletion/decay problems. Since the initial release of SCALE in 1980, the code system has been heavily used for evaluation of nuclear fuel facility and package designs. This revision documents Version 4.3 of the system.

NONE

1997-03-01T23:59:59.000Z

278

Module process optimization and device efficiency improvement for stable, low-cost, large-area, cadmium telluride-based photovoltaic module production. Annual subcontract report, 1 July 1990--31 December 1991  

DOE Green Energy (OSTI)

This report describes work under a three-year phased subcontract to develop CdS/CdTe devices and modules and to further improve the technology base at Photon Energy, Inc. (PEI) to better address the commercialization issues and objectives of the PEI and the US Department of Energy. During this reporting period we (1) achieved efficiencies of 12.7% on small area devices, (2) achieved 1-ft{sup 2} modules with over 8% aperture-area efficiency (and active area efficiencies up to {approximately}10%), (3) tested 4-ft{sup 2} modules at NREL at 23.1 (21.3) watts, normalized (6.3% efficiency), and (4) found no inherent stability problems with CdTe technology during life testing, at both NREL and PEI. 7 refs.

Albright, S.P.; Ackerman, B.; Chamberlin, R.R.; Jordan, J.F. [Photon Energy, Inc., El Paso, TX (United States)

1992-04-01T23:59:59.000Z

279

DOE Order Self Study Modules - DOE O 452.1D, Nuclear Explosive and Weapon Surety Program and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONTINUING TRAINING SELF- CONTINUING TRAINING SELF- STUDY PROGRAM DOE O 452.1D NUCLEAR EXPLOSIVE AND WEAPON SURETY PROGRAM DOE O 452.2D NUCLEAR EXPLOSIVE SAFETY DOE O 452.1D and DOE O 452.2D Familiar Level June 2011 1 DOE O 452.1D NUCLEAR EXPLOSIVE AND WEAPON SURETY PROGRAM DOE O 452.2D NUCLEAR EXPLOSIVE SAFETY FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the objectives of implementing U.S. Department of Energy (DOE) O 452.1D? 2. Define the following terms as they apply to this Order: Abnormal environment High explosive detonation 3. What are the objectives of implementing DOE O 452.2D? 4. What are the general requirements of DOE O 452.2D?

280

Privacy and identifiability in clinical research, personalized medicine, and public health surveillance  

E-Print Network (OSTI)

Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

Cassa, Christopher A

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

PDSF Modules  

NLE Websites -- All DOE Office Websites (Extended Search)

Modules Modules Modules Modules Approach to Managing The Environment Modules is a system which you can use to specify what software you want to use. If you want to use a particular software package loading its module will take care of the details of modifying your environment as necessary. The advantage of the modules approach is that the you are not required to explicitly specify paths for different executable versions and try to keep their related man paths and environment variables coordinated. Instead you simply "load" and "unload" specific modules to control your environment. Getting Started with Modules If you're using the standard startup files on PDSF then you're already setup for using modules. If the "module" command is not available, please

282

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

283

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

284

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

285

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

286

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

287

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

288

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

289

Research on high efficiency, large-area CuInSe{sub 2}-based thin-film modules. Annual subcontract report, 1 May 1991--30 April 1992  

DOE Green Energy (OSTI)

Objective was to demonstrate 12.5% aperture efficient, large area (3900 cm{sup 2}) encapsulated thin thin CuInSe{sub 2} (CIS) modules. The module design consists of 53 series-connected ZnO/CdS/CIS/Mo/glass cells fabricated on a glass substrate. A baseline characterization of the CIS modules was established during Phase 1. Maps of open circuit voltage provide information on junction quality uniformity. Maps of cell voltages at fixed forward bias show variations in resistance losses due to interconnects. Individual cell I-V curves can be evaluated. Physical nature of defects is correlated using OBIC, EBIC, SEM, tape adhesion, etc. A new world record of 37.7 W and 9.7% aperture efficiency was attained for an encapsulated module; an unencapsulated CIS module plate achieved 40.8 W and 10.5% aperture efficiency.

Mitchell, K.W.; Eberspacher, C. [Siemens Solar Industries, Camarillo, CA (United States)

1993-02-01T23:59:59.000Z

290

Citizen's Attitudes about Privacy While Accessing Government and Private  

E-Print Network (OSTI)

This paper reports the results of an investigation on citizens' attitudes and concerns regarding privacy and security on the Web, in general, and on the government websites they may visit, in particular. We examine to what extent those concerns can be alleviated by using a Secure Private Portal that protects citizen's personally identifying information when accessing government websites. The research project had two main goals: (a) to develop a comprehensive psychological instrument to assess citizens' attitudes and concerns regarding privacy and security on the Web; (b) to test the impact a Secure Private Portal may have on those concerns and on the way citizens use Government Websites. In order to accomplish these goals researchers from Columbia Business School and from Columbia departments of Computer Science and Psychology, developed and ran a web-based survey. Participants were recruited using online advertising through Google.com and provided their responses on the web. Early analyses of the results indicate a very high level of citizens' concerns regarding privacy and security of their personal data. Some of the concerns can appropriately be addressed only by fundamental policy changes. Furthermore, the results suggest that citizens perceive those sites which use secure portals as much safer and are more likely to visit them again. The results may indicate a new strategy for the presentation and design of government websites.

Websites Results Of; Salvatore J. Stolfo; Eric Johnson; Tomislav Pavlicic; Stephen Jan

2003-01-01T23:59:59.000Z

291

Plug-in privacy for Smart Metering billing  

E-Print Network (OSTI)

Smart Metering is a concept that allows to collect fine-grained consumption profiles from customers by replacing traditional electricity meters with Smart Meters in customers' households. The recorded consumption profile is the basis for the calculation of time-dependent tariffs but also allows deduction of the inhabitant's personal schedules and habits. The current reporting of such consumption profiles only protects this data from 3rd parties but falls short to protect the customer's privacy from illegitimate abuse by the supplier itself. We propose a privacy-preserving profile reporting protocol that enables billing for time-dependent tariffs without disclosing the actual data of the consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end systems and requires no change to Smart Meter hardware and only little change to the softw...

Jawurek, Marek; Kerschbaum, Florian

2010-01-01T23:59:59.000Z

292

Research on high-efficiency, large-area, CuInSe{sub 2}-based thin- film modules. Annual subcontract report, 1 May 1992--15 Aug 1993  

DOE Green Energy (OSTI)

This report describes work to demonstrate 12.5% aperture efficient, large-area (3900-cm{sup 2}) encapsulated thin-film CuInSe{sub 2} (CIS) photovoltaic modules. Module design consists of 53 series-connected ZnO/CdS/CIS/Mo/glass cells fabricated on a 4141-cm{sup 2} (128.6 {times} 32.2 cm) glass substrate with a nominal aperture area of 3895 cm{sup 2} (127.3 {times} 30.6 cm). Four CIS modules were shipped to NREL under the terms of the subcontract. Phase 2 consisted of fabricating large-area (3900-cm{sup 2}) modules for high-performance module processing. The large-area parts proved to be cumbersome, and we decided to use smaller substrates (100 cm{sup 2}) to accelerate the progress in solving the types of technical challenges that were discovered in processing large-area parts, and then to apply these solutions to larger areas to meet the objectives of the investigation. Most critical issues determining module yield losses can be grouped into three major categories: (1) Uniformity and reproducibility of the absorber formation process dominates the fundamental performance of the material over a large area, (2) interaction of the substrate with the Mm requires appropriate selection criterial and preparation techniques for minimizing defects that lead to shunting and areas of poor photoresponse, and (3) performance losses near interconnects reduce module performance and can cause inadequate performance through module durability testing.

Knapp, K.E.; Gay, R.R. [Siemens Solar Industries, Camarillo, CA (United States)

1994-01-01T23:59:59.000Z

293

Development of Automated Production Line Processes for Solar Brightfield Modules: Final Annual Technical Progress Report, 1 July 2004 -- 15 October 2005  

DOE Green Energy (OSTI)

Spire Corporation is addressing the Photovoltaic Manufacturing R&D project goals of improving photovoltaic (PV) manufacturing processes and products while reducing costs and providing a technology foundation that supports significant manufacturing scale-up. To accomplish this, we are focusing our efforts on the design of a large-area utility-scale module and the development of the necessary manufacturing techniques and equipment to manufacture such a module in a high-volume production environment. A three-phase program is under way for developing and demonstrating new automated systems for fabricating very large PV modules ideal for use in multi-megawatt grid-connected applications. We designed a large-area (1.57 m x 3.68 m) 800-W module, and we are developing associated module production equipment that will minimize the total installed system cost for utility-scale PV arrays. Activities in Phase 2 focused on the development of automation for module materials lay-up, cell string busing, and module lamination; enhancements to the cell stringing and lamination processes; and performance testing of large-area modules.

Nowlan, M. J.; Murach, J. M.; Sutherland, S. F.; Miller, D. C.; Moore S. B.; Hogan, S. J.

2006-08-01T23:59:59.000Z

294

Cast polycrystalline silicon photovoltaic module manufacturing technology improvements. Semiannual technical report, 1 January 1996--30 June 1996  

DOE Green Energy (OSTI)

Two specific objectives of Solarex`s program are to reduce the manufacturing cost for polycrystalline silicon photovoltaic modules to less than $1.20/watt and to increase the manufacturing capacity by a factor of three. This report highlights accomplishments during the period of January 1 through June 30, 1996. Accomplishments include: began the conversion of production casting stations to increase ingot size; operated the wire saw in a production mode with higher yields and lower costs than achieved on the ID saws; developed and qualified a new wire guide coating material that doubles the wire guide lifetime and produces significantly less scatter in wafer thickness; completed a third pilot run of the cost-effective Al paste back-surface-field (BSF) process, verifying a 5% increase in cell efficiency and demonstrating the ability to process and handle the BSF paste cells; completed environmental qualification of modules using cells produced by an all-print metallization process; optimized the design of the 15.2-cm by 15.2-cm polycrystalline silicon solar cells; demonstrated the application of a high-efficiency process in making 15.2-cm by 15.2-cm solar cells; demonstrated that cell efficiency increases with decreasing wafer thickness for the Al paste BSF cells; qualified a vendor-supplied Tedlar/ethylene vinyl acetate (EVA) laminate to replace the combination of separate sheets of EVA and Tedlar backsheet; demonstrated the operation of a prototype unit to trim/lead attach/test modules; and demonstrated the operation of a wafer pull-down system for cassetting wet wafers.

Wohlgemuth, J. [Solarex Corp., Frederick, MD (United States)

1997-01-01T23:59:59.000Z

295

SCALE: A modular code system for performing standardized computer analyses for licensing evaluation. Functional modules F1--F8 -- Volume 2, Part 1, Revision 4  

SciTech Connect

SCALE--a modular code system for Standardized Computer Analyses Licensing Evaluation--has been developed by Oak Ridge National Laboratory at the request of the US Nuclear Regulatory Commission. The SCALE system utilizes well-established computer codes and methods within standard analysis sequences that (1) allow an input format designed for the occasional user and/or novice, (2) automate the data processing and coupling between modules, and (3) provide accurate and reliable results. System development has been directed at problem-dependent cross-section processing and analysis of criticality safety, shielding, heat transfer, and depletion/decay problems. Since the initial release of SCALE in 1980, the code system has been heavily used for evaluation of nuclear fuel facility and package designs. This revision documents Version 4.2 of the system. The manual is divided into three volumes: Volume 1--for the control module documentation; Volume 2--for functional module documentation; and Volume 3--for documentation of the data libraries and subroutine libraries.

Greene, N.M.; Petrie, L.M.; Westfall, R.M.; Bucholz, J.A.; Hermann, O.W.; Fraley, S.K. [Oak Ridge National Lab., TN (United States)

1995-04-01T23:59:59.000Z

296

Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market  

Science Conference Proceedings (OSTI)

Advances in genetic testing and data mining technologies have increased the availability of genetic information to insurance companies and insureds (applicants and policy holders) in the individual health insurance market (IHIM). Regulators, concerned ... Keywords: Bundling Information Privacy Insurance Markets Insurey Words And Phrases Ance Policy Privacy Privacy Cost

Matt E. Thatcher; Eric K. Clemons

2000-08-01T23:59:59.000Z

297

Privacy and security issues in cloud computing: The role of institutions and institutional evolution  

Science Conference Proceedings (OSTI)

Cloud computing is likened and equated to the Industrial Revolution. Its transformational nature is, however, associated with significant security and privacy risks. This paper investigates how the contexts provided by formal and informal institutions ... Keywords: Cloud computing, Contradictions, Institutional changes, Institutions, Privacy and security, Trust production process

Nir Kshetri

2013-05-01T23:59:59.000Z

298

Security and privacy implications of cloud computing: lost in the cloud  

Science Conference Proceedings (OSTI)

Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework ... Keywords: cloud computing, data, information, network, privacy, security

Vassilka Tchifilionova

2010-03-01T23:59:59.000Z

299

Tracking website data-collection and privacy practices with the iWatch web crawler  

Science Conference Proceedings (OSTI)

In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make possible a new type of analysis of ... Keywords: P3P, cookies, data-collection practices, demographics, legislative impact, privacy, web-crawling, webbugs

Carlos Jensen; Chandan Sarkar; Christian Jensen; Colin Potts

2007-07-01T23:59:59.000Z

300

Privacy-preserving smart metering with regional statistics and personal enquiry services  

Science Conference Proceedings (OSTI)

In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose ... Keywords: authentication, privacy, smart metering

Cheng-Kang Chu; Joseph K. Liu; Jun Wen Wong; Yunlei Zhao; Jianying Zhou

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

"I know what you did last summer": query logs and user privacy  

Science Conference Proceedings (OSTI)

We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers to map a sequence of queries into the gender, age, and location of the user ... Keywords: k-anonymity, privacy, query log analysis

Rosie Jones; Ravi Kumar; Bo Pang; Andrew Tomkins

2007-11-01T23:59:59.000Z

302

"Don't trust anyone": Privacy protection for location-based services  

Science Conference Proceedings (OSTI)

We present a decentralized approach that exploits the capability of mobile devices to form wireless personal ad-hoc networks in order to protect the privacy of users who access location-based services. The novelty of our approach is that users do not ... Keywords: Anonymity, Location-based service, Obfuscation, Privacy, Trust

Tanzima Hashem; Lars Kulik

2011-02-01T23:59:59.000Z

303

Resuscitating privacy-preserving mobile payment with customer in complete control  

Science Conference Proceedings (OSTI)

Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads to ... Keywords: Customer centric payment model, Near field communication (NFC), Privacy, RFID, Secure mobile payment, Smartphone application

Divyan Munirathnam Konidala; Made Harta Dwijaksara; Kwangjo Kim; Dongman Lee; Byoungcheon Lee; Daeyoung Kim; Soontae Kim

2012-08-01T23:59:59.000Z

304

Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE  

E-Print Network (OSTI)

extent of the law. In addition to various laws governing your privacy, we have our own privacy policies medical treatment you have received and about payment for health care you have received. It is our policy, counterintelligence, and other national security activities. 5. Individual Rights Access. You have the right

Salama, Khaled

305

Privacy-awareness information for web forums: results from an empirical study  

Science Conference Proceedings (OSTI)

While interacting with others on the internet, users share a lot of personal data with a potentially large but "invisible" audience. An important issue is maintaining control over personal data and therefore, in the first place, users need to be aware ... Keywords: empirical study, forum, privacy, privacy awareness, social software, social web, user-centered design

Stefanie Ptzsch; Peter Wolkerstorfer; Cornelia Graf

2010-10-01T23:59:59.000Z

306

A comparative study of online privacy regulations in the U.S. and China  

Science Conference Proceedings (OSTI)

Online privacy seeks to protect the identity of individuals who use the internet to collect information or express opinions. However, given the proliferating vehicles through which one's identity can be ascertained, the question remains as to what policies ... Keywords: China, Internet, Privacy, United States

Yanfang Wu; Tuenyu Lau; David J. Atkin; Carolyn A. Lin

2011-08-01T23:59:59.000Z

307

Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent  

Science Conference Proceedings (OSTI)

This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social ... Keywords: data mining, deCODE Genetics, distributional group profiles, epidemiology, genetic exceptionalism, genomic research, informed consent, non-distributional group profiles, personal privacy, population genomics

Herman T. Tavani

2004-03-01T23:59:59.000Z

308

Legal concepts meet technology: a 50-state survey of privacy laws  

Science Conference Proceedings (OSTI)

Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of ... Keywords: data disposal, data security, personally identifying information, privacy, state law

Miriam B. Russom; Robert H. Sloan; Richard Warner

2011-12-01T23:59:59.000Z

309

My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect  

Science Conference Proceedings (OSTI)

We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness ... Keywords: facebook connect, privacy, user study

Serge Egelman

2013-04-01T23:59:59.000Z

310

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

311

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid  

E-Print Network (OSTI)

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

Shen, Xuemin "Sherman"

312

Innovative Approaches to Low Cost Module Manufacturing of String Ribbon Si PV Modules: Phase II, Annual Technical Progress Report, 1 April 2003--31 May 2004  

DOE Green Energy (OSTI)

This subcontract resulted in a number of important advances for Evergreen Solar Inc. Foremost amongst these is the production implementation of dual ribbon growth from a single crucible (Gemini) using the String Ribbon continuous ribbon technology. This project has resulted in the flattest ribbon and the highest yields and machine uptime ever seen at Evergreen Solar. This then has resulted in significantly lowered consumables costs and lower overall direct manufacturing costs. In addition, methods to control the as-grown surface of Gemini ribbon have permitted the usage of the so-called no-etch process that allows for direct transfer of as-grown ribbon to diffusion without any intermediate etching step. In-line diagnostics for Gemini were further developed--these included more accurate methods for measuring and controlling melt depth and more accurate means to measure and control ribbon thickness. Earlier in the project, the focus was on monolithic module development. With the Gemini advances described above, monolithic module work was brought to a close during this second year of the overall three year project. A significant advance in this technology was the development of a conductive adhesive in combination with Evergreen's proprietary backskin and encapsulant. 25-W size experimental monolithic modules have been tested and found to be able to withstand up to 1400 thermal cycles.

