Powered by Deep Web Technologies
Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

2

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

3

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

4

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

5

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

6

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

7

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

8

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

9

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding 1: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability February 13, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in multiple Mozilla products. PLATFORM: Mozilla Firefox 10.x Mozilla SeaMonkey 2.x Mozilla Thunderbird 10.x ABSTRACT: A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system. reference LINKS: Vendor Advisory Secunia Advisory SA48008 CVE-2012-0452 IMPACT ASSESSMENT: High Discussion: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. The vulnerability is caused due to a use-after-free error in the

10

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability 5: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability June 27, 2011 - 4:31pm Addthis PROBLEM: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability PLATFORM: Mozilla Firefox ABSTRACT: Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. reference LINKS: Securityfocus Mozilla Firefox Homepage MFSA 2011-27: XSS encoding hazard with inline SVG IMPACT ASSESSMENT: High Discussion: Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to

11

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

12

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

13

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

14

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

15

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

16

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

17

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

18

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

19

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

20

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

file CVE-2012-1942. Version 12 on Windows is affected. The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers...

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-587: Firefox Blocking Fraudulent Certificates | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

587: Firefox Blocking Fraudulent Certificates 587: Firefox Blocking Fraudulent Certificates T-587: Firefox Blocking Fraudulent Certificates March 24, 2011 - 3:05pm Addthis PROBLEM: Mozilla Security Advisory: Several invalid HTTPS certificates were placed on the certificate blacklist to prevent their misuse. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Firefox Blocking Fraudulent Certificates. reference LINKS: MFSA 2011-11 Mozilla Bug 644012 Mozilla Security updates IMPACT ASSESSMENT: High Discussion: Firefox will crashes when trying to access a HTTPS website with a certificate that does not contain the fields issuerName. Mozilla has been informed about the issuance of several fraudulent SSL certificates for public websites. The certificates have been revoked by their issuer which should protect most users. This is not a

22

T-729: Mozilla Code Installation Through Holding Down Enter | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Mozilla Code Installation Through Holding Down Enter 9: Mozilla Code Installation Through Holding Down Enter T-729: Mozilla Code Installation Through Holding Down Enter September 29, 2011 - 8:30am Addthis PROBLEM: Mozilla Code Installation Through Holding Down Enter. PLATFORM: Versions prior to the following are vulnerable: Firefox 7.0 Firefox 3.6.23 Thunderbird 7.0 SeaMonkey 2.4 ABSTRACT: Attackers can exploit this issue by enticing an unsuspecting victim into viewing and interacting with a malicious Web page. An attacker may be able to exploit this issue to bypass a confirmation dialog and install an arbitrary add-on. This may aid in further attacks. reference LINKS: Mozilla Foundation Security Advisory 2011-40 Firefox Security Advisories CVE-2011-2372 CVE-2011-3001 IMPACT ASSESSMENT: High Discussion: If a user holds down the Enter key--as part of a game or test, perhaps--a

23

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to a use-after-free error in the "nsXBLDocumentInfo::ReadPrototypeBindings()" method when handling XBL bindings in a hash table and can be exploited to cause a cycle collector to...

24

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

25

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in combination with some plugins, inject scripting code to cause...

26

NIST SP 800-83 Rev. 1, Guide to Malware Incident Prevention ...  

Science Conference Proceedings (OSTI)

... Multiple brands of Web browsers (eg, Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, Opera) can be installed on a single ...

2013-07-19T23:59:59.000Z

27

Guide to Malware Incident Prevention and Handling for ...  

Science Conference Proceedings (OSTI)

... Multiple brands of Web browsers (eg, Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, Opera) can be installed on a single ...

2013-07-19T23:59:59.000Z

28

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. January 4, 2011 T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied

29

Draft NISTIR 7946, CVSS Implementation Guidance  

Science Conference Proceedings (OSTI)

... SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet 626 Explorer, Mozilla Firefox, Google Chrome, Opera ...

2013-09-04T23:59:59.000Z

30

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 3990 of 29,416 results. 81 - 3990 of 29,416 results. Article V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox http://energy.gov/cio/articles/v-029-mozilla-firefox-multiple-bugs-let-remote-users-execute-arbitrary-code-and-conduct Page Post-Closure Benefits: DOE Complex vs Closure Sites Status of Contractor Pension and PRB Benefit Programs - September 30, 2011 http://energy.gov/lm/services/post-closure-benefits/post-closure-benefits-doe-complex-vs-closure-sites Article Workers Demolish Metals Plant at Paducah Site PADUCAH, Ky. - EM cleanup efforts at the Paducah site progressed this month with the demolition of one of the site's most contaminated structures.

31

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. June 24, 2011 T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. June 23, 2011 T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. June 22, 2011 T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute

32

Download and Install the Cosmo Player VRML Plugin  

Science Conference Proceedings (OSTI)

... Files (x86)\\Mozilla Firefox\\plugins; Chrome - C:\\Documents and Settings\\{ myusername}\\Local Settings\\Application Data\\Google\\Chrome\\Application ...

2013-08-12T23:59:59.000Z

33

DNA Analyst Training on Mixture Interpretation  

Science Conference Proceedings (OSTI)

... In order to access the event, you must have either Microsoft Internet Explorer 6.0+ or Mozilla Firefox 3+ browser for Windows operating systems. ...

2013-05-28T23:59:59.000Z

34

Emerging Trends in Synthetic Drugs Workshop  

Science Conference Proceedings (OSTI)

... In order to access the event, you must have either Microsoft Internet Explorer 6.0+ or Mozilla Firefox 3+ browser for Windows operating systems. ...

2013-05-28T23:59:59.000Z

35

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 20520 of 28,905 results. 11 - 20520 of 28,905 results. Download Flash2010-72.pdf http://energy.gov/management/downloads/flash2010-72pdf Article V-019: Google Chrome Multiple Vulnerabilities Google Chrome Prior to 23.0.1271.64 Multiple Security Vulnerabilities http://energy.gov/cio/articles/v-019-google-chrome-multiple-vulnerabilities Article V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. http://energy.gov/cio/articles/v-214-mozilla-firefox-multiple-vulnerabilities Download Status Prospects of Green Data Center Information on energy-saving technology research of green data centers and the potential impacts. http://energy.gov/eere/downloads/status-prospects-green-data-center Download Independent Oversight Inspection, Richland Operations Office,

36

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

601 - 23610 of 28,905 results. 601 - 23610 of 28,905 results. Article Workers Deliver Award-Winning Respiratory Safety RICHLAND, Wash. - Workers supporting the Richland Operations Office at the Hanford site found a way to make their everyday work even safer. http://energy.gov/em/articles/workers-deliver-award-winning-respiratory-safety Article V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. http://energy.gov/cio/articles/v-125-cisco-connected-grid-network-management-system-multiple-vulnerabilities Article V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by

37

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 17, 2012 October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 16, 2012 V-003: Suse Update For Mozillafirefox - Critical An update that fixes 25 vulnerabilities is now available. October 12, 2012 V-001: Mozilla Security vulnerabilities Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities October 10, 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 Microsoft Security Bulletin Advance Notification for October 2012. Microsoft has posted 1 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

38

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2013 5, 2013 V-127: Samba Bug Lets Remote Authenticated Users Modify Files A remote authenticated user can modify files on the target share April 4, 2013 V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system April 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. April 1, 2013

39

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2012 November 28, 2012 V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Google Chrome. November 22, 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service Several vulnerabilities were reported in IBM WebSphere DataPower. November 21, 2012 V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service Adobe ColdFusion Denial of Service Vulnerability November 21, 2012 V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice

40

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 13180 of 28,905 results. 71 - 13180 of 28,905 results. Article U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. http://energy.gov/cio/articles/u-184-mozilla-firefox-multiple-bugs-let-remote-users-execute-arbitrary-code Download Complete LNG Terminal Status Maps A series of slides showing the status of various LNG terminals (existing, under construction, proposed, etc.) in North America. http://energy.gov/fe/downloads/complete-lng-terminal-status-maps Download Before the Senate Energy and Natural Resources Committee Subject: Annual Energy Outlook By: Richard Newell, Administrator Energy Information Administration

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. February 3, 2012 U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. February 1, 2012 U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information

42

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

43

BNL Web Services -- Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

about employment at Broookhaven Lab question about a specific job posting Platform -- Web Browser Other -- Not Listed Windows XP -- Firefox 1.0 Windows XP -- Mozilla 1.7 Windows...

44

Idaho National Laboratory - Hydropower Program- Virtual Hydropower...  

NLE Websites -- All DOE Office Websites (Extended Search)

pop-up blockers that you are using. Thank you Different BrowsersPop-up Blockers: Google Toolbar Internet Explorer Mozilla FireFox Netscape Explorer Opera Browser Safari...