Hanoka, J. I.

2004-10-01T23:59:59.000Z

313

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

314

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

315

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval  

E-Print Network (OSTI)

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user's and the population's query distribution, and contemplated the entropy of the user's distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

Rebollo-Monedero, David; Forn, Jordi

2011-01-01T23:59:59.000Z

316

Online query answering with differential privacy: a utility-driven approach using Bayesian inference  

E-Print Network (OSTI)

Data privacy issues frequently and increasingly arise for data sharing and data analysis tasks. In this paper, we study the problem of online query answering under the rigorous differential privacy model. The existing interactive mechanisms for differential privacy can only support a limited number of queries before the accumulated cost of privacy reaches a certain bound. This limitation has greatly hindered their applicability, especially in the scenario where multiple users legitimately need to pose a large number of queries. To minimize the privacy cost and extend the life span of a system, we propose a utility-driven mechanism for online query answering using Bayesian statistical inference. The key idea is to keep track of the query history and use Bayesian inference to answer a new query using previous query answers. The Bayesian inference algorithm provides both optimal point estimation and optimal interval estimation. We formally quantify the error of the inference result to determine if it satisfies t...

Xiao, Yonghui

2012-01-01T23:59:59.000Z

317

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

318

Calcitriol Modulates the CD46 Pathway in T Cells Karoline Kickler1  

E-Print Network (OSTI)

, Jorgensen SP, Agnholt J, Kelsen J, Hvas CL, et al. (2007) 1,25- dihydroxyvitamin D3 and dexamethasone

MacDonald, Andrew

319

Order Module--DOE Order 225.1B, ACCIDENT INVESTIGATIONS  

Energy.gov (U.S. Department of Energy (DOE))

DOE O 225.1B prescribes organizational responsibilities, authorities, and requirements for conducting investigations of certain accidents occurring at DOE sites, facilities, areas, operations, and...

320

Research on stable, high-efficiency amorphous silicon multijunction modules. Semiannual subcontract report, 1 January 1992--30 June 1992  

DOE Green Energy (OSTI)

This report describes research on semiconductor and non-semiconductor materials to enhance the performance of multi-band-gap, multijunction panel with an area greater than 900 cm{sup 2} by 1992. Double-junction and triple-junction cells are mode on a Ag/ZnO back reflector deposited on stainless steel substrates. An a-SiGe alloy is used for the i-layer in the bottom and the middle cells; the top cell uses an amorphous silicon alloy. After the evaporation of an antireflection coating, silver grids and bus bars are put on the top surface and the panel is encapsulated in an ethylene vinyl acetate (EVA)/Tefzel structure to make a 1-ft{sup 2} monolithic module.

Guha, S. [United Solar Systems Corp., Troy, MI (United States)

1992-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Modul: 3 Modultitel: Forschungsmethoden 1 Epidemiologie und Demographie Modulverantwortlicher: Dr. Maren Dreier  

E-Print Network (OSTI)

LN-A 1-13998 Bachelor statt Burnout : entspannt studieren - wie geht das? / hrsg. von Rosaria Chirico-Praxis : mit Methode zu neuen Perspektiven / hrsg. von Ingeborg Sachsenmeier. Mit Beitr. von Regina Mahlmann : Schlüsselkompetenzen) 2010 LA-A 1-26182 Steht auch LSA Al-HG 118 Die Diplomarbeit / Stefan Engel ... [Hrsg

Manstein, Dietmar J.

322

Ring1B Contains a Ubiquitin-Like Docking Module for Interaction with Cbx Proteins  

Science Conference Proceedings (OSTI)

Polycomb group (PcG) proteins are a special set of repressive transcription factors involved in epigenetic modifications of chromatin. They form two functionally distinct groups of catalytically active complexes: Polycomb repressive complex 1 (PRC1) and 2 (PRC2). The PRC1 complex is an important yet poorly characterized multiprotein histone ubiquitylation machine responsible for maintaining transcriptionally silent states of genes through histone H2A K119 modification. The Ring domain containing subunits of PRC1 also have substrate-targeting domains that interact with Cbx proteins, which have been implicated in chromatin and RNA binding. In this work, we present a high resolution structure of the C-terminal domain of Ring1B, revealing a variant ubiquitin-like fold with a distinct conserved surface region. On the basis of crystal structure and mutational analysis of this domain we show that the conserved surface is responsible for interaction with Cbx members of the PRC1 and homodimer formation. These data suggest a mechanism by which Ring1B serves as an adaptor that mediates binding between the members of the PRC1 complex and the nucleosome.

Bezsonova, Irina; Walker, John R.; Bacik, John P.; Duan, Shili; Dhe-Paganon, Sirano; Arrowsmith, Cheryl H.; (Toronto)

2010-04-19T23:59:59.000Z

323

Detailed Course Module Description  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Course Module Description Course Module Description Module/Learning Objectives Level of Detail in Module by Audience Consumers Gen Ed/ Community College Trades 1. Energy Issues and Building Solutions High High High Learning Objectives: * Define terms of building science, ecological systems, economics of consumption * Relate building science perspective, ecology, social science * Explain historical energy and environmental issues related to buildings * Compare Site and source energy * Examine the health, safety and comfort issues in buildings * Examine the general context for building solutions (zero energy green home with durability as the goal) * Explain a basic overview of alternative energy (total solar flux) - do we have enough energy * Examine cash flow to homeowners

324

User Instructions for the Systems Assessment Capability, Rev. 1, Computer Codes Volume 1: Inventory, Release, and Transport Modules  

SciTech Connect

This document contains detailed user instructions for the transport codes for Rev. 1 of the System Assessment Capability.

Eslinger, Paul W.; Miley, Terri B.; Engel, David W.; Nichols, William E.; Gerhardstein, Lawrence H.; Strenge, Dennis L.; Lopresti, Charles A.; Wurstner, Signe K.

2004-09-12T23:59:59.000Z

325

Development of Automated Production Line Processes for Solar Brightfield Modules: Final Report, 1 June 2003-30 November 2007  

DOE Green Energy (OSTI)

Summary of progress by Spire Corporation under NREL's PV Manufacturing R&D Project to develop new automated systems for fabricating very large photovoltaic modules.

Nowlan, M.

2008-04-01T23:59:59.000Z

326

Module Configuration  

SciTech Connect

A stand alone battery module including: (a) a mechanical configuration; (b) a thermal management configuration; (c) an electrical connection configuration; and (d) an electronics configuration. Such a module is fully interchangeable in a battery pack assembly, mechanically, from the thermal management point of view, and electrically. With the same hardware, the module can accommodate different cell sizes and, therefore, can easily have different capacities. The module structure is designed to accommodate the electronics monitoring, protection, and printed wiring assembly boards (PWAs), as well as to allow airflow through the module. A plurality of modules may easily be connected together to form a battery pack. The parts of the module are designed to facilitate their manufacture and assembly.

Oweis, Salah (Ellicott City, MD); D' Ussel, Louis (Bordeaux, FR); Chagnon, Guy (Cockeysville, MD); Zuhowski, Michael (Annapolis, MD); Sack, Tim (Cockeysville, MD); Laucournet, Gaullume (Paris, FR); Jackson, Edward J. (Taneytown, MD)

2002-06-04T23:59:59.000Z

327

Phosphorylation of HOX11/TLX1 on Threonine-247 during mitosis modulates expression of cyclin B1  

E-Print Network (OSTI)

have side chains with amine groups this change likely does not affect DNA interac- tions [20]. In contrast, Thr has both methyl and hydro- xyl groups in its side chain while Ile contains only a hydrophobic methyl group and this amino acid change... CDP/Cux [39], hSIX1 [40], the POU transcrip- tion factors Oct-1, GHF-1 and Pit-1[41-43], the NK-like homeodomain proteins, Csx/Nkx2.5 [44], and PRH/Hex [45] and the clustered homeobox genes HOXA9 [46], HOXA10 [47-50], HOXB6 [51] and HOXB7 [52]. In some...

Chen, Edwin; Huang, Xiaoyong; Zheng, Yanzhen; Li, You-Jun; Chesney, Alden; Ben-David, Yaacov; Yang, Eric; Hough, Margaret R

2010-09-16T23:59:59.000Z

328

Privacy Act Exemptions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

exemptions: Section 552a(j)(1) which covers records maintained by the Central Intelligence Agency, Section 552a(j)(2) which covers records relating to law enforcement...

329

location privacy based on trusted computing and secure logging  

E-Print Network (OSTI)

Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a persons location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operators customers in a privacy-preserving way. So far, this assurance has been based on a legal contract between the operator and the provider. However, there has been no technical mechanism that lets the operator verify whether the provider adheres to the privacy policy outlined in the contract. We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks.

Urs Hengartner

2008-01-01T23:59:59.000Z

330

Variation in the human Cannabinoid Receptor (CNR1) gene modulates gaze duration for happy faces  

E-Print Network (OSTI)

included only if all four grandparents were of Caucasian European ancestry to avoid genetic heterogeneity between different populations. Participants were also excluded if they reported any history of psychiatric diag- noses or regular drug abuse. They were... :591-617. 37. Chakrabarti B, Bullmore E, Baron-Cohen S: Empathizing with basic emotions: common and discrete neural substrates. Soc Neurosci 2006, 1:364-384. 38. Golan O, Baron-Cohen S, Hill J: The Cambridge Mindreading (CAM) Face- Voice Battery: testing...

Chakrabarti, Bhismadev; Baron-Cohen, Simon

2011-06-29T23:59:59.000Z

331

Binding Preferences, Surface Attachment, Diffusivity, and Orientation of a Family 1 Carbohydrate-Binding Module on Cellulose  

DOE Green Energy (OSTI)

Cellulase enzymes often contain carbohydrate-binding modules (CBMs) for binding to cellulose. The mechanisms by which CBMs recognize specific surfaces of cellulose and aid in deconstruction are essential to understand cellulase action. The Family 1 CBM from the Trichoderma reesei Family 7 cellobiohydrolase, Cel7A, is known to selectively bind to hydrophobic surfaces of native cellulose. It is most commonly suggested that three aromatic residues identify the planar binding face of this CBM, but several recent studies have challenged this hypothesis. Here, we use molecular simulation to study the CBM binding orientation and affinity on hydrophilic and hydrophobic cellulose surfaces. Roughly 43 {mu}s of molecular dynamics simulations were conducted, which enables statistically significant observations. We quantify the fractions of the CBMs that detach from crystal surfaces or diffuse to other surfaces, the diffusivity along the hydrophobic surface, and the overall orientation of the CBM on both hydrophobic and hydrophilic faces. The simulations demonstrate that there is a thermodynamic driving force for the Cel7A CBM to bind preferentially to the hydrophobic surface of cellulose relative to hydrophilic surfaces. In addition, the simulations demonstrate that the CBM can diffuse from hydrophilic surfaces to the hydrophobic surface, whereas the reverse transition is not observed. Lastly, our simulations suggest that the flat faces of Family 1 CBMs are the preferred binding surfaces. These results enhance our understanding of how Family 1 CBMs interact with and recognize specific cellulose surfaces and provide insights into the initial events of cellulase adsorption and diffusion on cellulose.

Nimlos, M. R.; Beckham, G. T.; Matthews, J. F.; Bu, L.; Himmel, M. E.; Crowley, M. F.

2012-06-08T23:59:59.000Z

332

A 1.5 A resolution X-ray structure of the catalytic module of Caldicellulosiruptor bescii family 3 pectate lyase  

NLE Websites -- All DOE Office Websites (Extended Search)

1498 1498 doi:10.1107/S1744309111038449 Acta Cryst. (2011). F67, 1498-1500 Acta Crystallographica Section F Structural Biology and Crystallization Communications ISSN 1744-3091 A 1.5 A ˚ resolution X-ray structure of the catalytic module of Caldicellulosiruptor bescii family 3 pectate lyase Markus Alahuhta, a Puja Chandrayan, b Irina Kataeva, b Michael W. W. Adams, b Michael E. Himmel a and Vladimir V. Lunin a * a BioSciences Center, National Renewable Energy Laboratory, 1617 Cole Boulevard, Golden, CO 80401, USA, and b Department of Biochemistry and Molecular Biology, University of Georgia, Athens, GA 30602-7229, USA Correspondence e-mail: vladimir.lunin@nrel.gov Received 17 August 2011 Accepted 19 September 2011 PDB Reference: family 3 pectate lyase catalytic module, 3t9g. A 1.5 A ˚ resolution X-ray structure of the catalytic module of Caldicellulosi- ruptor bescii

333

Development of Automated Production Line Processes for Solar Brightfield Modules: Annual Technical Progress Report, 1 January 2003 -- 30 June 2004  

DOE Green Energy (OSTI)

This report describes how Spire Corporation is addressing the PV Manufacturing R&D project goals of improving photovoltaic (PV) manufacturing processes and products while reducing costs and providing a technology foundation that supports significant manufacturing scale-up. To accomplish this, we are focusing our efforts on the design of a large-area utility-scale module and the development of the necessary manufacturing techniques and equipment to manufacture such a module in a high-volume production environment. A three-phase program is under way for developing and demonstrating new automated systems for fabricating very large PV modules ideal for use in multi-megawatt grid-connected applications. We designed a large-area 800 W module and we are developing associated module production equipment that will minimize the total installed system cost for utility-scale PV arrays. Unique features of the module design include a cantilevered glass superstrate to reduce the glass thickness a nd internally laminated bypass diodes that simplify internal busing and junction-box designs. Other program activities include the development of automation for solar cell string inspections, string busing, materials lay-up, and lamination; enhancements to the lamination process; and performance testing of large-area modules.

Nowlan, M. J.; Murach, J. M.; Sutherland, S. F.; Miller, D. C.; Moore, S. B.; Hogan, S. J.

2005-06-01T23:59:59.000Z

334

OSTIblog Online Privacy Policy | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Online Privacy Policy Online Privacy Policy We at OSTI.gov are committed to protecting the privacy and security of your visits to this Website. Outlined below is our online privacy policy. If you have questions about this policy, please let us know. Collection and disclosure of information: To ensure we are able to communicate effectively with visitors to our web site, we collect some information that can be directly associated with a specific person. We call this "Personal Information," and it includes, by way of illustration, names, addresses, telephone numbers and e-mail addresses. We collect Personal Information from eligible individuals who affirmatively request to receive e-mail or other services from us. We collect this Personal Information in order to provide these eligible individuals with

335

The Role of Narcissism on Concerns for SNS Privacy: Vulnerable Narcissism in Threatening Situations.  

E-Print Network (OSTI)

??This study aims to identify psychological factors that predict ones likelihood to disengage with privacy-threatening activities on Social Networking Sites (SNS). Particularly, it pays special (more)

Kwolek, Elizabeth A.

2012-01-01T23:59:59.000Z

336

Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data  

Science Conference Proceedings (OSTI)

Laplace noise addition is often advanced as an approach for satisfying differential privacy. There have been several illustrations of the application of Laplace noise addition for count data, but no evaluation of its performance for numeric data. In ...

Rathindra Sarathy; Krishnamurty Muralidhar

2011-04-01T23:59:59.000Z

337

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

338

Proceedings of the 3rd symposium on Usable privacy and security  

Science Conference Proceedings (OSTI)

Welcome to the Third Symposium On Usable Privacy and Security! This year's program features 13 technical papers, a workshop, two tutorials, 16 posters, a panel, three discussion sessions, and an invited talk. Continuing the tradition of interesting SOUPS ...

Lorrie Faith Cranor

2007-07-01T23:59:59.000Z

339

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

340

Assessment of Technology Used to Protect the Privacy of Energy Usage Data  

Science Conference Proceedings (OSTI)

This EPRI Technical Update Report discusses proposed privacy enhancing technologies (PETs) that are applicable to advanced metering infrastructure (AMI) deployments.BackgroundNew laws are beginning to come into effect in California and Colorado in the United States and in European countries such as Germany. Ohio and the European Commission are contemplating additional laws.Potential privacy problems arise from the granularity and detail of ...

2012-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

342

Structure and Function of the Clostridium thermocellum Cellobiohydrolase A X1-Module Repeat: Enhancement Through Stabilization of the CbhA Complex  

DOE Green Energy (OSTI)

The efficient deconstruction of lignocellulosic biomass remains a significant barrier to the commercialization of biofuels. Whereas most commercial plant cell-wall-degrading enzyme preparations used today are derived from fungi, the cellulosomal enzyme system from Clostridium thermocellum is an equally effective catalyst, yet of considerably different structure. A key difference between fungal enzyme systems and cellulosomal enzyme systems is that cellulosomal enzyme systems utilize self-assembled scaffolded multimodule enzymes to deconstruct biomass. Here, the possible function of the X1 modules in the complex multimodular enzyme system cellobiohydrolase A (CbhA) from C. thermocellum is explored. The crystal structures of the two X1 modules from C. thermocellum CbhA have been solved individually and together as one construct. The role that calcium may play in the stability of the X1 modules has also been investigated, as well as the possibility that they interact with each other. Furthermore, the results show that whereas the X1 modules do not seem to act as cellulose disruptors, they do aid in the thermostability of the CbhA complex, effectively allowing it to deconstruct cellulose at a higher temperature.

Brunecky, R.; Alahuhta, M.; Bomble, Y. J.; Xu, Q.; Baker, J. O.; Ding, S. Y.; Himmel, M. E.; Lunin, V. V.

2012-03-01T23:59:59.000Z

343

Industrial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

This page intentionally left blank This page intentionally left blank 51 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2011 Industrial Demand Module The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and feedstocks) for 15 manufacturing and 6 non-manufacturing industries. The manufacturing industries are further subdivided into the energy- intensive manufacturing industries and nonenergy-intensive manufacturing industries (Table 6.1). The manufacturing industries are modeled through the use of a detailed process-flow or end-use accounting procedure, whereas the non- manufacturing industries are modeled with substantially less detail. The petroleum refining industry is not included in the Industrial Module, as it is simulated separately in the Petroleum Market Module of NEMS. The Industrial Module calculates

344

Industrial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

2 2 Industrial Demand Module The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and feedstocks) for 15 manufacturing and 6 non-manufacturing industries. The manufacturing industries are further subdivided into the energy- intensive manufacturing industries and non-energy-intensive manufacturing industries (Table 6.1). The manufacturing industries are modeled through the use of a detailed process-flow or end-use accounting procedure, whereas the non- manufacturing industries are modeled with substantially less detail. The petroleum refining industry is not included in the Industrial Demand Module, as it is simulated separately in the Petroleum Market Module of NEMS. The Industrial Demand Module calculates energy consumption for the four Census Regions (see Figure 5) and disaggregates the energy consumption

345

Research on stable, high-efficiency amorphous silicon multijunction modules. Final subcontract report, 1 January 1991--31 August 1994  

DOE Green Energy (OSTI)

The principal objective of this program is to conduct research on semiconductor materials and non-semiconductor materials to enhance the performance of multibandgap, multijunction, large-area amorphous silicon-based alloy modules. The goal for this program is to demonstrate stabilized module efficiency of 12% for multijunction modules of area greater than 900 cm{sup 2}. Double-junction and triple-junction cells are made on Ag/ZnO back reflector deposited on stainless steel substrates. The top cell uses a-Si alloy; a-SiGe alloy is used for the i layer in the middle and the bottom cells. After evaporation of antireflection coating, silver grids and bus bars are put on the top surface, and the panel is encapsulated in an ethylene vinyl acetate (EVA)/Tefzel structure to make a one-square-foot monolithic module.

Guha, S. [United Solar Systems Corp., Troy, MI (United States)

1994-10-01T23:59:59.000Z

346

Process development for automated solar cell and module production. Task 4: automated array assembly. Quarterly report No. 1  

DOE Green Energy (OSTI)

The objective of this program is to determine the state-of-the-art and to develop some of the technology required to allow for large volume and low cost terrestrial solar panel production. The baseline production facility being studied would provide for production of 200 megawatts of solar panels per year from an input commodity as sawn Czochralski wafers. Initial analysis of available automation equipment applicable to the 1986 goals shows that most of the equipment will have to be of special design. The currently available equipment is designed for the semiconductor industry where process volumes are low. Maximum speeds are of the range of 100 to 200 wafers per hour. Using special equipment it appears feasible to produce the solar cells with 6 to 8 parallel production lines operating three shifts per day, seven days per week and to produce the encapsulated modules with 1 to 3 parallel production lines. Preliminary costs analyses show promise for reaching the 1986 price goals assuming a SAMICS wafer price of $0.28/wafer (1986 dollars). Initial work has been done to study the applicability of a plasma process to perform back etch of the cells. This area shows promise for eliminating wet chemical etching procedures with attendant rinse and dry equipment and time required.

Witham, C.R.

1978-04-18T23:59:59.000Z

347

Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience  

E-Print Network (OSTI)

expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistance related to consumer tracking and profiling as well as problems related to government tracking, criminal or terrorist abuse etc. Multiple conferences warn that RFID take-up is likely dependant on solving the privacy and security problems early. These concerns are not adequately addressed by current technology and legislation. In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. The lifecycle model is analysed in order to identify potential threats to the privacy of consumers and define a threat model. We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value from utilising the potential of RFID. We propose that securing RFIDs will require a physical redesign of RFIDs but that this can be done without leaving security and privacy issues to consent or regulation.

Stephan J. Engberg; Morten B. Harning; Christian Damsgaard Jensen

2004-01-01T23:59:59.000Z

348

Microsoft Word - DOE comments privacy - 7-6 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY In the Matter of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ) ) ) ) ) ) ) COMMENTS OF VERIZON AND VERIZON WIRELESS The development and deployment of smart grid technology hold tremendous promise towards improving the efficiency and reliability of our nation's energy systems and empowering consumers to make better decisions about the use of electricity. Because effective communications networks will be central to the success of smart grid technology, Verizon is working closely with utilities, the developers of energy management systems, and others to use its extensive wireline and wireless broadband networks and related expertise to quickly and efficiently realize the promise of smart grid

349

Research on stable, high efficiency amorphous silicon multijunction modules. Semiannual technical progress report, 1 May 1991--31 October 1991  

DOE Green Energy (OSTI)

Improvements towards a goal of a 12.5% initial triple-junction module efficiency require the use of a wide gap top-layer for improved open circuit voltage, higher transmission from the transparent front contact and more highly transmitting doped layers. To address the first issue, there has been continued development of a-SiC:H with the utilization of several novel feedstocks to control the atomic structure of the solid. These films have transport properties superior to the best results reported for a-SiC:H. Preliminary results with devices exhibits a stability comparable to a-Si:H, while previous results with a-SiC:H have generally shown for higher rates of degradation. Module fabrication has been refined to the extent that comparable module and small area device efficiencies are readily obtained. Despite the high initial efficiencies (9%--10%) obtained in 935 cm{sup 2} modules employing devices with 4000{Angstrom} thick middle junctions, higher than expected rates of degradation were found. The cause of the anomalous degradation was traced to shunts present in the device arising from defects in the tin oxide coating. NREL degradation results of triple-junction modules showed stabilized performance of the initial efficiency for modules prepared during the period in which shunts were a problem. 20 refs.

Catalano, A.; Arya, R.R.; Bennett, M.; Chen, L.; D`Aiello, R.; Fieselmann, B.; Li, Y.; Newton, J.; Podlesny, R.; Wiedeman, S.; Yang, L. [Solarex Corp., Newtown, PA (United States). Thin Film Div.

1992-02-01T23:59:59.000Z

350

Technology support for high-throughput processing of thin-film CdTe PV modules: Annual technical report, Phase 1, 1 April 1998--31 March 1999  

DOE Green Energy (OSTI)

This report describes work performed by First Solar, L.L.C., during Phase 1 of this 3-year subcontract. The research effort of this subcontract is divided into four areas: (1) process and equipment development, (2) efficiency improvement, (3) characterization and analysis, and (4) environmental, health, and safety. As part of the process development effort, the output of the pilot-production facility was increased. More than 6,200 8-ft{sup 2} CdS/CdTe plates were produced during Phase 1--more than double the total number produced prior to Phase 1. This increase in pilot-production rate was accomplished without a loss in the PV conversion efficiency: the average total-area AM1.5 efficiency of sub-modules produced during the reporting period was 6.4%. Several measurement techniques, such as large-area measurement of CdS thickness, were developed to aid process improvement, and the vapor-transport deposition method was refined. CdTe thickness uniformity and reproducibility were improved. From a population of more than 1,100 plates, the mean standard deviation within a plate was 7.3% and the standard deviation of individual-plate averages was 6.8%. As part of the efficiency-improvement task, research was done on devices with thin-CdS and buffer layers. A cell with 13.9% efficiency was produced on a high-quality substrate, and higher than 12% efficiency was achieved with a cell with no CdS layer. A number of experiments were performed as part of the characterization and analysis task. The temperature dependence of CdTe modules was investigated; the power output was found to be relatively insensitive (<5%) to temperature in the 25 to 50 C range. As part of the characterization and analysis task, considerable effort was also given to reliability verification and improvement. The most carefully monitored array, located at the NREL, was found to have unchanged power output within the margin of error of measurement (5%) after 5 years in the field. The first round of National CdTe Team stability tests were concluded. One back-contact formulation resulted in cells that increased in efficiency as a result of 9,700 hours of light soaking. As part of the environmental, health, and safety task, an emissions survey was performed for the pilot-production facility. For production of 360 modules/day, it was predicted that the cadmium emissions would be only 0.015% of the level that would require any permitting; however, methanol emissions may require permitting if anticipated process changes are not implemented. Process improvements in edge delete, CdS material preparation, waste compaction, CdCl{sub 2}-vapor collection, and wastewater treatment were made, resulting in reduced costs, reduced emissions, and improved operator safety.

Rose, D.H.; Powell, R.C.; Grecu, D.; Jayamaha, U.; Hanak, J.J.; Bohland, J.; Smigielski, K.; Dorer, G.L.

1999-10-25T23:59:59.000Z

351

Thermal Modeling of NUHOMS HSM-15 and HSM-1 Storage Modules at Calvert Cliffs Nuclear Power Station ISFSI  

Science Conference Proceedings (OSTI)

As part of the Used Fuel Disposition Campaign of the Department of Energy (DOE), visual inspections and temperature measurements were performed on two storage modules in the Calvert Cliffs Nuclear Power Stations Independent Spent Fuel Storage Installation (ISFSI). Detailed thermal models models were developed to obtain realistic temperature predictions for actual storage systems, in contrast to conservative and bounding design basis calculations.

Suffield, Sarah R.; Fort, James A.; Adkins, Harold E.; Cuta, Judith M.; Collins, Brian A.; Siciliano, Edward R.

2012-10-01T23:59:59.000Z

352

SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Functional modules F1-F8  

SciTech Connect

This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U.S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume consists of the section of the manual dealing with eight of the functional modules in the code. Those are: BONAMI - resonance self-shielding by the Bondarenko method; NITAWL-II - SCALE system module for performing resonance shielding and working library production; XSDRNPM - a one-dimensional discrete-ordinates code for transport analysis; XSDOSE - a module for calculating fluxes and dose rates at points outside a shield; KENO IV/S - an improved monte carlo criticality program; COUPLE; ORIGEN-S - SCALE system module to calculate fuel depletion, actinide transmutation, fission product buildup and decay, and associated radiation source terms; ICE.

NONE

1997-03-01T23:59:59.000Z

353

DOE Order Self Study Modules - DOE O 440.1B, Worker Protection Management for DOE (Including the National Nuclear Security Administration) Federal Employees  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.1B 0.1B WORKER PROTECTION PROGRAM FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES DOE O 440.1B Familiar Level June 2011 1 DOE O 440.1B WORKER PROTECTION MANAGEMENT FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the objectives of DOE O 440.1B? 2. What are the requirements that DOE elements must meet according to DOE O 440.1B? 3. What is the hazard prevention/abatement process that must be implemented according to DOE O 440.1B? 4. What are three responsibilities assigned by DOE O 440.1B for heads of field elements?

354

Renewable Fuels Module This  

U.S. Energy Information Administration (EIA) Indexed Site

Fuels Module Fuels Module This page inTenTionally lefT blank 175 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2013 Renewable Fuels Module The NEMS Renewable Fuels Module (RFM) provides natural resources supply and technology input information for projections of new central-station U.S. electricity generating capacity using renewable energy resources. The RFM has seven submodules representing various renewable energy sources: biomass, geothermal, conventional hydroelectricity, landfill gas, solar thermal, solar photovoltaics, and wind [1]. Some renewables, such as landfill gas (LFG) from municipal solid waste (MSW) and other biomass materials, are fuels in the conventional sense of the word, while others, such as water, wind, and solar radiation, are energy sources that do not involve

355

DOE Order Self Study Modules - DOE O 460.1C Packaging and Transportation Safety and DOE O 460.2A Departmental Materials Transportation and Packaging Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60.1C 60.1C PACKAGING AND TRANSPORTATION SAFETY DOE O 460.2A DEPARTMENTAL MATERIALS TRANSPORTATION AND PACKAGING MANAGEMENT DOE O 460.1C and 460.2A Familiar Level June 2011 1 DOE O 460.1C PACKAGING AND TRANSPORTATION SAFETY DOE O 460.2A DEPARTMENTAL MATERIALS TRANSPORTATION AND PACKAGING MANAGEMENT FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources, you will be able to perform the following: 1. What are the objectives of U.S. Department of Energy (DOE) O 460.1C? 2. What is the DOE/National Nuclear Security Administration (NNSA) exemption process in DOE O 460.1C? 3. What are the onsite safety requirements specified by DOE O 460.1C? 4. What are the objectives of DOE O 460.2A?

356

Initial test results from the RedFlow 5 kW, 10 kWh zinc-bromide module, phase 1.  

DOE Green Energy (OSTI)

In this paper the performance results of the RedFlow zinc-bromide module (ZBM) Gen 2.0 are reported for Phase 1 of testing, which includes initial characterization of the module. This included physical measurement, efficiency as a function of charge and discharge rates, efficiency as a function of maximum charge capacity, duration of maximum power supplied, and limited cycling with skipped strip cycles. The goal of this first phase of testing was to verify manufacturer specifications of the zinc-bromide flow battery. Initial characterization tests have shown that the ZBM meets the manufacturer's specifications. Further testing, including testing as a function of temperature and life cycle testing, will be carried out during Phase 2 of the testing, and these results will be issued in the final report, after Phase 2 testing has concluded.