45

V-003: Suse Update For Mozillafirefox - Critical | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Suse Update For Mozillafirefox - Critical 3: Suse Update For Mozillafirefox - Critical V-003: Suse Update For Mozillafirefox - Critical October 16, 2012 - 6:00am Addthis PROBLEM: SUSE update for MozillaFirefox PLATFORM: openSUSE 12.2 openSUSE 12.1 openSUSE 11.4 ABSTRACT: An update that fixes 25 vulnerabilities is now available. REFERENCE LINKS: openSUSE-SU-2012:1345-1 Secunia Advisory SA50984 Bug 783533 CVE-2012-3982 CVE-2012-3983 CVE-2012-3984 CVE-2012-3985 CVE-2012-3986 CVE-2012-3988 CVE-2012-3989 CVE-2012-3990 CVE-2012-3991 CVE-2012-3992 CVE-2012-3993 CVE-2012-3994 CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4182 CVE-2012-4183 CVE-2012-4184 CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: SUSE has issue an update for MozillaFirefox. This fixes multiple

46

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1280 of 29,416 results. 71 - 1280 of 29,416 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Article Agencies Decide to Dig Up Contaminated Soil at Hanford Site- Federal and state agencies determine cleanup plans for four areas near central Hanford RICHLAND, Wash. -The Department of Energy (DOE) and the U.S. Environmental Protection Agency (EPA), in coordination with the Washington Department of Ecology, have made plans for remediating contaminated soil at

47

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

48

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 9520 of 28,905 results. 11 - 9520 of 28,905 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Download Letter: Transition of Closure Sites from the Office of Environmental Management to other DOE Organizations From: Deputy Secretary of Energy, Kyle E. McSlarrow (DS-1) To: Todd Martin, Chair, Hanford Advisory Board http://energy.gov/em/downloads/letter-transition-closure-sites-office-environmental-management-other Rebate Georgia Hazardous Site Response Act (Georgia)

49

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

50

JC3 High Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 5, 2013 V-211: IBM iNotes Multiple Vulnerabilities IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability August 2, 2013 V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated,

51

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 20830 of 28,560 results. 21 - 20830 of 28,560 results. Article Fall Is a Great Time for Energy Awareness Heating and cooling account for roughly 43% of an average home's energy use, so as the weather changes, how you use and save much of the energy for your home will obviously change as well. http://energy.gov/energysaver/articles/fall-great-time-energy-awareness Article Celebrate Earth Day! This year, April 22 marks the 40th anniversary of Earth Day. http://energy.gov/energysaver/articles/celebrate-earth-day Article The Newest Addition to the ENERGY STAR Lineup: Water Heaters Learn about ENERGY STAR-qualified water heaters for your home. http://energy.gov/energysaver/articles/newest-addition-energy-star-lineup-water-heaters Article T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML

52

T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

711: Fraudulent Google Digital Certificates Could Allow 711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks September 7, 2011 - 9:30am Addthis PROBLEM: A fraudulent Google.com digital certificate was issued by a certificate authority. This certificate could allow an unauthenticated, remote attacker to access sensitive user data via a man-in-the-middle attack. PLATFORM: Most Microsoft Windows operating systems, DigiNotar is a CA in the Trusted Root Certification Authorities certificate store. Multiple browsers, including Microsoft Internet Explorer, Google Chrome, and Mozilla Firefox could also be configured with the compromised CA as one of their trusted issuers. ABSTRACT: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle

53

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2013 14, 2013 V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities

54

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2011 29, 2011 U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. December 28, 2011 U-070:Redhat krb5 Critical Security Update Vulnerability can be exploited by malicious people to compromise a vulnerable system. December 27, 2011 U-069: Telnet code execution vulnerability: FreeBSD and Kerberos Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 23, 2011 U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities

55

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2013 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

56

2010 Google -Map data 2010 Google, Sanborn -Driving directions to St Peter Claver School  

E-Print Network (OSTI)

©2010 Google - Map data ©2010 Google, Sanborn - Driving directions to St Peter Claver School (504.google.com/maps?client=firefox-a&rls=org.mozilla:e... 1 of 2 9/2/10 10:45 AM #12;Hide Driving directions ©2010 Google Report a problem St Peter Claver School 1020 North Prieur Street New Orleans, LA 70116

57

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will access deleted memory (while JavaScript is disabled) and potentially execute arbitrary code on the target system CVE-2011-2373. A...

58

An empirical study of dangerous behaviors in firefox extensions  

Science Conference Proceedings (OSTI)

Browser extensions provide additional functionality and customization to browsers. To support such functionality, extensions interact with browsers through a set of APIs of different privilege levels. As shown in previous studies, browser extensions ...

Jiangang Wang; Xiaohong Li; Xuhui Liu; Xinshu Dong; Junjie Wang; Zhenkai Liang; Zhiyong Feng

2012-09-01T23:59:59.000Z

59

MULTIPLE TORNADO  

E-Print Network (OSTI)

The purpose of this note is to call attention to a preferred 1,000-500-mb. thickness line that in the mean accompanies multiple tornado outbreaks in the United States. Studies by Sutcliffe [I] and others have suggested that thickness patterns are a suitable synoptic tool for obtaining a picture of the three-dimensional structure of the atmosphere. SutclifFe and Forsdyke [2] have placed particular emphasis on charts showing the pattern of thickness of the 1,000-500-mb. layer. The contribution of the thickness pattern and the synoptic pressure patterns to the vorticity of the tornado is outside the scope of the present study. However, though much has been written concerning the value of such patterns in the evaluation of vertical motion and synoptic development, there has

Conrad P. Mook

1954-01-01T23:59:59.000Z

60

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT" "FORM EIA-912" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY NATURAL GAS MARKETER SURVEY" "FORM EIA-910" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

62

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY UNDERGROUND GAS STORAGE REPORT" "FORM EIA-191" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

63

Learning from multiple heuristics  

Science Conference Proceedings (OSTI)

Heuristic functions for single-agent search applications estimate the cost of the optimal solution. When multiple heuristics exist, taking their maximum is an effective way to combine them. A new technique is introduced for combining multiple heuristic ...

Mehdi Samadi; Ariel Felner; Jonathan Schaeffer

2008-07-01T23:59:59.000Z

64

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

Alger, T.W.

1994-09-06T23:59:59.000Z

65

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

66

Multiple shell fusion targets  

DOE Patents (OSTI)

Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

Lindl, J.D.; Bangerter, R.O.

1975-10-31T23:59:59.000Z

67

Photovoltaics: Separating Multiple Excitons  

Science Conference Proceedings (OSTI)

Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

Nozik, A. J.

2012-05-01T23:59:59.000Z

68

Learning from Multiple Outlooks  

E-Print Network (OSTI)

We consider semi-supervised learning from multiple outlooks of the same learning task, that is, learning from different representations of the same type of data. As opposed to learning from multiple views where it is assumed that the exact same instances have multiple representations, we only assume the availability of samples of the same learning task in different domains. We develop an algorithmic framework that is based on mapping the (unlabeled) data followed by adjusting the mapping using the scarcer labeled data. The mapped data from all the outlooks can then be used for a generic classification algorithm. We further provide sample complexity results under the assumption that the different outlooks are inherently low dimension Gaussian mixtures. Experiments with real-world data indicate the performance boost from using multiple outlooks.

Gal-on, Maayan

2010-01-01T23:59:59.000Z

69

Pyrochemical multiplicity counter development  

Science Conference Proceedings (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

70

Multiple stage multiple filter hydrate store  

DOE Patents (OSTI)

An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

Bjorkman, H.K. Jr.

1983-05-31T23:59:59.000Z

71

FOURIER TRANSFORM MULTIPLE QUANTUM NMR  

E-Print Network (OSTI)

TRANSFORM MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.TRANSFO~~ MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.

Drobny, G.