Ferreira, Summer Rhodes; Rose, David Martin

2012-02-01T23:59:59.000Z

357

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor Electric Delivery Company LLC (Oncor) is a regulated electric transmission and distribution utility that serves the north-central, eastern and western parts of Texas, including the cities of Dallas and Fort Worth. Oncor operates the largest electric transmission and distribution system in Texas, delivering power to over 3 million homes and businesses and operating approximately 117,000 miles of distribution and transmission lines in Texas. Oncor operates in a unique market in which only competitive Retail Electric Providers (REPs) who are not utilities sell electricity to

358

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor  

NLE Websites -- All DOE Office Websites (Extended Search)

Use, and Privacy- Comments of Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor Electric Delivery Company LLC (Oncor) is a regulated electric transmission and distribution utility that serves the north-central, eastern and western parts of Texas, including the cities of Dallas and Fort Worth. Oncor operates the largest electric transmission and distribution system in Texas, delivering power to over 3 million homes and businesses and operating approximately 117,000 miles of distribution and transmission lines in Texas. Oncor operates in a unique market in which only competitive Retail Electric Providers (REPs) who are not utilities sell electricity to end-use consumers, and the transmission and distribution utilities (who are

359

Understanding Motivations for Facebook Use: Usage Metrics, Network Structure, and Privacy  

E-Print Network (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated the extent to which these motives can be predicted through usage and network metrics collected automatically via the Facebook API. In total, 11 Facebook usage metrics and eight personal network metrics served as predictors. Results showed that all three variable types in this expanded U&G frame of analysis (covering social antecedents, usage metrics, and personal network metrics) effectively predicted motives and highlighted interesting behaviors. To further illustrate the power of this framework, the intricate nature of privacy in social media was explored and relationships drawn between privacy attitudes (and acts) and measures of use and network structure. Author Keywords Uses and gratifications; social network sites; social networks; Facebook; privacy; computer-mediated communication.

Tasos Spiliotopoulos; Ian Oakley

2013-01-01T23:59:59.000Z

360

Microsoft Word - UTC Comments DOE RFI Data Access Privacy Final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Before the Before the Department of Energy Washington, D.C. 20585 In the Matter of Implementing the National Broadband Plan by Empowering Consumers and The Smart Grid: Data Access, Third Party Use and Privacy ) ) ) ) NBP RFI: Data Access, Third Party Use and Privacy COMMENTS OF UTILITIES TELECOM COUNCIL Michael Oldak, Vice President & General Counsel Brett Kilbourne, Director of Regulatory Service & Associate Counsel Utilities Telecom Council 1901 Pennsylvania Avenue, NW Fifth Floor Washington, DC 20006 202-872-0030 July 12, 2010 TABLE OF CONTENTS Introduction .................................................................................................................................... 2 Questions....................................................................................................................................... 3

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Structure Determination of Two Modulated g-Brass Structures in the Zn-Pd System through a (3+1)-Dimensional Space Description  

Science Conference Proceedings (OSTI)

The structure determination of two composite compounds in the Zn-Pd system with close relationships to the cubic g-brass structure Zn11-dPd2+d is reported. Their structures have been solved from single crystal X-ray diffraction data within a (3 + 1)-dimensional [(3 + 1)D] formalism. Zn75.7(7)Pd24.3 and Zn78.8(7)Pd21.2 crystallize with orthorhombic symmetry, super space group Xmmm(00g)0s0 X=[(1/2,1/2,0,0);(0,1/2,1/2,1/2); (1/2,0,1/2,1/2)], with the following lattice parameters, respectively: as = 12.929(3) , bs = 9.112(4) , cs = 2.5631(7) , q = 8/13 c* and Vs = 302.1(3) A3 and as = 12.909(3) , bs = 9.115(3) , cs = 2.6052(6) , q = 11/18 c* and Vs = 306.4(2) A3. Their structures may be considered as commensurate because they can be refined in the conventional 3D space groups (Cmcm and Cmce, respectively) using super cells, but they also refined within the (3 + 1)D formalism to residual factors R = 3.22% for 139 parameters and 1184 independent reflections for Zn75.7(7)Pd24.3 and R = 3.46% for 197 parameters and 1804 independent reflections for Zn78.8(7)Pd21.2. The use of the (3 + 1)D formalism improves the results of the refinement and leads to a better understanding of the complexity of the atomic arrangement through the various modulations (occupation waves and displacive waves). Our refinements emphasize a unique Pd/Zn occupation modulation at the center of the icosahedra which is correlated with the distortion of the sites.

Gourdon, Olivier [ORNL; Izaola, Zunbeltz [Hahn-Meitner Institut, Berlin, Germany; Elcoro, Luis [University of Pais Vasco; Petricek, Vaclav [Institute of Physics, Czech Republic; Miller, Gordon J. [Iowa State University

2009-01-01T23:59:59.000Z

362

New concept for coal wettability evaluation and modulation. Technical progress report for the project, July 1, 1995--September 30, 1995  

SciTech Connect

This project is concerned with the new concept for coal surface wettability and floatability evaluation and modulation. the objective of the work is the fundamental surface chemistry features about the evaluation of the surface wettability and floatability of coal and pyrite, and establish a new separation strategy which could contribute to advanced coal-cleaning for premium fuel application. In this quarter, the mini-cell flotation tests are conducted to study kinetic floatability and kinetic collectability of coal and pyrite. The kinetic floatability of the five samples have been tested with methanol, butanol, and hexanol as collector.

Hu, W.

1995-12-31T23:59:59.000Z

363

Direct evidence of the fermi-energy-dependent formation of Mn interstitials in modulation doped Ga1-yAlyAs/Ga1-xMnxAs/Ga1-yAlyAs heterostructures  

SciTech Connect

Using ion channeling techniques, we investigate the lattice locations of Mn in Ga{sub 1-x}Mn{sub x}As quantum wells between Be-doped Ga{sub 1-y}Al{sub y}As barriers. The earlier results showed that the Curie temperature T{sub C} depends on the growth sequence of the epitaxial layers. A lower T{sub C} was found in heterostructures in which the Ga{sub 1-x}Mn{sub x}As layer is grown after the modulation-doped barrier. Here we provide direct evidence that this reduction in T{sub C} is directly correlated with an increased formation of magnetically inactive Mn interstitials. The formation of interstitials is induced by a shift of the Fermi energy as a result of the transfer of holes from the barrier to the quantum well during the growth.

Yu, K.M.; Walukiewicz, W.; Wojtowicz, T.; Lim, W.L.; Liu, X.; Dobrowolska, M.; Furdyna, J.K.

2004-01-30T23:59:59.000Z

364

Module experimental process system development unit (MEPSDU). Quarterly report No. 4, September 1, 1981-November 30, 1981  

SciTech Connect

The purpose of this program is to demonstrate the technical readiness of a cost-effective process sequence that has the potential for the production of flat plate photovoltaic modules which meet the price goal in 1986 of 70 cents or less per Watt peak. The major accomplishments of the program to date have been the development of an improved AR coating technique, the development of sand blast back clean-up to reduce clean up costs and to allow much of the Al paste to serve as a back conductor, and finally the development of wave soldering for use with solar cells. During the quarter, program efforts included: suspension of all module processing efforts per JPL's orders; redefining the program budget, schedule and program plan to reflect the reduced funding level and scope of work; processing of control and test material via a controlled process sequence to determine the material capability; experimentation with diffusion barrier materials; cell processing to evaluate different process steps; preparation of a cell and minimodule test plan; and collecting data for preliminary Samics cost analysis.

Not Available

1981-01-01T23:59:59.000Z

365

Cast polycrystalline silicon photovoltaic module manufacturing technology improvements. Annual subcontract report, 1 January 1996--31 December 1996  

DOE Green Energy (OSTI)

This report describes Solarex`s accomplishments during this phase of the Photovoltaic Manufacturing Technology (PVMaT) program. During this reporting period, Solarex researchers converted 79% of production casting stations to increase ingot size and operated them at equivalent yields and cell efficiencies; doubled the casting capacity at 20% the cost of buying new equipment to achieve the same capacity increase; operated the wire saws in a production mode with higher yields and lower costs than achieved on the ID saws; purchased additional wire saws; developed and qualified a new wire-guide coating material that doubles the wire-guide lifetime and produces significantly less scatter in wafer thickness; ran an Al paste back-surface-field process on 25% of all cells in manufacturing; completed environmental qualification of modules using cells produced by an all-print metallization process; qualified a vendor-supplied Tedlar/ethylene vinyl acetate (EVA) laminate to replace the combination of separate sheets of EVA and Tedlar backsheet; substituted RTV adhesive for the 3M Very High Bond tape after several field problems with the tape; demonstrated the operation of a prototype unit to trim/lead attach/test modules; demonstrated the use of light soldering for solar cells; demonstrated the operation of a wafer pull-down system for cassetting wet wafers; and presented three PVMaT-related papers at the 25th IEEE Photovoltaic Specialists Conference.

Wohlgemuth, J. [Solarex Corp., Frederick, MD (United States)

1997-10-01T23:59:59.000Z

366

Selling power back to the grid in a secure and privacy-preserving manner  

Science Conference Proceedings (OSTI)

Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling ... Keywords: anonymous credential, authentication, blind signature, power selling, privacy-preservation, smart grid

Tat Wing Chim; Siu Ming Yiu; Lucas Chi Kwong Hui; Victor On Kwok Li; Tin Wing Mui; Yu Hin Tsang; Chun Kin Kwok; Kwun Yin Yu

2012-10-01T23:59:59.000Z

367

Pythia: a privacy aware, peer-to-peer network for social search  

Science Conference Proceedings (OSTI)

Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ... Keywords: peer-to-peer, privacy, question-and-answer systems, social search

Shirin Nilizadeh; Naveed Alam; Nathaniel Husted; Apu Kapadia

2011-10-01T23:59:59.000Z

368

Conflicts between privacy and property: The discourse in personal and organizational knowledge  

Science Conference Proceedings (OSTI)

The paper critically examines knowledge ownership when personal or organizational knowledge is transferred between individuals or between individuals and organizations. Employing a form of discourse analysis, we analyse the data from three complementary ... Keywords: Knowledge transfer, Organizational knowledge, Personal knowledge, Privacy rights, Property rights, Strategic knowledge

Alina Dulipovici; Richard Baskerville

2007-06-01T23:59:59.000Z

369

IPv6 stateless address autoconfiguration: balancing between security, privacy and usability  

Science Conference Proceedings (OSTI)

Included in the IPv6 suite is a method for devices to automatically configure their own addresses in a secure manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership proof necessary for an IPv6 address ... Keywords: IPv6 address autoconfiguration, IPv6 security, users' privacy

Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel

2012-10-01T23:59:59.000Z

370

Understanding motivations for facebook use: usage metrics, network structure, and privacy  

Science Conference Proceedings (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated ... Keywords: computer-mediated communication, facebook, privacy, social network sites, social networks, uses and gratifications

Tasos Spiliotopoulos; Ian Oakley

2013-04-01T23:59:59.000Z

371

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

372

Notice of Privacy Practices University of Connecticut Effective Date: April 14, 2003  

E-Print Network (OSTI)

providers of service may have different policies or notices regarding the information they maintain about this notice of our legal duties and privacy policy practices with respect to your PHI; and Follow the terms, counterintelligence, and other national security activities authorized by law. Protective Services for the President

Holsinger, Kent

373

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

374

Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data  

Science Conference Proceedings (OSTI)

Record linkage techniques have been widely used in areas such as antiterrorism, crime analysis, epidemiologic research, and database marketing. On the other hand, such techniques are also being increasingly used for identity matching that leads to the ... Keywords: data partitioning, data swapping, privacy, record linkage

Xiao-Bai Li; Sumit Sarkar

2011-12-01T23:59:59.000Z

375

Privacy-preserving screen capture: Towards closing the loop for health IT usability  

Science Conference Proceedings (OSTI)

As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically ... Keywords: Health IT, Privacy, Redaction, Security, Usability

Joseph Cooley, Sean Smith

2013-08-01T23:59:59.000Z

376

A semantic framework to protect the privacy of electronic health records with non-numerical attributes  

Science Conference Proceedings (OSTI)

Structured patient data like Electronic Health Records (EHRs) are a valuable source for clinical research. However, the sensitive nature of such information requires some anonymisation procedure to be applied before releasing the data to third parties. ... Keywords: Electronic health records, Privacy, SNOMED CT, Semantic similarity, Statistical disclosure control

Sergio MartNez; David SNchez; Aida Valls

2013-04-01T23:59:59.000Z

377

Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS  

Science Conference Proceedings (OSTI)

Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in ... Keywords: anonymity, business process, cloud privacy

Mehdi Bentounsi; Salima Benbernou; Cheikh S. Deme; Mikhail J. Atallah

2012-08-01T23:59:59.000Z

378

Adaptive information-sharing for privacy-aware mobile social networks  

Science Conference Proceedings (OSTI)

Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as their smartphones already access such information from embedded ... Keywords: decision-making, information-sharing, machine learning, privacy, user study

Igor Bilogrevic, Kvin Huguenin, Berker Agir, Murtuza Jadliwala, Jean-Pierre Hubaux

2013-09-01T23:59:59.000Z

379

Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining  

Science Conference Proceedings (OSTI)

Data-mining techniques can be used not only to study collective behavior about customers, but also to discover private information about individuals. In this study, we demonstrate that decision trees, a popular classification technique for data mining, ... Keywords: computers, data mining, databases/artificial intelligence, decision trees, entropy, privacy, probability, pruning, public sector, relative entropy, society

Xiao-Bai Li; Sumit Sarkar

2009-11-01T23:59:59.000Z

380

Third-party Apps on Facebook: Privacy and the Illusion of Control  

E-Print Network (OSTI)

Little research examines the privacy threats associated with the use of third-party apps on Facebook. To address this gap in the literature, we systematically study third-party apps ' current practices for privacy notice and consent by: i) collecting data from the 1800 most popular Facebook apps to record their data collection practices concerning users and their friends, and ii) developing our own Facebook app to conduct a number of tests to identify problems that exist in the current design of authentication dialogs for third-party apps on Facebook. To address these problems, we propose two new interface designs for third-party apps authentication dialogs to: i) increase user control of apps' data access and restrict apps ' publishing ability during the process of adding them to users profiles, and ii) alert users when their global privacy settings on Facebook are violated by apps. This research provides both conceptual and empirical insights in terms of design recommendations to address privacy concerns toward third-party apps on Facebook.

Na Wang; Heng Xu; Jens Grossklags

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A Privacy Preservation Model for Facebook-Like Social Network Systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. Due to the distributed nature of access control in Facebook-style social network systems, it is difficult for a user to anticipate the privacy consequence of such actions as modifying a privacy setting or befriending another user. This work takes a first step in addressing this challenge, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that, on the one hand, are not currently supported by Facebook, but on the other hand possess rich and natural social significance. This work thus deepens our understanding of the design space of privacy preservation mechanisms for social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

382

DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies  

Energy.gov (U.S. Department of Energy (DOE))

DOE's Office of Electricy Delivery and Energy Reliability (OE) issued a notice of an open meeting on Tuesday, February 26, 2013 (9:30 a.m. to 4:30 p.m. ET) of the smart grid data privacy multi...

383

Competitive Privacy in the Smart Grid: An Information-theoretic Approach  

E-Print Network (OSTI)

Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

384

Photovoltaic module and module arrays  

DOE Patents (OSTI)

A photovoltaic (PV) module including a PV device and a frame. The PV device has a PV laminate defining a perimeter and a major plane. The frame is assembled to and encases the laminate perimeter, and includes leading, trailing, and side frame members, and an arm that forms a support face opposite the laminate. The support face is adapted for placement against a horizontal installation surface, to support and orient the laminate in a non-parallel or tilted arrangement. Upon final assembly, the laminate and the frame combine to define a unitary structure. The frame can orient the laminate at an angle in the range of 3.degree.-7.degree. from horizontal, and can be entirely formed of a polymeric material. Optionally, the arm incorporates integral feature(s) that facilitate interconnection with corresponding features of a second, identically formed PV module.