2011-01-01T23:59:59.000Z

72

Multiple sort flow cytometer  

DOE Patents (OSTI)

A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

1996-01-01T23:59:59.000Z

73

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

74

Multiple gap photovoltaic device  

DOE Patents (OSTI)

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

75

Multiple System Rate Process  

NLE Websites -- All DOE Office Websites (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

76

Portable multiplicity counter  

DOE Patents (OSTI)

A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

Newell, Matthew R. (Los Alamos, NM); Jones, David Carl (Los Alamos, NM)

2009-09-01T23:59:59.000Z

77

Multiple sclerosis and interferon  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

78

Bioenergy KDF  

NLE Websites -- All DOE Office Websites (Extended Search)

Navigation Navigation Home Sign-In Contact Us Register Search this site: Search Connect: Bioenergy Library Map Tools & Apps Overview The Bioenergy KDF supports the development of a sustainable bioenergy industry by providing access to a variety of data sets, publications, and collaboration and mapping tools that support bioenergy research, analysis, and decision making. In the KDF, users can search for information, contribute data, and use the tools and map interface to synthesize, analyze, and visualize information in a spatially integrated manner. Read more and watch a short walkthrough video lease note: The KDF works best in the Google Chrome or Mozilla Firefox browsers. What Would You Like to Do? CONTRIBUTE DATA Fill out the contribute form to add data sets and other types of

79

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2012 20, 2012 U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses A remote user can spoof SMS source addresses. August 17, 2012 U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. August 16, 2012 U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. August 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary

80

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: cURL Lets Remote Users Decrypt SSL/TLS Traffic 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Phase-multiplication holography  

DOE Patents (OSTI)

This disclosure relates generally to nondestructive testing for identifying structural characteristics of an object by scanned holographic techniques using a known source of radiation, such as electromagnetic or acoustical radiation. It is an object of this invention to provide an apparatus and method for synthetic aperture expansion in holographic imaging applications to construct fringe patterns capable of holographic reproduction where aperture restrictions in nondestructive testing applications would conventionally make such imaging techniques impossible. The apparatus and method result in the production of a sharply defined frontal image of structural characteristics which could not otherwise be imaged because they occur either near the surface of the object or are confined by geometry restricting aperture dimensions available for scanning purposes. The depth of the structural characteristic below the surface of the object can also be determined by the reconstruction parameters which produce the sharpest focus. Lateral resolution is established by simulated reduction in the radiation wavelength and may easily be an order of magnitude less than the electromagnetic wavelength in the material or 2 times the standard depth of penetration. Since the phase multiplication technique is performed on the detected data, the penetration depth available due to the longer wavelength signals applied to the test object remains unchanged. The phase multiplication technique can also be applied to low frequency acoustic holography, resulting in a test which combines excellent penetration of difficult materials with high resolution images.

Collins, H.D.; Prince, J.M.; Davis, T.J.

1982-01-25T23:59:59.000Z

82

Multiple capillary biochemical analyzer  

DOE Patents (OSTI)

A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

Dovichi, N.J.; Zhang, J.Z.

1995-08-08T23:59:59.000Z

83

Multiple layer insulation cover  

DOE Patents (OSTI)

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

84

Traits and Multiple Genes  

NLE Websites -- All DOE Office Websites (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

85

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28280 of 31,917 results. 71 - 28280 of 31,917 results. Article T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. http://energy.gov/cio/articles/t-652-mozilla-thunderbird-bugs-let-remote-users-obtain-cookies-and-execute-arbitrary Article T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. http://energy.gov/cio/articles/t-546-microsoft-mhtml-input-validation-hole-may-permit-cross-site-scripting-attacks

86

Multiple stage railgun  

DOE Patents (OSTI)

A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

Hawke, Ronald S. (Livermore, CA); Scudder, Jonathan K. (Pleasanton, CA); Aaland, Kristian (Livermore, CA)

1982-01-01T23:59:59.000Z

87

Usability in multiple monitor displays  

Science Conference Proceedings (OSTI)

An experimental study was conducted to examine the impact of multiple monitors on user performance and multitasking. Forty-three participants were assigned to two groups - a multi-monitor group and a singlemonitor group - to carry out a series of tasks. ... Keywords: large display monitor, multiple monitors, multitasking, usability, user performance

Jacob M. Truemper; Hong Sheng; Michael G. Hilgers; Richard H. Hall; Morris Kalliny; Basanta Tandon

2008-10-01T23:59:59.000Z

88

Anomaly Detection at Multiple Scales  

Science Conference Proceedings (OSTI)

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Anomaly Detection at Multiple Scales, or ADAMS, is a $35 million DARPA project designed to identify patterns and anomalies ...

Alain Sren Mikhayhu

2012-06-01T23:59:59.000Z

89

Multiple Specialization of WAM Code  

Science Conference Proceedings (OSTI)

Program specialization is normally supported by global analysis of the program. Compilers use the information deduced to generate more efficient, specialized implementations of the program. This specialization can be single or multiple, depending if ...

Michel Ferreira; Lus Damas

1999-01-01T23:59:59.000Z

90

Parallel progressive multiple sequence alignment  

Science Conference Proceedings (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

91

Federal Energy Management Program: Multiple Motivations Institutional  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

92

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

93

Robust Multiple Car Tracking With Occlusion Reasoning  

E-Print Network (OSTI)

BERKELEY Robust Multiple Car Tracking with OcclusionAND HIGHWAYS Robust Multiple Car Tracking with Occlusiondraws decisions like "stalled car in lane 2 detected", "high

Koler, Dieter; Weber, Joseph; Malik, Jitendra

1994-01-01T23:59:59.000Z

94

Normalized Compression Distance of Multiples  

E-Print Network (OSTI)

Normalized compression distance (NCD) is a parameter-free similarity measure based on compression. The NCD between pairs of objects is not sufficient for all applications. We propose an NCD of finite multisets (multiples) of objacts that is metric and is better for many applications. Previously, attempts to obtain such an NCD failed. We use the theoretical notion of Kolmogorov complexity that for practical purposes is approximated from above by the length of the compressed version of the file involved, using a real-world compression program. We applied the new NCD for multiples to retinal progenitor cell questions that were earlier treated with the pairwise NCD. Here we get significantly better results. We also applied the NCD for multiples to synthetic time sequence data. The preliminary results are as good as nearest neighbor Euclidean classifier.

Cohen, Andrew R

2012-01-01T23:59:59.000Z

95

Constraining multiple systems with GAIA  

E-Print Network (OSTI)

GAIA will provide observations of some multiple asteroid and dwarf systems. These observations are a way to determine and improve the quantification of dynamical parameters, such as the masses and the gravity fields, in these multiple systems. Here we investigate this problem in the cases of Pluto's and Eugenia's system. We simulate observations reproducing an approximate planning of the GAIA observations for both systems, as well as the New Horizons observations of Pluto. We have developed a numerical model reproducing the specific behavior of multiple asteroid system around the Sun and fit it to the simulated observations using least-square method, giving the uncertainties on the fitted parameters. We found that GAIA will improve significantly the precision of Pluto's and Charon's mass, as well as Petit Prince's orbital elements and Eugenia's polar oblateness.

Beauvalet, L; Arlot, J -E; Bancelin, D; Binzel, R P; Marchis, F

2012-01-01T23:59:59.000Z

96

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, Emanuel M. (Los Alamos, NM); Nunnally, William C. (Los Alamos, NM)

1988-01-01T23:59:59.000Z

97

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

98

Multiple Partonic Interactions in Herwig++  

E-Print Network (OSTI)

We review the implementation of a model for multiple partonic interactions in Herwig++. Moreover, we show how recent studies on the colour structure of events in Herwig++ led to a significant improvement in the description of soft inclusive observables in pp interactions at the LHC.

Stefan Gieseke; Christian Rohr; Andrzej Siodmok

2013-02-20T23:59:59.000Z

99

Multiple target laser ablation system  

DOE Patents (OSTI)

A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film.

Mashburn, Douglas N. (Knoxville, TN)

1996-01-01T23:59:59.000Z

100

Multiple Uses of Substation Data  

Science Conference Proceedings (OSTI)

This report describes a suite of modules developed under the Multiple Uses of Substation Data project. The modules are aimed at the integration and automated analysis of data coming from several Intelligent Electronic Devices (IEDs) such as Digital Protective Relays, Digital Fault Recorders and Circuit Breaker Monitors. Once data are collected, automated analysis processes the files to extract relevant information. The modules convert non-operational data to information that may be used by variety of app...

2008-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Improving feedback from multiple choice tests  

Science Conference Proceedings (OSTI)

Providing individual feedback to large groups of students can be difficult. By asking students to record their confidence in multiple choice test answers the quality of feedback can be improved. In a "multiple choice question" (MCQ) test the student ...

William Fone

2002-06-01T23:59:59.000Z

102

Multiple piece turbine rotor blade  

DOE Patents (OSTI)

A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

Jones, Russell B; Fedock, John A

2013-05-21T23:59:59.000Z

103

Multiple channel programmable coincidence counter  

DOE Patents (OSTI)

A programmable digital coincidence counter having multiple channels and featuring minimal dead time. Neutron detectors supply electrical pulses to a synchronizing circuit which in turn inputs derandomized pulses to an adding circuit. A random access memory circuit connected as a programmable length shift register receives and shifts the sum of the pulses, and outputs to a serializer. A counter is input by the adding circuit and downcounted by the serializer, one pulse at a time. The decoded contents of the counter after each decrement is output to scalers.

Arnone, G.J.