Botkin, Jonathan (El Cerrito, CA); Graves, Simon (Berkeley, CA); Lenox, Carl J. S. (Oakland, CA); Culligan, Matthew (Berkeley, CA); Danning, Matt (Oakland, CA)

2012-07-17T23:59:59.000Z

385

New concept for coal wettability evaluation and modulation. Technical progress report, April 1, 1993--June 30, 1993  

SciTech Connect

This project is concerned with the new concept for coal surface wettability evaluation and modulation. The objective of the work is to study the fundamental surface chemistry features about the evaluation of the surface wettability of coal and pyrite and establish a new separation strategy which could contribute to the advanced coal-cleaning for premium fuel application. In the past quarter report, the capillary rise test results of three coal and mineral pyrite samples in distilled water, kerosene, and salt solution indicated that there are good agreements between the experimental observations and theoretical assumption. In this quarter, the further capillary rise tests were conducted for coal, pyrite and coal pyrite in distilled water, kerosene and benzene. The test results shown that surface wettability of coal, mineral pyrite, and coal pyrite have good correlation with the theoretical predictions.

Hu, W.

1993-09-01T23:59:59.000Z

386

New concept for coal wettability evaluation and modulation. Technical progress report, October 1, 1993--December 31, 1993  

SciTech Connect

This project is concerned concept for coal surface wettability evaluation and modulation. The objective of the work are to study the fundamental surface chemistry feature about the evaluation of the surface of coal, pyrite and coal pyrite, and also establish a new separation strategy which could contribute to the advanced coal cleaning for premium fuel application. In this quarter, the capillary rise of three coals, colorado mineral pyrite, and coal pyrite in butanol, pentanol, and butyl ether have been tested. The test results shown that the kinetic wettability of the five samples in the alcohol homolog are dependent on the carbon chain length, as the length of the carbon chain is shorter, the surface wettability is the better. Another test results shown that the kinetic wettability of coals are better than mineral pyrite and coal pyrite in the butyl ether.

Hu, Weibai

1993-12-31T23:59:59.000Z

387

Development of large-area monolithically integrated silicon-film{trademark} photovoltaic modules. Final subcontract report, May 1, 1991--December 31, 1994  

DOE Green Energy (OSTI)

The objective of this program is to develop Silicon Film{trademark} Product III into a low-cost, stable solar cell for large-scale terrestrial power applications. The Product III structure is a thin (<100 {mu}m) polycrystalline layer of silicon on a durable, insulating, ceramic substrate. The insulating substrate allows the silicon layer to be isolated and metallized to form a monolithically interconnected array of solar cells. High efficiency is achieved by the use of light trapping and passivated surfaces. This project focused on the development of five key technologies associated with the monolithic sub-module device structure: (1) development of the film deposition and growth processes; (2) development of the low-cost ceramic substrate; (3) development of a metallurgical barrier technology; (4) development of sub-element solar cell processing techniques; and (5) development of sub-module (isolation and interconnection) processes. This report covers the development approaches and results relating to these technologies. Significant progress has been made in the development of all of the related technologies. This is evidenced by the fabrication of a working 12.0 cm{sup 2} prototype sub-module consisting of 7 elements and testing with an open circuit voltage of 3.9 volts, a short circuit current of 35.2 mA and a fill factor of 63% and an overall efficiency of 7.3%. Another significant result achieved is a 13.4% (NREL verified), 1.0 cm{sup 2} solar cell fabricated from material deposited and grown on a graphite cloth substrate. The significant technological hurdle of the program was and remains the low quality of the photovoltaic layer which is caused by contamination of the photovoltaic layer from the low-cost ceramic substrate by trace impurities found in the substrate precursor materials. The ceramic substrate and metallurgical barrier are being developed specifically to solve this problem.

Hall, R.B.; Rand, J.A.; Cotter, J.E. [AstroPower, Inc., Newark, DE (United States)

1995-04-01T23:59:59.000Z

388

Photovoltaic concentrator module improvements study  

DOE Green Energy (OSTI)

This report presents results of a project to design and fabricate an improved photovoltaic concentrator module. Using previous work as a baseline, this study conducted analyses and testing to select major module components and design features. The lens parquet and concentrator solar cell were selected from the highest performing, available components. A single 185X point-focus module was fabricated by the project team and tested at Sandia. Major module characteristics include a 6 by 4 compression-molded acrylic lens parquet (0.737 m{sup 2} area), twenty-four 0.2 ohms-cm, FZ, p-Si solar cells (1.56 cm{sup 2} area) soldered to ceramic substrates and copper heat spreaders, and an aluminized steel housing with corrugated bottom. This project marked the first attempt to use prismatic covers on solar cells in a high-concentration, point-focus application. Cells with 15 percent metallization were obtained, but problems with the fabrication and placement of prismatic covers on these cells lead to the decision not to use covers in the prototype module. Cell assembly fabrication, module fabrication, and module optical design activities are presented here. Test results are also presented for bare cells, cell assemblies, and module. At operating conditions of 981 watts/m{sup 2} DNI and an estimated cell temperature of 65{degrees}C, the module demonstrated an efficiency of 13.9 percent prior to stressed environmental exposure. 12 refs., 56 figs., 7 tabs.

Levy, S.L.; Kerschen, K.A. (Black and Veatch, Kansas City, MO (United States)); Hutchison, G. (Solar Kinetics, Inc., Dallas, TX (United States)); Nowlan, M.J. (Spire Corp., Bedford, MA (United States))

1991-08-01T23:59:59.000Z

389

Application of CIS of high-efficiency PV module fabrication. Annual technical progress report, April 1, 1996--March 31, 1997  

DOE Green Energy (OSTI)

This is the Phase II Annual Technical Report of the subcontract titled {open_quotes}Application of CIS to High Efficiency PV Module fabrication.{close_quotes} The general objectives of the program are the development of a novel, non-vacuum process for CIS film deposition, optimization of the various layers forming the CIS device structure, and fabrication of high efficiency submodules. The specific goals of the project are the development of 13% efficient small area cells and 10% efficient submodules using a novel, low-cost CIS deposition approach. During this research period, the authors concentrated their efforts on three different areas of research. Within the National CIS Partnership Program, they participated in the {open_quotes}substrate/Mo interactions{close_quotes} working group and investigated issues such as Na diffusion from the soda-lime glass substrate into the Mo layers and CIS films. It was determined that the Na content within the Mo layers was not a strong function of the nature of the Mo film. However, diffusion through the Mo layers was found to be a function of the Mo film characteristics as well as a very strong function of the CIS growth process. Na was found to be on the grain boundaries in Mo and CIS layers.

Basol, B.; Kapur, V.; Leidholm, C. [International Solar Electric Technology, Inglewood, CA (United States)] [and others

1997-08-01T23:59:59.000Z

390

A Distributed k-Anonymity Protocol for Location Privacy, Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

AbstractTo benefit from a location-based service, a person must reveal her location to the service. However, knowing the persons location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the persons location such that there are at least k ? 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybodys location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A users location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybodys location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the users area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research. I.

Ge Zhong; Urs Hengartner

2008-01-01T23:59:59.000Z

391

Enhancing User Privacy in Location-based Services, Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

The ubiquity of cellphones has lead to the introduction of location-based services, which are services tailored to the current location of cellphone users. For example, a cellphone user can retrieve a list of interesting, nearby places, or parents are notified when a child (i.e., her cellphone) leaves a boundary area. Location is a sensitive piece of information, so location-based services raise privacy concerns. In this paper, we identify and address one such concern. Namely, a company providing location-based services will become aware of the location of cellphone users. Therefore, the company can, maybe inadvertently, leak this information to unauthorized entities. We study the question whether it is possible for the company to provide its services without learning the location of cellphone users. We present an architecture that provides this property and show that the architecture is powerful enough to provide various, existing location-based services. Our architecture exploits Trusted Computing and Private Information Retrieval algorithms for implementing location-based services. With the help of Trusted Computing, we ensure that a location-based service operates as expected by a cellphone user and that location information becomes inaccessible to a location-based service upon a compromise of the service. With the help of Private Information Retrieval, we avoid that a company providing a location-based service becomes indirectly aware of the location of cellphone users by observing which of its location-specific information is being accessed. We also discuss an implementation of the proposed approach and alternative design strategies. 1

Urs Hengartner

2006-01-01T23:59:59.000Z

392

A theory and toolkit for the mathematics of privacy : methods for anonymizing data while minimizing information loss  

E-Print Network (OSTI)

Privacy laws are an important facet of our society. But they can also serve as formidable barriers to medical research. The same laws that prevent casual disclosure of medical data have also made it difficult for researchers ...

Katirai, Hooman

2006-01-01T23:59:59.000Z

393

DOE Order Self Study Modules - DOE O 451.1B National Environmental Policy Act Compliance Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1.1B 1.1B NATIONAL ENVIRONMENTAL POLICY ACT COMPLIANCE PROGRAM ALBUQUERQUE OPERATIONS OFFICE Change No: 1 DOE O 451.1B Level: Familiar Date: 6/15/01 1 DOE O 451.1B NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) COMPLIANCE PROGRAM FAMILIAR LEVEL _________________________________________________________________________ OBJECTIVES Given DOE O 451.1B, you will be able to do the following: 1. List the objectives of DOE O 451.1B, National Environmental Policy Act Compliance Program. 2. State the requirements for all DOE elements specified in this Order. 3. Explain why this Order does not contain any requirements for contractors. 4. List the responsibilities associated with this Order for these positions: § Secretarial Officer and head of field organization

394

Design and application of a Health Insurance Portability and Accountability Act-compliant privacy framework for pervasive healthcare  

Science Conference Proceedings (OSTI)

With an increasing emphasis on pervasive healthcare services, providing a high degree of privacy to patients is becoming a major challenge due to: (a) an increased number of avenues, such as device, access points, switches and database; (b) ... Keywords: EHR, HIPAA, Health Insurance Portability and Accountability Act, e-health, electronic health records, electronic healthcare, electronic medical records, mobile communications, pervasive healthcare, privacy, security, wireless health

Srilaxmi Malladi; Upkar Varshney

2008-04-01T23:59:59.000Z

395

Oil and Gas Supply Module  

U.S. Energy Information Administration (EIA) Indexed Site

Oil and Gas Supply Module Oil and Gas Supply Module This page inTenTionally lefT blank 119 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2013 Oil and Gas Supply Module The NEMS Oil and Gas Supply Module (OGSM) constitutes a comprehensive framework with which to analyze crude oil and natural gas exploration and development on a regional basis (Figure 8). The OGSM is organized into 4 submodules: Onshore Lower 48 Oil and Gas Supply Submodule, Offshore Oil and Gas Supply Submodule, Oil Shale Supply Submodule[1], and Alaska Oil and Gas Supply Submodule. A detailed description of the OGSM is provided in the EIA publication, Model Documentation Report: The Oil and Gas Supply Module (OGSM), DOE/EIA-M063(2011), (Washington, DC, 2011). The OGSM provides

396

TOB Module Assembly  

NLE Websites -- All DOE Office Websites (Extended Search)

SiTracker Home Page Participating Institutions and Principal Contacts Useful Links Notes Images TOB Module Assembly and Testing Project TOB Integration Data Tracker Offline DQM LHC Fluence Calculator Total US Modules Tested Graph Total US Modules Tested Graph Total US Modules Tested Total US Modules Tested US Modules Tested Graph US Modules Tested Graph US Modules Tested US Modules Tested Rod Assembly TOB Modules on a Rod TOB Rod Insertion Installation of a TOB Rod Completed TOB Completed Tracker Outer Barrel TOB Module Assembly and Testing Project All 5208 modules of the CMS Tracker Outer Barrel were assembled and tested at two production sites in the US: the Fermi National Accelerator Laboratory and the University of California at Santa Barbara. The modules were delivered to CERN in the form of rods, with the last shipment taking

397

Oil and Gas Supply Module  

Gasoline and Diesel Fuel Update (EIA)

1 1 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2012 Oil and Gas Supply Module The NEMS Oil and Gas Supply Module (OGSM) constitutes a comprehensive framework with which to analyze crude oil and natural gas exploration and development on a regional basis (Figure 8). The OGSM is organized into 4 submodules: Onshore Lower 48 Oil and Gas Supply Submodule, Offshore Oil and Gas Supply Submodule, Oil Shale Supply Submodule[1], and Alaska Oil and Gas Supply Submodule. A detailed description of the OGSM is provided in the EIA publication, Model Documentation Report: The Oil and Gas Supply Module (OGSM), DOE/EIA-M063(2011), (Washington, DC, 2011). The OGSM provides crude oil and natural gas short-term supply parameters to both the Natural Gas Transmission and Distribution Module and the Petroleum

398

Structure and function of the Clostridium thermocellum cellobiohydrolase A X1-module repeat: enhancement through stabilization of the CbhA complex  

NLE Websites -- All DOE Office Websites (Extended Search)

292 292 doi:10.1107/S0907444912001680 Acta Cryst. (2012). D68, 292-299 Acta Crystallographica Section D Biological Crystallography ISSN 0907-4449 Structure and function of the Clostridium thermocellum cellobiohydrolase A X1-module repeat: enhancement through stabilization of the CbhA complex Roman Brunecky, Markus Alahuhta, Yannick J. Bomble, Qi Xu, John O. Baker, Shi-You Ding, Michael E. Himmel and Vladimir V. Lunin* Biosciences Center, National Renewable Energy Laboratory, 1617 Cole Boulevard, Golden, CO 80401, USA Correspondence e-mail: vladimir.lunin@nrel.gov # 2012 International Union of Crystallography Printed in Singapore - all rights reserved The efficient deconstruction of lignocellulosic biomass remains a significant barrier to the commercialization of biofuels. Whereas most commercial plant cell-wall-degrading enzyme preparations used today

399

Energy Ef?cient Hybrid Silicon Electroabsorption Modulator for 40 Gb/s, 1-Volt Uncooled Operation  

E-Print Network (OSTI)

er 10.1109/LPT.2012.2212702 1-volt operation at 25 Gb/s hasmodulator with a sub-volt drive voltage swing for 10 Gb/sto around 30 GHz and 1-volt operation at 40 Gb/s is

Tang, Yongbo; Peters, Jonathan; Bowers, John E

2012-01-01T23:59:59.000Z

400

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

402

Phosphatidylinositol (4,5)-bisphosphate (PIP2) modulation of TRPV1 and functional interactions between A' helices in the C-linkers of open CNG channels.  

E-Print Network (OSTI)

??Ion channels are membrane proteins that rapidly pass ions through their conduction pores. Ion channel gating is modulated by a variety of signaling molecules and (more)

Hua, Li, 1972-

2007-01-01T23:59:59.000Z

403

Development of Large High-Voltage PV Modules with Improved Reliability and Lower Cost: Final Subcontract Report, 1 April 2006--31 August 2007  

DOE Green Energy (OSTI)

The overall objective was to provide NREL with technical results that enhance its capability to improve PV manufacturing technology by developing a PV module with specified characteristics.

Wohlgemuth, J.

2009-05-01T23:59:59.000Z

404

Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk  

Science Conference Proceedings (OSTI)

This study integrates cognitive and affective attitudes as the primary factors of influence to formulate a Ubiquitous Computing Acceptance Model (UCAM), which is intended to predict whether potential users will accept ubiquitous computing (u-computing). ... Keywords: UCAM, behavioural intention, mobile communications, perceived ease of use, perceived risk, pervasive computing, privacy, security, trust, ubiquitous city, ubiquitous computing acceptance model, ubiquitous u-city, usefulness, user attitudes, user intentions

Dong-Hee Shin

2010-02-01T23:59:59.000Z

405

A privacy preservation model for Facebook-style social network systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and Trust Management Systems. This work takes a first step in deepening the understanding of this access control paradigm, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that are not currently supported by Facebook but possess rich and natural social significance. This work thus delineates the design space of privacy preservation mechanisms for Facebook-style social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

406

Device physics of thin-film polycrystalline cells and modules: Phase 1 annual report: February 1998--January 1999  

DOE Green Energy (OSTI)

This report describes work done by Colorado State University (CSU) during Phase 1 of this subcontract. CSU researchers continued to make basic measurements on CI(G)S and CdTe solar cells fabricated at different labs, to quantitatively deduce the loss mechanisms in these cells, and to make appropriate comparisons that illuminate where progress is being made. Cells evaluated included the new record CIGS cell, CIS cells made with and without CdS, and those made by electrodeposition and electroless growth from solution. Work on the role of impurities focused on sodium in CIS. Cells with varying amounts of sodium added during CIS deposition were fabricated at NREL using four types of substrates. The best performance was achieved with 10{sup {minus}2}--10{sup {minus}1} at% sodium, and the relative merits of proposed mechanisms for the sodium effect were compared. Researchers also worked on the construction and testing of a fine-focused laser-beam apparatus to measure local variations in polycrystalline cell performance. A 1{micro}m spot was achieved, spatial reproducibility in one and two dimensions is less than 1 {micro}m, and photocurrent is reliably measured when the 1{micro}m spot is reduced as low as 1-sun in intensity. In elevated-temperature stress tests, typical CdTe cells held at 100 C under illumination and normal resistive loads for extended periods of time were generally very stable; but those held under reverse or large forward bias and those contacted using larger amounts of copper were somewhat less stable. CdTe cell modeling produced reasonable fits to experimental data, including variations in back-contact barriers. A major challenge being addressed is the photovoltaic response of a single simple-geometry crystallite with realistic grain boundaries.