1989-02-27T23:59:59.000Z

104

Visual secret sharing for multiple secrets  

Science Conference Proceedings (OSTI)

Conventional visual secret sharing schemes are designed for a single secret image so it is inefficient to generate numerous share images for multiple secret images simultaneously. Therefore, a novel visual secret sharing scheme for multiple secret images ... Keywords: Multiple secret sharing, Visual cryptography, Visual pattern, Visual secret sharing

Jen-Bang Feng; Hsien-Chu Wu; Chwei-Shyong Tsai; Ya-Fen Chang; Yen-Ping Chu

2008-12-01T23:59:59.000Z

105

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

Crawley, H. Bert (Ames, IA); Rosenberg, Eli I. (Ames, IA); Meyer, W. Thomas (Ames, IA); Gorbics, Mark S. (Ames, IA); Thomas, William D. (Boone, IA); McKay, Roy L. (Ames, IA); Homer, Jr., John F. (Ames, IA)

1990-05-22T23:59:59.000Z

106

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

1990-05-22T23:59:59.000Z

107

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 22, 2013 February 22, 2013 V-097: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java.

108

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 21, 2013 February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java. February 15, 2013 V-092: Pidgin Multiple Vulnerabilities Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. February 14, 2013

109

Hereditary Multiple Exostoses with Pseudoaneurysm  

Science Conference Proceedings (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

110

V-207: Wireshark Multiple Denial of Service Vulnerabilities ...  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

111

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple...

112

V-019: Google Chrome Multiple Vulnerabilities | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Google Chrome Multiple Vulnerabilities V-019: Google Chrome Multiple Vulnerabilities November 8, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

113

Integrated Inverter Control for Multiple Electric Machines ...  

Wind Energy; Partners (27 ... control for directing multiple inverters with a single ... 57, 62), which may include a three-phase main ...

114

Management of multiple-use commons.  

E-Print Network (OSTI)

??This thesis addresses an example of multiple-use commons problems: the case of land use for forestry and reindeer husbandry. Forestry use land for industrial purposes (more)

Widmark, Camilla

2009-01-01T23:59:59.000Z

115

Implementation of multiple specialization in logic programs  

Science Conference Proceedings (OSTI)

Keywords: abstract interpretation, compile-time analysis, direct manipulation, distributed computing, graphical user interfaces, logic programming, multimedia, multiple program specialization, optimization, reconfiguration, user interface management system

Germn Puebla; Manuel Hermenegildo

1995-06-01T23:59:59.000Z

116

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE  

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE USDOE Aluminum Chromium Leaching Workshop January 24th, 2007 Jennifer E. Holland, Ph.D. Chairman, President, CEO

117

Development of multiple robotic fish cooperation platform  

Science Conference Proceedings (OSTI)

This article presents the development of a multiple robotic fish cooperation platform, which is established by employing a group of radio-controlled, multi-link fish-like robots. This work is inspired by the observation from nature that the capability ... Keywords: Multi-agent system, Multiple robot cooperation, Platform, Robotic fish

Jinyan Shao; Long Wang; Junzhi Yu

2007-03-01T23:59:59.000Z

118

Multiple attributes analysis of vegetable production  

Science Conference Proceedings (OSTI)

This paper shows the possibility of some multiple criteria decision-making methods in agricultural enterprise decisions. In practice humans often meet multi-criteria decision problems. The success of every organization depends, among other things, on ... Keywords: AHP, ORESTE, TOPSIS, WSM, agricultural decision, multiple attribute decision methods

Martin Mat?j?ek; Helena Broov

2011-04-01T23:59:59.000Z

119

External and mental referencing of multiple representations  

Science Conference Proceedings (OSTI)

This article reports on two experimental studies that investigate the impact of integration and external activity on an instructional support method that encourages learners to systematically and interactively integrate multiple representations in the ... Keywords: Cognitive load, Coherence formation, Multimedia, Multiple representations, Structure mapping, Visualizations

Daniel Bodemer; Uwe Faust

2006-01-01T23:59:59.000Z

120

PJM Interconnection (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Multiple predictor smoothing methods for sensitivity analysis  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric ...

Curtis B. Storlie; Jon C. Helton

2005-12-01T23:59:59.000Z

122

A Bistatic Multiple-Doppler Radar Network  

Science Conference Proceedings (OSTI)

A multiple-Doppler radar network can be constructed using only one, traditional, transmitting pencil-beam radar and one or more passive, low-gain, nontransmitting receivers at remote sites. Radiation scattered from the pencil beam of the ...

Joshua Wurman; Stanley Heckman; Dennis Boccippio

1993-12-01T23:59:59.000Z

123

Multiple signal fault detection using fuzzy logic  

Science Conference Proceedings (OSTI)

In this paper, we describe a multiple Signal Fault Detection system that employs fuzzy logic at two levels of detection: signal segment fault and signal fault. The system involves signal segmentation, feature extraction and fuzzy logic based segment ...

Yi Lu Murphey; Jacob Crossman; ZhiHang Chen

2003-06-01T23:59:59.000Z

124

Engine control system for multiple combustion modes  

Science Conference Proceedings (OSTI)

To reduce the emission by Diesel-engine in railway traction, continuous development and innovation in combustion, sensing net, control method and strategies are required to met the legal requirements. Multiple combustion modes by Diesel engines can reduce ...

D. Bonta; V. Tulbure; Cl. Festila

2008-05-01T23:59:59.000Z

125

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

126

Minimizing Errors Associated with Multiplate Radiation Shields  

Science Conference Proceedings (OSTI)

Multiplate radiation shield errors are examined using the following techniques: 1) ray tracing analysis, 2) wind tunnel experiments, 3) numerical flow simulations, and 4) field testing. The authors objectives are to develop guidelines for ...

Scott J. Richardson; Fred V. Brock; Steven R. Semmer; Cathy Jirak

1999-11-01T23:59:59.000Z

127

Persistent Multiple Jets and PV Staircase  

Science Conference Proceedings (OSTI)

The persistence of multiple jets is investigated with a quasigeostrophic, two-layer, ?-plane channel model. Linearly unstable normal modes are found to be capable of qualitatively describing the eddy fluxes of the nonlinear model. For a ...

Changhyun Yoo; Sukyoung Lee

2010-07-01T23:59:59.000Z

128

Visualizing Multiple Measures of Forecast Quality  

Science Conference Proceedings (OSTI)

A method for visually representing multiple measures of dichotomous (yesno) forecast quality (probability of detection, false alarm ratio, bias, and critical success index) in a single diagram is presented. Illustration of the method is provided ...

Paul J. Roebber

2009-04-01T23:59:59.000Z

129

Satellite Remote Sensing of Multiple Cloud Layers  

Science Conference Proceedings (OSTI)

The goals of the current study are threefold: 1) to present a multispectral, multiresolution (MSMR) methodology for analysis of scenes containing multiple cloud layers; 2) to apply the MSMR method to two multilevel cloud scenes recorded by the ...

B.A. Baum; T. Uttal; M. Poellot; T.P. Ackerman; J.M. Alvarez; J. Intrieri; D.O'C. Starr; J. Titlow; V. Tovinkere; E. Clothiaux

1995-12-01T23:59:59.000Z

130

Multiple-description multistage vector quantization  

Science Conference Proceedings (OSTI)

Multistage vector quantization (MSVQ) is a technique for low complexity implementation of high-dimensional quantizers, which has found applications within speech, audio, and image coding. In this paper, a multiple-description MSVQ (MD-MSVQ) targeted ...

Pradeepa Yahampath

2007-07-01T23:59:59.000Z

131

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

132

Review: Independent component analysis for multiple-input multiple-output wireless communication systems  

Science Conference Proceedings (OSTI)

Independent component analysis (ICA), an efficient higher order statistics (HOS) based blind source separation technique, has been successfully applied in various fields. In this paper, we provide an overview of the applications of ICA in multiple-input ... Keywords: Frequency-domain equalization (FDE), I/Q imbalance, Independent component analysis (ICA), Multiple-input multiple-output (MIMO), Orthogonal frequency-division multiplexing (OFDM), Peak-to-average power ratio (PAPR)

J. Gao; X. Zhu; A. K. Nandi

2011-04-01T23:59:59.000Z

133

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

134

Experiment on a Modeling of Positive Electrodes with Multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Experiment on a Modeling of Positive Electrodes with Multiple Active Materials for Lithium-Ion Batteries Title Experiment on a Modeling of Positive Electrodes with Multiple Active...

135

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

136

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

137

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

138

Stereo matching via selective multiple windows  

E-Print Network (OSTI)

Window-based correlation algorithms are widely used for stereo matching due to their computational efficiency as compared to global algorithms. In this paper, a multiple window correlation algorithm for stereo matching is presented which addresses the problems associated with a fixed window size. The developed algorithm differs from the previous multiple window algorithms by introducing a reliability test to select the most reliable window among multiple windows of increasing sizes. This ensures that at least one window is large enough to cover a region of adequate intensity variations while at the same time small enough to cover a constant depth region. A recursive computation procedure is also used to allow a computationally efficient implementation of the algorithm. The outcome obtained from a standard set of images with known disparity maps shows that the generated disparity maps are more accurate as compared to two popular stereo matching local algorithms.