Sites, J. R.

1999-12-21T23:59:59.000Z

407

Peptide aptamers as new tools to modulate clathrin-mediated internalisation - inhibition of MT1-MMP internalisation  

E-Print Network (OSTI)

.4, 100 mM NaCl, 2 mM EDTA, 1% Triton X-100, 60 mM octyl-D-glucoside) supplemented with complete protease inhibitor cocktail (Roche Molecular Biochemical, Hert- fordshire, UK), sonicated (80 Volts for 10 seconds, Sonics and Material Inc., Suffolk, UK...

Wickramasinghe, Rochana D; Ko Ferrigno, Paul; Roghi, Christian

2010-07-23T23:59:59.000Z

408

Global Interannual Trends and Amplitude Modulations of the Sea Surface Height Anomaly from the TOPEX/Jason-1 Altimeters  

Science Conference Proceedings (OSTI)

This study uses the global Ocean Topography Experiment (TOPEX)/Jason-1 altimeters time series to estimate the 13-yr trend in sea surface height anomaly. These trends are estimated at each grid point by two methods: one fits a straight line to ...

Paulo S. Polito; Olga T. Sato

2008-06-01T23:59:59.000Z

409

Renewable Fuels Module  

Gasoline and Diesel Fuel Update (EIA)

page intentionally left blank page intentionally left blank 167 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2011 Renewable Fuels Module The NEMS Renewable Fuels Module (RFM) provides natural resources supply and technology input information for projections of new central-station U.S. electricity generating capacity using renewable energy resources. The RFM has seven submodules representing various renewable energy sources: biomass, geothermal, conventional hydroelectricity, landfill gas, solar thermal, solar photovoltaics, and wind [1]. Some renewables, such as landfill gas (LFG) from municipal solid waste (MSW) and other biomass materials, are fuels in the conventional sense of the word, while others, such as water, wind, and solar radiation, are energy sources that do not involve the

410

Flywheel Energy Storage Module  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

kWh/100 kW kWh/100 kW Flywheel Energy Storage Module * 100KWh - 1/8 cost / KWh vs. current State of the Art * Bonded Magnetic Bearings on Rim ID * No Shaft / Hub (which limits surface speed) * Flexible Motor Magnets on Rim ID * Develop Touch-down System for Earthquake Flying Rim Eliminate Shaft and Hub Levitate on Passive Magnetic Bearings Increase Rim Tip Speed Larger Diameter Thinner Rim Stores More Energy 4 X increase in Stored Energy with only 60% Increase in Weight Development of a 100 kWh/100 kW Flywheel Energy Storage Module High Speed, Low Cost, Composite Ring with Bore-Mounted Magnetics Current State of the Art Flywheel Limitations of Existing Flywheel * 15 Minutes of storage * Limited to Frequency Regulation Application * Rim Speed (Stored Energy) Limited by Hub Strain and Shaft Dynamics

411

Ballasted photovoltaic module and module arrays  

DOE Patents (OSTI)

A photovoltaic (PV) module assembly including a PV module and a ballast tray. The PV module includes a PV device and a frame. A PV laminate is assembled to the frame, and the frame includes an arm. The ballast tray is adapted for containing ballast and is removably associated with the PV module in a ballasting state where the tray is vertically under the PV laminate and vertically over the arm to impede overt displacement of the PV module. The PV module assembly can be installed to a flat commercial rooftop, with the PV module and the ballast tray both resting upon the rooftop. In some embodiments, the ballasting state includes corresponding surfaces of the arm and the tray being spaced from one another under normal (low or no wind) conditions, such that the frame is not continuously subjected to a weight of the tray.

Botkin, Jonathan (El Cerrito, CA); Graves, Simon (Berkeley, CA); Danning, Matt (Oakland, CA)

2011-11-29T23:59:59.000Z

412

NERSC Modules Software Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment » Modules Environment Environment » Modules Environment Modules Software Environment NERSC uses the module utility to manage nearly all software. There are two huge advantages of the module approach: NERSC can provide many different versions and/or installations of a single software package on a given machine, including a default version as well as several older and newer versions; and Users can easily switch to different versions or installations without having to explicitly specify different paths. With modules, the MANPATH and related environment variables are automatically managed. Users simply ``load'' and ``unload'' modules to control their environment. The module utility consists of two parts: the module command itself and the modulefiles on which it operates. Module Command

413

Hearing on Online Privacy, Social Networking, and Crime Victimization Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network servicesthey are enormously valuablebut we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

414

New concept for coal wettability evaluation and modulation. Technical progress report, July 1, 1993--September 30, 1993  

SciTech Connect

The ratio of kinetics of capillary rise test between different media is a measure of relative wettability. From table 1, 2 and 3, the Hu`s evaluation of wettability of five samples in the methanol, ethanol and propanol are shown that the kinetic wettability is dependent on the carbon homologous series of alcohol, as shorter the carbon chain of the alcohol, the better surface wettability. The Hu`s evaluation of wettability of H{sub H2O}/H{sub methanol}, H{sub H2O}/H{sub ethanol}, and H{sub H2O}/H{sub propanol} for five samples are listed respectively in table 4, 5 and 6. It indicates that in the water/methanol, water/ethanol, and water/propanol system, Upper Freeport Coal is very little hydrophilicity, or better floatability than Coal Pyrite, it also can be seen that in these system, Pittsburgh No.8 Coal have a little hydrophilicity, or better floatability than Coal pyrite, it would mean that if Methanol, Ethanol, and Propanol are used as flotation collector, coal will be selectively separated from coal pyrite. This has been verified by our investigation elsewhere. The Hu`s evaluation of wettability of H{sub methanol}/H{sub kerosene} for five samples are listed in table 7. It is very interesting to note that the five samples have more methanol-philicity than kerosene. This is very useful for flotation reagents evaluation and selection in practice. The Hu`s evaluation of wettability of H{sub ethanol}/H{sub kerosene} for five samples are listed in table 8. It is indicated that ethanol also can be used as flotation collector. The Hu`s evaluation of wettability H{sub propanol}/H{sub kerosene} for five samples are listed in table 9. It shows that the five samples have lower propanol-philicity than kerosene.

Hu, Weibai

1993-12-01T23:59:59.000Z

415

Microsoft PowerPoint - FinalModule3.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Project Scheduling 3: Project Scheduling Prepared by: Module 3 - Project Scheduling 1 Prepared by: Booz Allen Hamilton Module 3: Project Scheduling Welcome to Module 3. The objective of this module is to introduce you to Project Scheduling. The Topics that will be addressed in this Module include: * Define Planning vs. Scheduling * Define and Illustrate Basic Scheduling Concepts * Define Logic Relationships and Critical Path * Define and Illustrate Different Schedule Formats Module 3 - Project Scheduling 2 Prepared by: Booz Allen Hamilton Review of Previous Modules Let's quickly review what has been covered in the previous modules. * In Module 1 we introduced you to earned value and the requirements for properly implementing an earned value management system (EVMS). * In Module 2 we discussed

416

Microsoft PowerPoint - FinalModule8.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Reporting 8: Reporting Prepared by: Module 8 - Reporting 1 Prepared by: Booz Allen Hamilton Module 8: Government Required Reports Welcome to Module 8. The objective of this module is to introduce you to Government required reports. The Topics that will be addressed in this Module include: * Define Cost Performance Report (CPR) * Define Cost/Schedule Status Report (C/SSR) Module 8 - Reporting 2 Prepared by: Booz Allen Hamilton Review of Previous Modules In the previous seven modules, we discussed the framework needed to perform Earned Value and develop an Earned Value Management System (EVMS). * In Module 1 we introduced you to earned value and the requirements for properly implementing an earned value management system (EVMS) * In Module 2 we discussed the development of the work breakdown structure

417

Development of large-area monolithically integrated Silicon-Film{trademark} photovoltaic modules. Annual subcontract report, 1 January 1993--31 December 1993  

DOE Green Energy (OSTI)

This report describes work performed under a program to develop Silicon-Film{trademark} Product III into a low-cost, stable solar cell for large-scale terrestrial power applications. The Product III structure is a thin polycrystalline layer of silicon on a durable, insulating, ceramic) substrate. The insulating substrate allows the silicon layer to be isolated and metallized to form a monolithically interconnected array of solar cells. High efficiency is achievable with the use of light trapping and a passivated back surface. The long-term goal for the product is a 1200-cm{sup {minus}2}, 18%-efficient solar module. This report discusses material quality improvements due to the use of new metallurgical barrier technologies. The barrier is essential in preventing impurity interaction between the silicon film and the low-cost substate. Also, a new filament-based fabric substate material was investigated. Efficiencies greater than 10% were achieved on 1.0-cm{sup 2} devices made on these substrates. We also demonstrated the monolithic fabrication sequence by the fabrication of a prototype array using the device processing sequences developed during Phase 11 of this program.

Rand, J.A.; Cotter, J.E.; Ingram, A.E.; Ruffins, T.R.; Thomas, C.J.; Hall, R.B.; Barnett, A.M. [AstroPower, Inc., Newark, DE (United States)

1994-06-01T23:59:59.000Z

418

1 / 17 7/1/2007 9:57 AM UICE_EPRINT_IACR.doc UICE: A High-Performance Cryptographic Module  

E-Print Network (OSTI)

vehicle security systems, also known as immobilizers, are required due to increased vehicle theft.1 Background Due to worldwide increases in automobile theft, there is a rapidly growing demand for less in 1993 theft numbers are decreasing again [12]. A second segment needing secure transactions

419

OCR Audit Program: 2012 HIPAA Privacy and Security Audits  

Science Conference Proceedings (OSTI)

... Background Structure Audit Subject Selection ... OCR 16 Breakdown of First 20 Auditees Level 1 Entities ... enabled clinical /business work streams ...

2012-06-07T23:59:59.000Z

420

Privacy-Preserving Decision Trees over Vertically Partitioned Data  

E-Print Network (OSTI)

-08-1-0265 and award FA9550-07-1-0041 from the Air Force Office of Scientific Research, and by a Research Resources. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1

Kantarcioglu, Murat

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Advanced silicon photonic modulators  

E-Print Network (OSTI)

Various electrical and optical schemes used in Mach-Zehnder (MZ) silicon plasma dispersion effect modulators are explored. A rib waveguide reverse biased silicon diode modulator is designed, tested and found to operate at ...

Sorace, Cheryl M

2010-01-01T23:59:59.000Z

422

Modulating lignin in plants  

DOE Patents (OSTI)

Materials and methods for modulating (e.g., increasing or decreasing) lignin content in plants are disclosed. For example, nucleic acids encoding lignin-modulating polypeptides are disclosed as well as methods for using such nucleic acids to generate transgenic plants having a modulated lignin content.

Apuya, Nestor; Bobzin, Steven Craig; Okamuro, Jack; Zhang, Ke

2013-01-29T23:59:59.000Z

423

Photovoltaic manufacturing cost and throughput improvements for thin-film CIGS-based modules: Phase 1 technical report, July 1998--July 1999  

DOE Green Energy (OSTI)

The primary objectives of the Global Solar Energy (GSE) Photovoltaic Manufacturing Technology (PVMaT) subcontract are directed toward reducing cost and expanding the production rate of thin-film CuInGaSe{sub 2} (CIGS)-based PV modules on flexible substrates. Improvements will be implemented in monolithic integration, CIGS deposition, contact deposition, and in-situ CIGS control and monitoring. In Phase 1, GSE has successfully attacked many of the highest risk aspects of each task. All-laser, selective scribing processes for CIGS have been developed, and many end-of-contract goals for scribing speed have been exceeded in the first year. High-speed ink-jet deposition of insulating material in the scribes now appears to be a viable technique, again exceeding some end-of-contract goals in the first year. Absorber deposition of CIGS was reduced corresponding to throughput speeds of up to 24-in/min, also exceeding an end-of-contract goal. Alternate back-contact materials have been identified that show potential as candidates for replacement of higher-cost molybdenum, and a novel, real-time monitoring technique (parallel-detector spectroscopic ellipsometry) has shown remarkable sensitivity to relevant properties of the CIGS absorber layer for use as a diagnostic tool. Currently, one of the bilayers has been baselined by GSE for flexible CIGS on polymeric substrates. Resultant back-contacts meet sheet-resistance goals and exhibit much less intrinsic stress than Mo. CIGS has been deposited, and resultant devices are comparable in performance to pure Mo back-contacts. Debris in the chamber has been substantially reduced, allowing longer roll-length between system cleaning.

Wiedeman, S.; Wendt, R.G.

2000-03-01T23:59:59.000Z

424

Definition: PV module | Open Energy Information  

Open Energy Info (EERE)

Definition Definition Edit with form History Facebook icon Twitter icon » Definition: PV module Jump to: navigation, search Dictionary.png PV module A unit comprised of several PV cells, and the principal unit of a PV array; it is intended to generate direct current power under un-concentrated sunlight.[1][2] View on Wikipedia Wikipedia Definition A solar panel is a set of solar photovoltaic modules electrically connected and mounted on a supporting structure. A photovoltaic module is a packaged, connected assembly of photovoltaic cells. The solar module can be used as a component of a larger photovoltaic system to generate and supply electricity in commercial and residential applications. Each module is rated by its DC output power under standard test conditions (STC), and

425

Photovoltaic Energy Technology Module | Open Energy Information  

Open Energy Info (EERE)

Photovoltaic Energy Technology Module Photovoltaic Energy Technology Module Jump to: navigation, search Tool Summary Name: Photovoltaic Energy Technology Module Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy, Solar Topics: Technology characterizations Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: Photovoltaic Energy Technology Module[1] Resources Portable Solar Photovoltaic Lanterns: Performance and Certification Specification, and Type Approval, ESMAP TECHNICAL PAPER 078 Testing of Storage Batteries used in Stand Alone Photovoltaic Power Systems, Test procedures and examples of test results Technical Specifications for Solar Home Systems (SHS), Rural Electrification and Renewable Energy Development (PV Component) Project

426

Microsoft PowerPoint - FinalModule5.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EVMS Concepts and Methods 5: EVMS Concepts and Methods Prepared by: Module 5 - EVMS Concepts and Methods 1 Prepared by: Booz Allen Hamilton Module 5: EVMS Concepts and Methods Welcome to Module 5. The objective of this module is to introduce you to Basic Earned Value concepts and methods. The Topics that will be addressed in this Module include: * Earned Valve Management System (EVMS) Criteria * The definitions and illustrations of the basic EVMS terminology * The definition and illustrations of the EV methods Module 5 - EVMS Concepts and Methods 2 Prepared by: Booz Allen Hamilton Review of Previous Modules In the previous four modules, we discussed the framework needed to perform Earned Value and develop an Earned Value Management System (EVMS). * In Module 1 we introduced you to earned value and the requirements for

427

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... with the requirements of the Office of Management and Budget (OMB) Circular ... D-6 05-07-2013 Editorial Change SC-18 Priority Code from P1 to P2 ...