Satyajit Anil Adhyapak; Nasser Kehtarnavaz; Mihai Nadin

2007-01-01T23:59:59.000Z

139

Beam profiles from multiple aperture sources  

SciTech Connect

Using a rapidly convergent approximation scheme, formulas are given for beam intensity profiles everywhere. In the first approximation, formulas are found for multiple aperture sources, such as a TFTR design, and integrated power for rectangular plates downstream for Gaussian beamlets. This analysis is duplicated for Lorentzian beamlets which should provide a probable upper bound for off-axis loading as Gaussian beamlets provide a probable lower bound. Formulas for beam intensity profiles are found everywhere. In first approximation, formulas are found for downstream intensity of multiple sources and integrated power for rectangular plates.

Whealton, J.H.

1979-02-01T23:59:59.000Z

140

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, in the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1977-01-01T23:59:59.000Z

142

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1987-01-01T23:59:59.000Z

143

Volumetric stem biomass modelling using multiple regression  

Science Conference Proceedings (OSTI)

This paper presented the development of a simple model for obtaining the stem volume of a tropical tree species, that is, Cinnamomum iners based on the two volumetric equations, namely, the Huber's and Newton's equations. Variables considered during ... Keywords: best model, correlation tests, interactions, multiple regression, selection criteria, stem volume, volumetric equations

Noraini Abdullah; Zainodin Hj. Jubok; J. B. Nigel Jonney

2007-12-01T23:59:59.000Z

144

Clustering local frequency items in multiple databases  

Science Conference Proceedings (OSTI)

Frequent items could be considered as a basic type of patterns in a database. In the context of multiple data sources, most of the global patterns are based on local frequency items. A multi-branch company transacting from different branches often needs ... Keywords: Association, Clustering, Data mining, Measure of association, Multi-database mining

Animesh Adhikari

2013-07-01T23:59:59.000Z

145

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2013-01-01T23:59:59.000Z

146

Ensemble smoother with multiple data assimilation  

Science Conference Proceedings (OSTI)

In the last decade, ensemble-based methods have been widely investigated and applied for data assimilation of flow problems associated with atmospheric physics and petroleum reservoir history matching. This paper focuses entirely on the reservoir history-matching ... Keywords: Ensemble Kalman filter, Ensemble smoother, History matching, Multiple data assimilation

Alexandre A. Emerick, Albert C. Reynolds

2013-06-01T23:59:59.000Z

147

Steady water waves with multiple critical layers  

E-Print Network (OSTI)

We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

Mats Ehrnstrm; Joachim Escher; Erik Wahln

2010-04-29T23:59:59.000Z

148

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2012-01-01T23:59:59.000Z

149

Multiple kernel learning with gaussianity measures  

Science Conference Proceedings (OSTI)

Kernel methods are known to be effective for nonlinear multivariate analysis. One of the main issues in the practical use of kernel methods is the selection of kernel. There have been a lot of studies on kernel selection and kernel learning. Multiple ...

Hideitsu Hino; Nima Reyhani; Noboru Murata

2012-07-01T23:59:59.000Z

150

Multiple Input Microcantilever Sensor with Capacitive Readout  

DOE Green Energy (OSTI)

A surface-micromachined MEMS process has been used to demonstrate multiple-input chemical sensing using selectively coated cantilever arrays. Combined hydrogen and mercury-vapor detection was achieved with a palm-sized, self-powered module with spread-spectrum telemetry reporting.

Britton, C.L., Jr.; Brown, G.M.; Bryan, W.L.; Clonts, L.G.; DePriest, J.C.; Emergy, M.S.; Ericson, M.N.; Hu, Z.; Jones, R.L.; Moore, M.R.; Oden, P.I.; Rochelle, J.M.; Smith, S.F.; Threatt, T.D.; Thundat, T.; Turner, G.W.; Warmack, R.J.; Wintenberg, A.L.

1999-03-11T23:59:59.000Z

151

bu.edu/eng26 Managing Multiple,  

E-Print Network (OSTI)

the workload for human operators of semi-autonomous underwater, ground and aerial vehicles in military's computer code can follow, and thus survey a defined space. ROBOTICS #12;27 A persistent surveillance scenario in which multiple agents coordinate to survey a complex scene with areas weighted by importance

Goldberg, Bennett

152

Route to direct multiphoton multiple ionization  

Science Conference Proceedings (OSTI)

We address the concept of direct multiphoton multiple ionization in atoms exposed to intense, short-wavelength radiation and explore the conditions under which such processes dominate over the sequential. Their contribution is shown to be quite robust, even under intensity fluctuations and interaction volume integration, and reasonable agreement with experimental data is also found.

Lambropoulos, P. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Nikolopoulos, G. M. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Papamihail, K. G. [Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece)

2011-02-15T23:59:59.000Z

153

A material's multiple personalities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

154

Multiple Scattering Measurements in the MICE Experiment  

Science Conference Proceedings (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

155

Evaluation of multiple emission point facilities  

SciTech Connect

In 1970, the New York State Department of Environmental Conservation (NYSDEC) assumed responsibility for the environmental aspect of the state's regulatory program for by-product, source, and special nuclear material. The major objective of this study was to provide consultation to NYSDEC and the US NRC to assist NYSDEC in determining if broad-based licensed facilities with multiple emission points were in compliance with NYCRR Part 380. Under this contract, BNL would evaluate a multiple emission point facility, identified by NYSDEC, as a case study. The review would be a nonbinding evaluation of the facility to determine likely dispersion characteristics, compliance with specified release limits, and implementation of the ALARA philosophy regarding effluent release practices. From the data collected, guidance as to areas of future investigation and the impact of new federal regulations were to be developed. Reported here is the case study for the University of Rochester, Strong Memorial Medical Center and Riverside Campus.

Miltenberger, R.P.; Hull, A.P.; Strachan, S.; Tichler, J.

1988-01-01T23:59:59.000Z

156

Subcritical Measurments Multiple HEU Metal Castings  

SciTech Connect

Experiments with the standard annular highly enriched uranium (HEU) metal castings at the Y-12 National Security Complex were performed in which up to five castings ({approx}90 kg) were assembled in a tightly packed array with minimal spacing between castings. The fission chain multiplication process was initiated by a time-tagged {sup 252}Cf spontaneously fissioning neutron source or by time and directionally tagged neutrons from a small portable DT neutron generator. The prompt neutron time behavior was measured with plastic scintillation detectors sensitive to the fast neutron (>1 MeV) and gamma ray without distinction. These experiments were performed to provide data to benchmark methods for the calculation of the prompt neutron time behavior. Previous measurements with a single casting have been reported. This paper presents the experimental results for multiple castings.

Mihalczo, John T [ORNL; Archer, Daniel E [ORNL; Wright, Michael C [ORNL; Mullens, James Allen [ORNL

2008-01-01T23:59:59.000Z

157

MCNP6 Fission Multiplicity with FMULT Card  

Science Conference Proceedings (OSTI)

With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

Wilcox, Trevor [Los Alamos National Laboratory; Fensin, Michael Lorne [Los Alamos National Laboratory; Hendricks, John S. [Los Alamos National Laboratory; James, Michael R. [Los Alamos National Laboratory; McKinney, Gregg W. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

158

Multiple Use of Existing Transmission Corridors  

Science Conference Proceedings (OSTI)

Multiple use utility corridors can provide significant benefits for the utilities and the public. However, increasing the power flow in the power system can raise compatibility issues with other utilities or systems that share the corridor. This report provides case studies of three common corridors for which compatibility issues were raised as a result of planned increases in power transmission capacity. The case studies review the criteria used to evaluate compatibility and the need for mitigation meas...

2007-12-18T23:59:59.000Z

159

Hiding the Higgs Boson with Multiple Scalars  

E-Print Network (OSTI)

We consider models with multiple Higgs scalar gauge singlets and the resulting restrictions on the parameters from precision electroweak measurements. In these models, the scalar singlets mix with the SU(2) Higgs doublet, potentially leading to reduced couplings of the scalars to fermions and gauge bosons relative to the Standard Model Higgs boson couplings. Such models can make the Higgs sector difficult to explore at the LHC. We emphasize the new physics resulting from the addition of at least two scalar Higgs singlets.

Sally Dawson; Wenbin Yan

2009-04-13T23:59:59.000Z

160

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

MacLennan, D.A.; Turner, B.; Kipling, K.