2013-05-08T23:59:59.000Z

428

Electronic access to information and the privacy paradox: rethinking practical obscurity and its impact on electronic freedom of information  

Science Conference Proceedings (OSTI)

This article addresses the U.S. Supreme Court's formulation of "practical obscurity" in Reporters Committee v. Department of Justice, a seminal case interpreting the U.S. Freedom of Information Act (FOIA). By examining lower federal court opinions ... Keywords: department of Justice, electronic information, freedom of information, privacy, reporters Committee for Freedom of the Press

Charles N. Davis

2003-01-01T23:59:59.000Z

429

Module Handbook Core Univ. of Oldenburg  

E-Print Network (OSTI)

, DMS (strain gauge?) Test bridge, Fatigue Extrapolation · Wind Diesel Systeme in kleinen Inselnetzen/EUREC Course 2008/2009 #12;EUREC Core Courses at University of Oldenburg, 1st Semester Wind Energy Module Module Description: Wind Energy Field: Core Oldenburg Courses: Wind Energy Wind Energy

Habel, Annegret

430

General Renewable Energy Technology Module | Open Energy Information  

Open Energy Info (EERE)

General Renewable Energy Technology Module General Renewable Energy Technology Module Jump to: navigation, search Tool Summary LAUNCH TOOL Name: General Renewable Energy Technology Module Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy Topics: Technology characterizations Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: General Renewable Energy Technology Module[1] Resource Generation and Transmission Interconnection Process Overview, PJM Manual, Transmission and Interconnection Planning Department, System Planning Division, PJM Interconnection, LLC References ↑ "General Renewable Energy Technology Module" Retrieved from "http://en.openei.org/w/index.php?title=General_Renewable_Energy_Technology_Module&oldid=328701

431

Light modulating device  

DOE Patents (OSTI)

In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity are disclosed. 1 fig.

Rauh, R.D.; Goldner, R.B.

1989-12-26T23:59:59.000Z

432

Electricity Market Module  

U.S. Energy Information Administration (EIA) Indexed Site

Market Module Market Module This page inTenTionally lefT blank 101 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2013 Electricity Market Module The NEMS Electricity Market Module (EMM) represents the capacity planning, dispatching, and pricing of electricity. It is composed of four submodules-electricity capacity planning, electricity fuel dispatching, electricity load and demand, and electricity finance and pricing. It includes nonutility capacity and generation, and electricity transmission and trade. A detailed description of the EMM is provided in the EIA publication, Electricity Market Module of the National Energy Modeling System 2013, DOE/EIA-M068(2013). Based on fuel prices and electricity demands provided by the other modules of the NEMS, the EMM determines the most

433

Personalization in privacy-aware highly dynamic systems  

E-Print Network (OSTI)

Fifteen years after Mark Weisers inspiring paper on ubiquitous computing [ 1], his vision has become technically feasible. Objects of everyday use are becoming increasingly interconnected and mobile communication of all bandwidth and devices of all sizes are used in various ways. Highly dynamic information systems (HDS) are emerging, bringing new challenges for the management of information systems: having to cope with components that enter and leave the system spontaneously and be autonomous in their actions. The changing and possibly conflicting requirements of the single components have to be taken into account leading to a dynamic negotiation of requirements. Moreover, such highly dynamic systems have to be able to contend with constant growth of communicated data avidly collected in various forms. Solving the challenges of HDS is accompanied with a prospect of economic potential. A first realization is the present rollout of RFID by major retail groups worldwide Currently, cost savings through process automation is of prime importance but the use of this technology in retailing goes beyond mere productivity improvements. Tagging items with RFID-chips in combination with other wireless technologies, equipping customers with mobile

Stefan Sackmann; Jens Strker; Rafael Accorsi

2006-01-01T23:59:59.000Z

434

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

435

Macroeconomic Activity Module  

Annual Energy Outlook 2012 (EIA)

d022412A. U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2012 18 Macroeconomic Activity Module To reflect uncertainty in the projection of...

436

International Energy Module  

Reports and Publications (EIA)

Summarizes the overall structure of the International Energy Model and its interface with other NEMS modules, mathematical specifications of behavioral relationships, and data sources and estimation methods.

Adrian Geagla

2012-11-05T23:59:59.000Z

437

International Energy Module  

Reports and Publications (EIA)

Summarizes the overall structure of the International Energy Model and its interface with other NEMS modules, mathematical specifications of behavioral relationships, and data sources and estimation methods.

Adrian Geagla

2013-10-22T23:59:59.000Z

438

Advanced Indoor Module Light-Soaking Facility  

DOE Green Energy (OSTI)

An overview of the accelerated, indoor light-soaking test station is presented in this paper, along with data obtained for six modules that underwent exposure. The station comprises a climate-controlled chamber equipped with a solar simulator that allows 1-sun light intensity exposure. Concurrently, we monitor the electrical characteristics of multiple PV modules and exercise active control over their electrical bias using programmable electronic loads, interfaced to a data acquisition system that acquires power-tracking and current-voltage data. This capability allows us to the test different bias conditions and to cyclically alternate between them. Additionally, we can vary the light intensity and module temperatures to garner realistic temperature coefficients of module performance. Data obtained on cadmium telluride (CdTe) and amorphous silicon (a-Si) modules are presented.

del Cueto, J. A.; Osterwald, C.; Pruett, J.

2005-01-01T23:59:59.000Z

439

Working with Modules within Python  

NLE Websites -- All DOE Office Websites (Extended Search)

Working with Modules within Perl and Python Working with Modules within Perl and Python Working with Modules within Perl and Python It can often be convenient to work with the modules system from within perl or python scripts. You can do this! Using Modules within Python The EnvironmentModules python package gives access to the module system from within python. The EnvironmentModules python package has a single function: module. Using this function you can provide the same arguments you would to "module" on the command line. The module() function accepts a list of arguments, like ['load','']; or ['unload','']. >>> import EnvironmentModules as EnvMod >>> EnvMod.module(['load','blast+']) It is important to understand that this is most effective for scripts

440

Macroeconomic Activity Module  

Reports and Publications (EIA)

Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Macroeconomic Activity Module (MAM) used to develop the Annual Energy Outlook for 2013 (AEO2013). The report catalogues and describes the module assumptions, computations, methodology, parameter estimation techniques, and mainframe source code

2013-04-10T23:59:59.000Z

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Membrane module assembly  

DOE Patents (OSTI)

A membrane module assembly is described which is adapted to provide a flow path for the incoming feed stream that forces it into prolonged heat-exchanging contact with a heating or cooling mechanism. Membrane separation processes employing the module assembly are also disclosed. The assembly is particularly useful for gas separation or pervaporation. 2 figures.

Kaschemekat, J.

1994-03-15T23:59:59.000Z

442

Module Safety Issues (Presentation)  

SciTech Connect

Description of how to make PV modules so that they are less likely to turn into safety hazards. Making modules inherently safer with minimum additional cost is the preferred approach for PV. Safety starts with module design to ensure redundancy within the electrical circuitry to minimize open circuits and proper mounting instructions to prevent installation related ground faults. Module manufacturers must control the raw materials and processes to ensure that that every module is built like those qualified through the safety tests. This is the reason behind the QA task force effort to develop a 'Guideline for PV Module Manufacturing QA'. Periodic accelerated stress testing of production products is critical to validate the safety of the product. Combining safer PV modules with better systems designs is the ultimate goal. This should be especially true for PV arrays on buildings. Use of lower voltage dc circuits - AC modules, DC-DC converters. Use of arc detectors and interrupters to detect arcs and open the circuits to extinguish the arcs.

Wohlgemuth, J.

2012-02-01T23:59:59.000Z

443

International Energy Module  

Gasoline and Diesel Fuel Update (EIA)

he International Energy Module determines changes in the world oil price and the supply prices of crude he International Energy Module determines changes in the world oil price and the supply prices of crude oils and petroleum products for import to the United States in response to changes in U.S. import requirements. A market clearing method is used to determine the price at which worldwide demand for oil is equal to the worldwide supply. The module determines new values for oil production and demand for regions outside the United States, along with a new world oil price that balances supply and demand in the international oil market. A detailed description of the International Energy Module is provided in the EIA publication, Model Documentation Report: The International Energy Module of the National Energy Modeling System, DOE/EIA-M071(06), (Washington, DC, February 2006).

444

Polarization Splay as the Origin of Modulation in the B1 and B7 Smectic Phases of Bent-Core Molecules  

Science Conference Proceedings (OSTI)

We report a generalized scenario for the formation of modulated smectic phases of bent-core molecules based on locally ferroelectric layering and spontaneous splay of the polarization. Twelve phases are proposed, distinguished by neighboring splay stripes with either syn- or antiorder of the polarization and undulation slope, in addition to layer continuity versus layer discontinuity at the intervening defects. We outline the experimental techniques necessary to differentiate among the phases and interpret previous results in the present context, using high resolution x-ray scattering diffraction and block and undulation models of the layer organization to distinguish among the three 2D lattice types which emerge.

Coleman,D.; Jones, C.; Nakata, M.; Clark, N.; Walba, D.; Weissflog, W.; Fodor-Csorba, K.; Watanabe, J.; Novotna, V.; Hamplova, V.

2008-01-01T23:59:59.000Z

445

SiC Power Module  

NLE Websites -- All DOE Office Websites (Extended Search)

R&D 100 Entry R&D 100 Entry SiC Power Module 2 R&D 100 Entry SiC Power Module Submitting OrganizatiOn Sandia National Laboratories PO Box 5800, MS 1033 Albuquerque, NM 87185-1033 USA Stanley Atcitty Phone: 505-284-2701 Fax: 505-844-2890 satcitt@sandia.gov AFFIRMATION: I affirm that all information submitted as a part of, or supplemental to, this entry is a fair and accurate representation of this product. _____________________________________ Stanley Atcitty JOint Entry Arkansas Power Electronics International, Inc.; University of Arkansas; Rohm Co., LTD.; and the Department of Energy/ Energy Storage Program. 1. 1. Arkansas Power Electronics International, Inc. 535 W. Research Center Blvd. Fayetteville, AR 72701 USA Alexander B. Lostetter, President & CEO Phone: 479-443-5759

446

Microsoft PowerPoint - FinalModule7.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Integrated Baseline Review 7: Integrated Baseline Review and Change Control Prepared by: Module 7 - Integrated Baseline Review and Change Control 1 Prepared by: Booz Allen Hamilton Module 7: Integrated Baseline Review and Change Control Welcome to Module 7. The objective of this module is to introduce you to the concepts of the Integrated Baseline Review Process and requirements for Change Control. The Topics that will be addressed in this Module include: * Definition of an Integrated Baseline Review (IBR) * Integrated Baseline Review Objectives and Responsibilities * Change Control Process Module 7 - Integrated Baseline Review and Change Control 2 Prepared by: Booz Allen Hamilton Review of Previous Modules To review some critical terminology and define the framework within which IBRs are conducted, let's look back at the previous six modules.

447

Polycrystalline thin-film module and system performance  

DOE Green Energy (OSTI)

The Module and System Performance and Engineering Project at the National Renewable Energy Laboratory (NREL) conducts in-situ technical evaluations of photovoltaic (PV) modules and systems (arrays). These evaluations on module/array performance and stability are conducted at the NREL Photovoltaic Outdoor Test Facility (OTF) in Golden, CO. The modules and arrays are located at 39.7{degree}N latitude, 105.2{degree}W longitude, and at 1,782 meters elevation. Currently, two polycrystalline thin-film technologies are the focus of the research presented here. The module structures are copper indium diselenide (CIS) from Siemens Solar Industries and cadmium telluride (CdTe) from Solar Cells, Inc. The research team is attempting to correlate individual module performance with array performance for these two polycrystalline thin-film technologies. This is done by looking at module and array performance over time. Also, temperature coefficients are determined at both the module and array level. Results are discussed.

Strand, T.; Kroposki, B.; Hansen, R.; Mrig, L.

1995-11-01T23:59:59.000Z

448

NIH 2674-12 (PAGE 1) Privacy Act 09-25-0165 Revised 11-2010  

E-Print Network (OSTI)

through 06/30/2014 U.S. Department of Health and Human Services National Institutes of Health NIH Loan Repayment Program Contract Sections 487A, 487B, 487C, 487E, and 487F of the Public Health Service Act ("Act") authorize the Secretary of the Department of Health and Human Services ("Secretary"), and Section 485G

Bandettini, Peter A.

449

UNIVERSITY OF MIAMI HEALTH SYSTEM NOTICE OF PRIVACY PRACTICES Effective Date: December 1, 2007  

E-Print Network (OSTI)

for intelligence, counter-intelligence, and other national security activities authorized by law. v) Protective Security and Intelligence Activities. We may release Health Information to authorized federal officials

Miami, University of

450

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPA: An Efficient and Privacy-Preserving  

E-Print Network (OSTI)

to smart grid operation center, data aggregation is performed directly on ciphertext at local gateways be matched by the power supply and transmission capacity in the electric power grid. While swift advances electricity distribution. Modernizing the aging power system is currently a strategic plan in many countries

Shen, Xuemin "Sherman"

451

Commercial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

2 2 Commercial Demand Module The NEMS Commercial Sector Demand Module generates projections of commercial sector energy demand through 2035. The definition of the commercial sector is consistent with EIA's State Energy Data System (SEDS). That is, the commercial sector includes business establishments that are not engaged in transportation or in manufacturing or other types of industrial activity (e.g., agriculture, mining or construction). The bulk of commercial sector energy is consumed within buildings; however, street lights, pumps, bridges, and public services are also included if the establishment operating them is considered commercial. Since most of commercial energy consumption occurs in buildings, the commercial module relies on the data from the EIA

452

Sonication standard laboratory module  

DOE Patents (OSTI)

A standard laboratory module for automatically producing a solution of cominants from a soil sample. A sonication tip agitates a solution containing the soil sample in a beaker while a stepper motor rotates the sample. An aspirator tube, connected to a vacuum, draws the upper layer of solution from the beaker through a filter and into another beaker. This beaker can thereafter be removed for analysis of the solution. The standard laboratory module encloses an embedded controller providing process control, status feedback information and maintenance procedures for the equipment and operations within the standard laboratory module.

Beugelsdijk, Tony (Los Alamos, NM); Hollen, Robert M. (Los Alamos, NM); Erkkila, Tracy H. (Los Alamos, NM); Bronisz, Lawrence E. (Los Alamos, NM); Roybal, Jeffrey E. (Santa Fe, NM); Clark, Michael Leon (Menan, ID)

1999-01-01T23:59:59.000Z

453

Water heater control module  

DOE Patents (OSTI)

An advanced electric water heater control system that interfaces with a high temperature cut-off thermostat and an upper regulating thermostat. The system includes a control module that is electrically connected to the high-temperature cut-off thermostat and the upper regulating thermostat. The control module includes a switch to open or close the high-temperature cut-off thermostat and the upper regulating thermostat. The control module further includes circuitry configured to control said switch in response to a signal selected from the group of an autonomous signal, a communicated signal, and combinations thereof.

Hammerstrom, Donald J

2013-11-26T23:59:59.000Z

454

Amplitude modulation of wind turbine noise  

E-Print Network (OSTI)

Due to swish and thump amplitude modulation, the noise of wind turbines cause more annoyance than other environmental noise of the same average level. The wind shear accounts for the thump modulation (van den Berg effect). Making use of the wind speed measurements at the hub height, as well as at the top and the bottom of the rotor disc (Fig.1), the non-standard wind profile is applied. It causes variations in the A-weighted sound pressure level, LpA. The difference between the maximum and minimum of LpA characterizes thump modulation (Fig.2).

Makarewicz, Rufin

2013-01-01T23:59:59.000Z

455

Ensuring Quality of PV Modules: Preprint  

SciTech Connect

Photovoltaic (PV) customers need to have confidence in the PV modules they purchase. Currently, no test can quantify a module's lifetime with confidence, but stress tests are routinely used to differentiate PV product designs. We suggest that the industry would be strengthened by using the wisdom of the community to develop a single set of tests that will help customers quantify confidence in PV products. This paper evaluates the need for quality assurance (QA) standards and suggests a path for creating these. Two types of standards are needed: 1) QA of the module design and 2) QA of the manufacturing process.

Kurtz, S.; Wohlgemuth, J.; Hacke, P.; Kempe, M.; Sample, T.; Yamamichi, M.; Kondo, M.; Doi, T.; Otani, K.; Amano, J.