1999-05-11T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

MacLennan, Donald A. (Butler, PA); Turner, Brian (Damascus, MD); Kipling, Kent (Gaithersburg, MD)

1999-01-01T23:59:59.000Z

162

Multiple quantum coherence in HYSCORE spectra  

Science Conference Proceedings (OSTI)

The implementation of matched pulses in two-dimensional electron spin echo envelope modulation experiments results in a drastic increase in intensity of peaks representing nuclear multiple quantum coherence. For a spin system consisting of one electron spin S= 1 2 and two nuclei with spin I= 1 2 the nuclear coherence created by the sequence (?/2)???(?/2) is calculated. The transfer amplitudes between different kinds of nuclear coherences of a microwave ? pulse are given. A new matched HYSCORE pulse sequence

Lorenz Liesum; Arthur Schweiger

2001-01-01T23:59:59.000Z

163

MPACT Fast Neutron Multiplicity System Prototype Development  

Science Conference Proceedings (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

164

PARS II Process Document - Project Phasing (Multiple CD-2 from...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Phasing (Multiple CD-2 from Single CD-1) PARS II Process Document - Project Phasing (Multiple CD-2 from Single CD-1) This document details the process by which projects...

165

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

166

Expression of multiple proteins in transgenic plants  

DOE Patents (OSTI)

A method is disclosed for the production of multiple proteins in transgenic plants. A DNA construct for introduction into plants includes a provision to express a fusion protein of two proteins of interest joined by a linking domain including plant ubiquitin. When the fusion protein is produced in the cells of a transgenic plant transformed with the DNA construction, native enzymes present in plant cells cleave the fusion protein to release both proteins of interest into the cells of the transgenic plant. Since the proteins are produced from the same fusion protein, the initial quantities of the proteins in the cells of the plant are approximately equal.

Vierstra, Richard D. (Madison, WI); Walker, Joseph M. (Madison, WI)

2002-01-01T23:59:59.000Z

167

Multiple volume compressor for hot gas engine  

DOE Patents (OSTI)

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

168

Multiplicative cascades and seismicity in natural time  

Science Conference Proceedings (OSTI)

Natural time chi enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance kappa{sub 1}(ident to-{sup 2}) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

Sarlis, N. V.; Skordas, E. S.; Varotsos, P. A. [Department of Physics, Solid State Section and Solid Earth Physics Institute, University of Athens, Panepistimiopolis, Zografos, 157 84 Athens (Greece)

2009-08-15T23:59:59.000Z

169

Statistical estimation of multiple faults in aircraft gas turbine engines  

E-Print Network (OSTI)

415 Statistical estimation of multiple faults in aircraft gas turbine engines S Sarkar, C Rao of multiple faults in aircraft gas-turbine engines, based on a statistical pattern recognition tool called commercial aircraft engine. Keywords: aircraft propulsion, gas turbine engines, multiple fault estimation

Ray, Asok

170

An extreme-distance approach to multiple criteria ranking  

Science Conference Proceedings (OSTI)

A distance approach based on extreme points, or predefined ideal and anti-ideal points, is proposed to improve on the TOPSIS (Technique for Order Performance [or Ordered Preference] by Similarity to Ideal Solution) method of multiple criteria ranking. ... Keywords: Comparative study, Distance-based ranking, Multiple criteria decision analysis, Multiple criteria ranking, TOPSIS

Ye Chen; D. Marc Kilgour; Keith W. Hipel

2011-03-01T23:59:59.000Z

171

A MULTIPLE-ITEM MULTIPLE-CONSTRAINT INVENTORY OPTIMIZATION AND SUPPLIER SELECTION MODEL UNDER LEAD TIME DEMAND UNCERTAINTY.  

E-Print Network (OSTI)

??The objective of this thesis is to solve a multiple-item, one-retailer inventory control and supplier selection problem with multiple constraints and uncertainties. For each item, (more)

Zhu, Rongjia

2009-01-01T23:59:59.000Z

172

Multiple output timing and trigger generator  

SciTech Connect

In support of the development of a multiple stage pulse modulator at the Los Alamos National Laboratory, we have developed a first generation, multiple output timing and trigger generator. Exploiting Commercial Off The Shelf (COTS) Micro Controller Units (MCU's), the timing and trigger generator provides 32 independent outputs with a timing resolution of about 500 ns. The timing and trigger generator system is comprised of two MCU boards and a single PC. One of the MCU boards performs the functions of the timing and signal generation (the timing controller) while the second MCU board accepts commands from the PC and provides the timing instructions to the timing controller. The PC provides the user interface for adjusting the on and off timing for each of the output signals. This system provides 32 output or timing signals which can be pre-programmed to be in an on or off state for each of 64 time steps. The width or duration of each of the 64 time steps is programmable from 2 {micro}s to 2.5 ms with a minimum time resolution of 500 ns. The repetition rate of the programmed pulse train is only limited by the time duration of the programmed event. This paper describes the design and function of the timing and trigger generator system and software including test results and measurements.

Wheat, Robert M. [Los Alamos National Laboratory; Dale, Gregory E [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

173

Energy-Efficient Matrix Multiplication on FPGAs  

E-Print Network (OSTI)

We develop new algorithms and architectures for matrix multiplication on configurable devices. These designs significantly reduce the energy dissipation and latency compared with the state-of-the-art FPGA-based designs. We derive functions to represent the impact of algorithmic level design choices on the system-wide energy dissipation, latency, and area by capturing algorithm and architecture details including features of the target FPGA. The functions are used to optimize energy performance under latency and area constraints for a family of candidate algorithms and architectures. As a result, our designs improve the energy performance of the optimized design from the recent Xilinx library by 32% to 88% without any increase in area-latency product. In terms of comprehensive metrics such as EAT (Energy-Area-Time) and E/AT (Energy/Area-Time), our designs offer superior performance compared with the Xilinx design by 50%-79% and 13%-44%, respectively. We also address how to exploit further increases in density of future FPGA devices for asymptotic improvement in latency and energy dissipation for multiplication of larger size matrices.

Ju-wook Jang; Seonil Choi; Viktor K. Prasanna

2002-01-01T23:59:59.000Z

174

Performance of joint transmit scheme assisted multiple-input multiple-output multi-carrier IDMA system  

Science Conference Proceedings (OSTI)

In this paper, we present the performance of a multiple-input multiple-output multi-carrier interleave division multiple access (MC-IDMA) system assisted by combined vertical Bell Laboratories layered space-time architecture and space-time block code ...

K. S. Vishvaksenan, R. Seshasayanan, Yuvaraj Krishnamoorthy

2013-04-01T23:59:59.000Z

175

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

176

Automatic Commissioning of Multiple VAV Terminals  

E-Print Network (OSTI)

A site survey on a modern operating commercial building screened 261 ineffective VAV (Variable Air Volume) boxes (20.9% of the total boxes in the building) and summarized ten typical faults for VAV air-conditioning system(s) resulting in energy waste, performance degradation or totally out of control. A strategy is developed to automatically check the health condition of VAV terminals and diagnose the faults. Hybrid approach is employed to establish a commissioning and re-commissioning tool of VAV air-conditioning system. Performance indices with expert rules based on system physical characteristics are adopted to detect and diagnose the nine of the ten faults. PCA (Principal Component Analysis) method is developed to detect and diagnose the VAV box flow sensor bias (Fault 10) and to reconstruct the faulty sensors. A multiple VAV fault FDD strategy for a VAV entire system is developed, which is validated in simulation and filed tests.

Qin, J.; Wang, S.

2004-01-01T23:59:59.000Z

177

Multi-Stage Multiple-Hypothesis Tracking  

E-Print Network (OSTI)

While multiple hypothesis tracking (MHT) is widely acknowledged as an effective methodology for multi-target surveillance, there is a challenge to manage effectively a potentially large number of track hypotheses. Advanced single-stage track-while-fuse does not always offer the best processing scheme. We study two instances where multi-stage MHT processing is beneficialdense target scenarios and complementary-sensor surveillanceand propose two processing schemes for these challenges: track-break-fuse and trackbefore-fuse, respectively. We provide simulation results demonstrating the advantages of these schemes over track-while-fuse. Moregenerally, we argue that multi-stage MHT offers a powerful and flexible paradigm to circumvent limitations in conventional MHT processing.

Stefano Coraluppi; Craig Carthel

2009-01-01T23:59:59.000Z

178

Multiple hearth furnace for reducing iron oxide  

SciTech Connect

A multiple moving hearth furnace (10) having a furnace housing (11) with at least two moving hearths (20) positioned laterally within the furnace housing, the hearths moving in opposite directions and each moving hearth (20) capable of being charged with at least one layer of iron oxide and carbon bearing material at one end, and being capable of discharging reduced material at the other end. A heat insulating partition (92) is positioned between adjacent moving hearths of at least portions of the conversion zones (13), and is capable of communicating gases between the atmospheres of the conversion zones of adjacent moving hearths. A drying/preheat zone (12), a conversion zone (13), and optionally a cooling zone (15) are sequentially positioned along each moving hearth (30) in the furnace housing (11).

Brandon, Mark M. (Charlotte, NC); True, Bradford G. (Charlotte, NC)

2012-03-13T23:59:59.000Z

179

Multiple predictor smoothing methods for sensitivity analysis.  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

180

MULTIPLICITY AMONG F-TYPE STARS  

SciTech Connect

As part of a homogeneous all-sky volume-complete sample of half a thousand solar-type stars within 25 pc we present a census for the subset of the 150-mostly F-type stars-in the mass range 1.1 M{sub Sun} {<=} M {<=} 1.7 M{sub Sun} in terms of their observed multiplicities. The major obstacle, as expected, arises from the onset of stellar rotation in this mass range for it continues to support many hidden companions. Yet, a solid increase of the fraction of binary and higher level systems as a function of the primary mass is manifest. There is even the prospect that on account of many companion candidates the single-star fraction may already converge to zero at the transition to the A-type stars.

Fuhrmann, K.; Chini, R., E-mail: klaus@ing.iac.es [Astronomisches Institut, Ruhr-Universitaet Bochum, Universitaetsstrasse 150, D-44801 Bochum (Germany)

2012-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

MPACT Fast Neutron Multiplicity System Design Concepts  

Science Conference Proceedings (OSTI)

This report documents work performed by Idaho National Laboratory and the University of Michigan in fiscal year (FY) 2012 to examine design parameters related to the use of fast-neutron multiplicity counting for assaying plutonium for materials protection, accountancy, and control purposes. This project seeks to develop a new type of neutron-measurement-based plutonium assay instrument suited for assaying advanced fuel cycle materials. Some current-concept advanced fuels contain high concentrations of plutonium; some of these concept fuels also contain other fissionable actinides besides plutonium. Because of these attributes the neutron emission rates of these new fuels may be much higher, and more difficult to interpret, than measurements made of plutonium-only materials. Fast neutron multiplicity analysis is one approach for assaying these advanced nuclear fuels. Studies have been performed to assess the conceptual performance capabilities of a fast-neutron multiplicity counter for assaying plutonium. Comparisons have been made to evaluate the potential improvements and benefits of fast-neutron multiplicity analyses versus traditional thermal-neutron counting systems. Fast-neutron instrumentation, using for example an array of liquid scintillators such as EJ-309, have the potential to either a) significantly reduce assay measurement times versus traditional approaches, for comparable measurement precision values, b) significantly improve assay precision values, for measurement durations comparable to current-generation technology, or c) moderating improve both measurement precision and measurement durations versus current-generation technology. Using the MCNPX-PoliMi Monte Carlo simulation code, studies have been performed to assess the doubles-detection efficiency for a variety of counter layouts of cylindrical liquid scintillator detector cells over one, two, and three rows. Ignoring other considerations, the best detector design is the one with the most detecting volume. However, operational limitations guide a) the maximum acceptable size of each detector cell (due to PSD performance and maximum-acceptable per-channel data throughput rates, limited by pulse pile-up and the processing rate of the electronics components of the system) and b) the affordability of a system due to the number of total channels of data to be collected and processed. As a first estimate, it appears that a system comprised of two rows of detectors 5" ? 3" would yield a working prototype system with excellent performance capabilities for assaying Pu-containing items and capable of handling high signal rates likely when measuring items with Pu and other actinides. However, it is still likely that gamma-ray shielding will be needed to reduce the total signal rate in the detectors. As a first step prior to working with these larger-sized detectors, it may be practical to perform scoping studies using small detectors, such as already-on-hand 3" ? 3" detectors.

D. L. Chichester; S. A. Pozzi; J. L. Dolan; M. T. Kinlaw; A. C. Kaplan; M. Flaska; A. Enqvist; J. T. Johnsom; S. M. Watson

2012-10-01T23:59:59.000Z

182

Multiple channel optical data acquisition system  

DOE Patents (OSTI)

A multiple channel optical data acquisition system is provided in which a plurality of remote sensors monitoring specific process variable are interrogated by means of a single optical fiber connecting the remote station/sensors to a base station. The remote station/sensors derive all power from light transmitted through the fiber from the base station. Each station/sensor is individually accessed by means of a light modulated address code sent over the fiber. The remote station/sensors use a single light emitting diode to both send and receive light signals to communicate with the base station and provide power for the remote station. The system described can power at least 100 remote station/sensors over an optical fiber one mile in length.

Fasching, G.E.; Goff, D.R.

1985-02-22T23:59:59.000Z

183

Multiple microprocessor based nuclear reactor power monitor  

SciTech Connect

The reactor power monitor is a portable multiple-microprocessor controlled data acquisition device being built for the International Atomic Energy Association. Its function is to measure and record the hourly integrated operating thermal power level of a nuclear reactor for the purpose of detecting unannounced plutonium production. The monitor consists of a /sup 3/He proportional neutron detector, a write-only cassette tape drive and control electronics based on two INTEL 8748 microprocessors. The reactor power monitor operates from house power supplied by the plant operator, but has eight hours of battery backup to cover power interruptions. Both the hourly power levels and any line power interruptions are recorded on tape and in memory. Intermediate dumps from the memory to a data terminal or strip chart recorder can be performed without interrupting data collection.

Lewis, P.S.; Ethridge, C.D.

1979-01-01T23:59:59.000Z

184

Surface Microstructure Extraction from Multiple Aerial Images  

E-Print Network (OSTI)

In this paper we present a system that recovers building facet images from multiple source images and, as a first step towards detailed analysis of microstructures, extracts windows from walls. The system employs a sophisticated multi-image texture mapping technique to eliminate the corrupting effects of shadows and occlusions and to find a "best piece representation" of each facet. The system is model-driven, providing a context-based environment for microstructure analysis. The window extraction module focuses attention on wall facets, attempting to extract the 2-D window patterns attached to the walls using an oriented region growing technique. High-level knowledge is incorporated to simplify the computation of symbolic window extraction. The algorithms are typically useful in urban sites. Experiments show successful applications of this approach to site model refinement. Keywords: microstructure extraction, model refinement, texture mapping, aerial imagery, image understanding 1 I...

Xiaoguang Wang; Robert T. Collins; Jeff Dehart

1997-01-01T23:59:59.000Z

185

Early expansion in exploding multiple wire arrays  

Science Conference Proceedings (OSTI)

A simple model is developed for the initial stage (blow-off and the onset of pinching) of a multiple exploded wire array. With obvious modifications the model can also be applied to single wires or other self-pinched plasma columns. Each wire in the array is modeled as a plasma cylinder undergoing self-similar radial motion, and the whole array is coupled self-consistently to an external circuit. The plasma expands initially; the onset of self-pinch is shown to be coincident with the plasma conductivity reaching a value large enough for skin effect to occur. The model is run for a variety of system parameters, and the choice of machine and wire parameters to attain particular objectives (e.g., rapid current rise, limited wire expansion, etc.) is discussed.

Bloomberg, H.W.; Lampe, M.; Colombant, D.G.

1980-10-01T23:59:59.000Z

186

Time-resolved multiple probe spectroscopy  

SciTech Connect

Time-resolved multiple probe spectroscopy combines optical, electronic, and data acquisition capabilities to enable measurement of picosecond to millisecond time-resolved spectra within a single experiment, using a single activation pulse. This technology enables a wide range of dynamic processes to be studied on a single laser and sample system. The technique includes a 1 kHz pump, 10 kHz probe flash photolysis-like mode of acquisition (pump-probe-probe-probe, etc.), increasing the amount of information from each experiment. We demonstrate the capability of the instrument by measuring the photolysis of tungsten hexacarbonyl (W(CO){sub 6}) monitored by IR absorption spectroscopy, following picosecond vibrational cooling of product formation through to slower bimolecular diffusion reactions on the microsecond time scale.