2011-07-01T23:59:59.000Z

456

Electricity Market Module  

Gasoline and Diesel Fuel Update (EIA)

This page intentionally left blank This page intentionally left blank 95 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2011 Electricity Market Module The NEMS Electricity Market Module (EMM) represents the capacity planning, dispatching, and pricing of electricity. It is composed of four submodules-electricity capacity planning, electricity fuel dispatching, electricity load and demand, and electricity finance and pricing. It includes nonutility capacity and generation, and electricity transmission and trade. A detailed description of the EMM is provided in the EIA publication, Electricity Market Module of the National Energy Modeling System 2011, DOE/EIA-M068(2011). Based on fuel prices and electricity demands provided by the other modules of the NEMS, the EMM determines the most

457

CIM - compact intensity modulation.  

SciTech Connect

Compact intensity modulation (CIM), a new method to modulate the intensity of a neutron beam is demonstrated. CIM allows the production of arbitrary signals where the focus point can be chosen and changed without any constraints. A novel feature in this technique compared to spin echo techniques is that the neutron polarization is kept parallel or anti-parallel to the static fields during the passage through the magnetic fields and the beating pattern at the detector is produced by an amplitude modulation (AM) of the adiabatic RF-spin flippers rather than Larmor precession like in neutron spin echo (NSE) instruments; thus, the achievable contrast is very high and the instrument resolution can be changed very quickly. This gives the fascinating possibility at pulsed neutron sources to sweep the modulation frequency of the flippers in order to increase dynamic resolution range during the same neutron pulse.

Bleuel, M.; Lang, E.; Gahler, G.; Lal, J.; Intense Pulsed Neutron Source; Inst. Lau Langevin

2008-07-21T23:59:59.000Z

458

Electricity Market Module  

Gasoline and Diesel Fuel Update (EIA)

This page inTenTionally lefT blank 91 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2012 Electricity Market Module The NEMS Electricity Market Module (EMM) represents the capacity planning, dispatching, and pricing of electricity. It is composed of four submodules-electricity capacity planning, electricity fuel dispatching, electricity load and demand, and electricity finance and pricing. It includes nonutility capacity and generation, and electricity transmission and trade. A detailed description of the EMM is provided in the EIA publication, Electricity Market Module of the National Energy Modeling System 2012, DOE/EIA-M068(2012). Based on fuel prices and electricity demands provided by the other modules of the NEMS, the EMM determines the most

459

Liquid Fuels Market Module  

U.S. Energy Information Administration (EIA) Indexed Site

Liquid Fuels Market Module Liquid Fuels Market Module This page inTenTionally lefT blank 145 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2013 Liquid Fuels Market Module The NEMS Liquid Fuels Market Module (LFMM) projects petroleum product prices and sources of supply for meeting petroleum product demand. The sources of supply include crude oil (both domestic and imported), petroleum product imports, unfinished oil imports, other refinery inputs (including alcohols, ethers, esters, corn, biomass, and coal), natural gas plant liquids production, and refinery processing gain. In addition, the LFMM projects capacity expansion and fuel consumption at domestic refineries. The LFMM contains a linear programming (LP) representation of U.S. petroleum refining

460

Residential Demand Module  

Gasoline and Diesel Fuel Update (EIA)

2 2 Residential Demand Module The NEMS Residential Demand Module projects future residential sector energy requirements based on projections of the number of households and the stock, efficiency, and intensity of energy-consuming equipment. The Residential Demand Module projections begin with a base year estimate of the housing stock, the types and numbers of energy-consuming appliances servicing the stock, and the "unit energy consumption" (UEC) by appliance (in million Btu per household per year). The projection process adds new housing units to the stock, determines the equipment installed in new units, retires existing housing units, and retires and replaces appliances. The primary exogenous drivers for the module are housing starts by type

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Digital optical conversion module  

DOE Patents (OSTI)

A digital optical conversion module used to convert an analog signal to a computer compatible digital signal including a voltage-to-frequency converter, frequency offset response circuitry, and an electrical-to-optical converter. Also used in conjunction with the digital optical conversion module is an optical link and an interface at the computer for converting the optical signal back to an electrical signal. Suitable for use in hostile environments having high levels of electromagnetic interference, the conversion module retains high resolution of the analog signal while eliminating the potential for errors due to noise and interference. The module can be used to link analog output scientific equipment such as an electrometer used with a mass spectrometer to a computer.

Kotter, Dale K. (North Shelley, ID); Rankin, Richard A. (Ammon, ID)

1991-02-26T23:59:59.000Z

462

Flywheel Energy Storage Module  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

kWh100 kW Flywheel Energy Storage Module * 100KWh - 18 cost KWh vs. current State of the Art * Bonded Magnetic Bearings on Rim ID * No Shaft Hub (which limits surface speed)...

463

Digital optical conversion module  

DOE Patents (OSTI)

A digital optical conversion module used to convert an analog signal to a computer compatible digital signal including a voltage-to-frequency converter, frequency offset response circuitry, and an electrical-to-optical converter. Also used in conjunction with the digital optical conversion module is an optical link and an interface at the computer for converting the optical signal back to an electrical signal. Suitable for use in hostile environments having high levels of electromagnetic interference, the conversion module retains high resolution of the analog signal while eliminating the potential for errors due to noise and interference. The module can be used to link analog output scientific equipment such as an electrometer used with a mass spectrometer to a computer. 2 figs.

Kotter, D.K.; Rankin, R.A.

1988-07-19T23:59:59.000Z

464

Residential Sector Demand Module  

Reports and Publications (EIA)

Model Documentation - Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Residential Sector Demand Module. The report catalogues and describes the model assumptions, computational methodology, parameter estimation techniques, and FORTRAN source code.

Owen Comstock

2012-12-19T23:59:59.000Z

465

Industrial Demand Module  

Reports and Publications (EIA)

Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Industrial Demand Module. The report catalogues and describes model assumptions, computational methodology, parameter estimation techniques, and model source code.

Kelly Perl

2013-05-14T23:59:59.000Z

466

Industrial Demand Module  

Reports and Publications (EIA)

Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Industrial Demand Module. The report catalogues and describes model assumptions, computational methodology, parameter estimation techniques, and model source code.

Kelly Perl

2013-09-30T23:59:59.000Z

467

Residential Sector Demand Module  

Reports and Publications (EIA)

Model Documentation - Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Residential Sector Demand Module. The report catalogues and describes the model assumptions, computational methodology, parameter estimation techniques, and FORTRAN source code.

Owen Comstock

2013-11-05T23:59:59.000Z

468

Renewable Fuels Module  

Reports and Publications (EIA)

This report documents the objectives, analytical approach, and design of the National Energy Modeling System (NEMS) Renewable Fuels Module (RFM) as it relates to the production of the Annual Energy Outlook forecasts.

Chris Namovicz

2013-07-03T23:59:59.000Z

469

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

470

Programmable synchronous communications module  

SciTech Connect

The functional characteristics of a programmable, synchronous serial communications CAMAC module with buffering in block format are described. Both bit and byte oriented protocols can be handled in full duplex depending on the program implemented. The main elements of the module are a Signetics 2652 Multi-Protocol Communications Controller, a Zilog Z-808 8 bit microprocessor with PROM and RAM, and FIFOs for buffering. (FS)

Horelick, D.

1979-10-01T23:59:59.000Z

471

Electricity Market Module  

Reports and Publications (EIA)

Documents the Electricity Market Module as it was used for the Annual Energy Outlook 2013. The Electricity Market Module (EMM) is the electricity supply component of the National Energy Modeling System (NEMS). The EMM represents the generation, transmission, and pricing of electricity. It consists of four submodules: the Electricity Capacity Planning (ECP) Submodule, the Electricity Fuel Dispatch (EFD) Submodule, the Electricity Finance and Pricing (EFP) Submodule, and the Electricity Load and Demand (ELD) Submodule.

Jeff Jones

2013-07-24T23:59:59.000Z

472

Education of Risk Professionals Module 3  

Science Conference Proceedings (OSTI)

The recent expansion of risk-informed initiatives in the nuclear power industry, combined with increasing mobility and retirement of trained personnel, underscores the need for professionals trained in risk methods. To address this need, EPRI developed the Education of Risk Professionals program. This is a formal training program designed to accelerate utility qualification of new risk professionals. The program consists of the following six modules; each module is taught over a 1-week period in a manner...

2011-12-23T23:59:59.000Z

473

Force Modulator System  

SciTech Connect

Many metal parts manufacturers use large metal presses to shape sheet metal into finished products like car body parts, jet wing and fuselage surfaces, etc. These metal presses take sheet metal and - with enormous force - reshape the metal into a fully formed part in a manner of seconds. Although highly efficient, the forces involved in forming metal parts also damage the press itself, limit the metals used in part production, slow press operations and, when not properly controlled, cause the manufacture of large volumes of defective metal parts. To date, the metal-forming industry has not been able to develop a metal-holding technology that allows full control of press forces during the part forming process. This is of particular importance in the automotive lightweighting efforts under way in the US automotive manufacturing marketplace. Metalforming Controls Technology Inc. (MC2) has developed a patented press control system called the Force Modulator that has the ability to control these press forces, allowing a breakthrough in stamping process control. The technology includes a series of hydraulic cylinders that provide controlled tonnage at all points in the forming process. At the same time, the unique cylinder design allows for the generation of very high levels of clamping forces (very high tonnages) in very small spaces; a requirement for forming medium and large panels out of HSS and AHSS. Successful production application of these systems testing at multiple stamping operations - including Ford and Chrysler - has validated the capabilities and economic benefits of the system. Although this technology has been adopted in a number of stamping operations, one of the primary barriers to faster adoption and application of this technology in HSS projects is system cost. The cost issue has surfaced because the systems currently in use are built for each individual die as a custom application, thus driving higher tooling costs. This project proposed to better marry the die-specific Force Modulator technology with stamping presses in the form of a press cushion. This system would be designed to operate the binder ring for multiple parts, thus cutting the per-die cost of the technology. This study reports the results of technology field application. This project produced the following conclusions: (1) The Force Modulator system is capable of operating at very high tempos in the stamping environment; (2) The company can generate substantial, controlled holding tonnage (binder ring pressure) necessary to hold high strength steel parts for proper formation during draw operations; (3) A single system can be designed to operate with a family of parts, thus significantly reducing the per-die cost of a FM system; (4) High strength steel parts made with these systems appear to show significant quality improvements; (5) The amounts of steel required to make these parts is typically less than the amounts required with traditional blank-holding technologies; and (6) This technology will aid in the use of higher strength steels in auto and truck production, thus reducing weight and improving fuel efficiency.

Redmond Clark

2009-04-30T23:59:59.000Z

474

Photovoltaic module reliability workshop  

DOE Green Energy (OSTI)

The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

Mrig, L. (ed.)

1990-01-01T23:59:59.000Z

475

HP MSR30/50 Routers with Encryption Accelerator Modules  

Science Conference Proceedings (OSTI)

... 1 The RS-232/485 interfaces is reserved and not supported at present. ... Officer shall clean the module of any grease, dirt, or oil before applying the ...

2013-10-21T23:59:59.000Z

476

PRIVACYI1vIPACT ASSESSMENT: ORG NAME-SYSTEM NAME PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACYI1vIPACT PRIVACYI1vIPACT ASSESSMENT: ORG NAME-SYSTEM NAME PIA Template Version 4- June, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional gUidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. \ Departmental Element & Site November 9, 2009 Bonneville Power Administration Ethics Helpline, hosted and operated by Global Compliance Charlotte. North Carolina Name of Information Bonneville Power Adminstration Ethics Helpline System or IT Project Hosted and operated by Global Compliance Charlotte. North Carolina Exhibit Project UIO

477

Gradient Combinatorial Libraries via Modulated Light ...  

Science Conference Proceedings (OSTI)

... Libraries via Modulated Light Exposure. Bookmark and Share Gradient Combinatorial Libraries via Modulated Light Exposure. ...

478

Module/array interface study. Final report  

SciTech Connect

Bechtel National, Inc. has conducted a study of alternate module, panel, and array designs for use in large scale applications such as central station photovoltaic power plants. The objective of the study is to identify design features that will lead to minimum plant costs. Several aspects of module design are evaluated, including glass superstrate and metal substrate module configurations, the potential for hail damage, light absorption in glass superstrates, the economics of glass selection, and electrical design. Also, three alternate glass superstrate module configurations are evaluated by means of finite element computer analyses. Two panel sizes, 1.2 by 2.4 m (4 by 8 ft) and 2.4 by 4.8 m (8 by 16 ft), are used to support three module sizes, 0.6 by 1.2 m (2 by 4 ft), 1.2 by 1.2 m (4 by 4 ft), and 1.2 by 2.4 m (4 by 8 ft), for design loadings of +- 1.7 kPa (35 psf), +- 2.4 kPa (50 psf), and +- 3.6 kPa (75 psf). Designs and cost estimates are presented for twenty panel types and nine array configurations at each of the three design loadings. Structural cost sensitivities of combined array configurations and panel cases are presented.

1978-08-01T23:59:59.000Z

479

General-purpose heat source: Research and development program. High-siliocon fuel characterization study: Half module impact tests 1 and 2  

SciTech Connect

The General-Purpose Heat Source (GPHS) provides power for space missions by transmitting the heat of {sup 238}Pu decay to an array of thermoelectric elements. Because any space mission could experience a launch abort or return from orbit, the heat source must be designed and constructed to survive credible accident environments. Previous testing conducted in support of the Galileo and Ulysses missions documented the response of GPHSs to a variety of fragment-impact, aging, atmospheric reentry, and earth-impact conditions. The evaluations documented in this report are part of an ongoing program to determine the effect of fuel impurities on the response of the heat source to conditions baselined during the Galileo/Ulysses test program. In the first two tests in this series, encapsulated GPHS fuel pellets containing high levels of silicon were aged, loaded into GPHS module halves, and impacted against steel plates. The results show no significant differences between the response of these capsules and the behavior of relatively low-silicon fuel pellets tested previously.

Reimus, M.A.H.; George, T.G.

1996-03-01T23:59:59.000Z

480

Microsoft PowerPoint - FinalModule4.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Budgeting 4: Budgeting Prepared by: Prepared by: Booz Allen Hamilton Module 4 - Budgeting 1 Module 4: Budgeting Welcome to Module 4. The objective of this module is to introduce you to Budgeting Concepts and Definitions. The Topics that will be addressed in this Module include: * Cost/Schedule Baselines * WBS Levels: Control Accounts, Work Packages, Planning Packages * Elements of an Earned Value Contract Baseline * Proposed Cost and the Contract Budget Baseline * Control Account Manager Roles and Responsibilities * Review Prepared by: Booz Allen Hamilton Module 4 - Budgeting 2 The Budgeting Process In the previous module, we defined Planning as making decisions with the following objectives: * Define what will be performed (Statement of Work) * Determine how the work will be structured and tracked (Work Breakdown

Note: This page contains sample records for the topic "module 1 privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Coal Market Module  

Gasoline and Diesel Fuel Update (EIA)

page intentionally left blank page intentionally left blank 153 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2011 Coal Market Module The NEMS Coal Market Module (CMM) provides projections of U.S. coal production, consumption, exports, imports, distribution, and prices. The CMM comprises three functional areas: coal production, coal distribution, and coal exports. A detailed description of the CMM is provided in the EIA publication, Coal Market Module of the National Energy Modeling System 2011, DOE/EIA-M060(2011) (Washington, DC, 2011). Key assumptions Coal production The coal production submodule of the CMM generates a different set of supply curves for the CMM for each year of the projection. Forty-one separate supply curves are developed for each of 14 supply regions, nine coal types (unique combinations

482

Commercial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

4 4 The commercial module forecasts consumption by fuel 15 at the Census division level using prices from the NEMS energy supply modules, and macroeconomic variables from the NEMS Macroeconomic Activity Module (MAM), as well as external data sources (technology characterizations, for example). Energy demands are forecast for ten end-use services 16 for eleven building categories 17 in each of the nine Census divisions (see Figure 5). The model begins by developing forecasts of floorspace for the 99 building category and Census division combinations. Next, the ten end-use service demands required for the projected floorspace