Greetham, G. M.; Sole, D.; Clark, I. P.; Parker, A. W.; Pollard, M. R.; Towrie, M. [Central Laser Facility, Science and Technology Facilities Council, Research Complex at Harwell, Rutherford Appleton Laboratory, Harwell, Oxfordshire, OX11 0QX (United Kingdom)

2012-10-15T23:59:59.000Z

187

The multiple vortex nature of tropical cyclogenesis  

E-Print Network (OSTI)

This thesis contains an observational analysis of the genesis of Tropical Storm Allison (2001). Using a paradigm of tropical cyclone formation as the superposition of potential vorticity (PV) anomalies, the importance of different scales of PV merger to various aspects of Allison?s formation is discussed. While only the case of Allison is discussed in great detail, other studies have also documented PV superposition on various scales, and superposition could be important for most tropical cyclones. Preceding Allison?s genesis, PV superposition on the large scale destabilized the atmosphere and increased low-level cyclonic vorticity. This presented a more favorable environment for the formation of MCV-type PV anomalies and smaller, surface-based, meso-?-scale vortices. Although these vortices eventually merged to form a more concentrated vortex with stronger surface pressure gradients, the merger happened well after landfall of Allison and no strengthening ensued. The unstable, vorticity-rich environment was also favorable for the development of even smaller, meso-?-scale vortices that accompanied deep convective cells within one of Allison?s meso-?-scale vortices. The observations herein suggest that the meso-?- scale convective cells and vortices are the respective source of PV production and building blocks for the meso-?-scale vortices. Finally, this thesis discusses issues related to the multiple vortex nature of tropical cyclone formation. For instance, the tracking of developing tropical cyclones is greatly complicated by the presence of multiple vortices. For these cases, the paradigm of a single cyclone center is inappropriate and alternative tracking methods are introduced.

Sippel, Jason Allen

2004-12-01T23:59:59.000Z

188

Synchronous Squamous Cell Carcinoma in Multiple Digits  

E-Print Network (OSTI)

Cancers of the perionychium are relatively rare occurrences and are often related to chronic inflammation associated with trauma, infection, exposure to ultraviolet radiation, or other carcinogens. Squamous cell carcinoma is the most common tumor reported of the nail bed. Synchronous squamous cell carcinomas of the perionychium have been rarely reported. We present a case of a 46-year-old woman with synchronous squamous cell carcinomas involving both hands and multiple digits. Treatment modalities include chemotherapeutics, Mohs surgery, and amputation. Early diagnosis of squamous cell carcinoma of the nail bed provides the greatest chance to preserve maximal function of the hand. Onychomycosis may be the presenting symptom of a patient with squamous cell carcinoma and may also be a predisposing factor in patients with occupational risk factors. Suspicion of this disease process can help the clinician establish the diagnosis via biopsy and provide optimal care for these patients. Cancers of the perionychium are relatively rare occurrences and are often related to chronic inflammation associated with trauma, infection, exposure to ultraviolet radiation, or other carcinogens. Squamous cell carcinoma is the most common tumor reported of the nail bed. Synchronous squamous cell carcinomas of the perionychium have been rarely reported. We present a case of a 46-year-old woman with synchronous squamous cell carcinomas involving both hands and multiple digits. CASE REPORT A 46-year-old white female was referred from the dermatology clinic with a biopsy-proven squamous cell carcinoma of the left ring finger perionychium. Physical examination demonstrated erythematous scaly lesions with the absence of a nail plate at the left thumb, index Authors have no financial disclaimers or conflicts to disclose. 70 ABNER ET AT finger, and ring finger as well as the right long finger, without associated lymphadenopathy (Fig 1). She described chronic onychomycosis of the nails attributed to her job as a dishwasher.

Morton L. Kasdan; Bradon J. Wilhelmi; Mda A B

2011-01-01T23:59:59.000Z

189

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

190

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

191

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

192

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

193

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

194

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

195

Organic light emitting device having multiple separate emissive layers  

DOE Patents (OSTI)

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

196

Multiple Steady States in Azeotropic and Reactive Distillation  

E-Print Network (OSTI)

Introduction . Motivation Overview on the Contributions MSS in Reactive Distillation Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions . The Starting Point . Consolidation . Industrial Applications . Incorporating Reactions MSS in Reactive Distillation Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions MSS in Reactive Distillation . Prediction Method . MTBE Process Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions MSS in Reactive Distillation Conclusions Distillation Overview . Ideal binary / multicomponent distillation . Homogeneous azeotropic distillation -- Heavy entrainer (extractive distillation) -- Intermediate entrainer -- "Boundary scheme" (ligh

Thomas E. Gttinger

1998-01-01T23:59:59.000Z

197

Multiple connection for an undersea cable system  

Science Conference Proceedings (OSTI)

A multiple connection is claimed for connecting a plurality of armored cables to the housing of electrical apparatus in an undersea system having a cable interconnection point where a plurality of cables serving different destinations are brought together. Each of these cables comprise a core surrounded by armor and are terminated by a length of bared core extending beyond a severed end of the armor. The housing has a hollow cable-fixing part through which the bared cable cores pass, characterized in that said connection comprises: a steel binding ring through which the armored portion of each of said cables, is threaded, said ring serving to bind said armored portions of cable together; a steel tube threaded over said bared cores of said cables, having one end abutting against severed end portions of the armor of said cables and having its other end fixed mechanically to said hollow cable-fixing part of the electrical apparatus housing; and auxiliary armor wound around the portions of armored cable bound together by said ring and around the adjacent portion of said steel tube.

Guazzo, L.; Trezeguet, J.P.

1984-05-08T23:59:59.000Z

198

Permeation absorption sampler with multiple detection  

DOE Patents (OSTI)

A system for detecting analytes in air or aqueous systems includes a permeation absorption preconcentrator sampler for the analytes and analyte detectors. The preconcentrator has an inner fluid-permeable container into which a charge of analyte-sorbing liquid is intermittently injected, and a fluid-impermeable outer container. The sample is passed through the outer container and around the inner container for trapping and preconcentrating the analyte in the sorbing liquid. The analyte can be detected photometrically by injecting with the sorbing material a reagent which reacts with the analyte to produce a characteristic color or fluorescence which is detected by illuminating the contents of the inner container with a light source and measured the absorbed or emitted light, or by producing a characteristic chemiluminescence which can be detected by a suitable light sensor. The analyte can also be detected amperometrically. Multiple inner containers may be provided into which a plurality of sorbing liquids are respectively introduced for simultaneously detecting different analytes. baffling may be provided in the outer container. A calibration technique is disclosed. 9 figs.

Zaromb, S.

1989-03-30T23:59:59.000Z

199

Inelastic shadowing effects in multiple scattering  

SciTech Connect

The projectile--nucleon scattering amplitudes used as input into multiple scattering theories of projectile--nucleus scattering naturally include the effects of coupling to inelastic (i.e., production) channels. We employ a multichannel separable potential to describe the projectile--nucleon interaction and show that within the fixed nucleon framework we can obtain the nuclear elastic scattering amplitude. This includes terms outside the conventional formalisms, corresponding to intermediate propagation in the inelastic channels both above and below inelastic threshold. We refer to this as inelastic shadowing. In a two-channel approximation, we show that knowledge of the projectile--nucleon elastic scattering phase shifts plus specification of the inelastic threshold energy are sufficient to determine the off-shell coupled- channel transition matrix, implying that the nuclear amplitude can be calculated within this model without any detailed information about the inelastic channels. We study this solution quantitatively for some model problems and for pion scattering, with the general result that inelastic shadowing can be significant whenever the elementary interaction has important channel coupling. For pion scattering in the energy regime characterized by strongly absorptive resonance, we find, for example, that the effect of inelastic shadowing is much more important than that due to two-nucleon correlations. (AIP)

Londergan, J.T.; Moniz, E.J.

1975-09-19T23:59:59.000Z

200

Multiple capillary biochemical analyzer with barrier member  

DOE Patents (OSTI)

A multiple capillary biochemical analyzer for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal to noise ratio.

Dovichi, Norman J. (Edmonton, CA); Zhang, Jian Z. (Edmonton, CA)

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Multiple capillary biochemical analyzer with barrier member  

DOE Patents (OSTI)

A multiple capillary biochemical analyzer is disclosed for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal-to-noise ratio. 12 figs.

Dovichi, N.J.; Zhang, J.Z.

1996-10-22T23:59:59.000Z

202

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

203

Analysis of Strategies for Reducing Multiple Emissions from Power ...  

U.S. Energy Information Administration (EIA)

Analysis of Strategies for Reducing Multiple Emissions from Power Plants: ... Over the next decade, power plant operators may face significant requirements ...

204

T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

205

Savannah River maintains safety focus through multiple tasks...  

National Nuclear Security Administration (NNSA)

focus through multiple tasks Posted By Office of Public Affairs The Savannah River Tritium Enterprise took advantage of a recent multi-week outage to safely complete a...

206

Advanced optical sensor for monitoring and control of multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced optical sensor for monitoring and control of multiple gas and turbine-blade properties University of Wisconsin - Madison Department of Mechanical Engineering Principal...

207

Is a building with multiple occupancies considered residential...  

NLE Websites -- All DOE Office Websites (Extended Search)

Model Policies Glossary Related Links ACE Learning Series Utility Savings Estimators Is a building with multiple occupancies considered residential or commercial? The IECC...

208

HIGH EFFI IEN Y MULTIPLE JUN TION SOLAR ELLS  

multiple-jun tion solar ells te hnology summary te hnology readiness level: 3 ritial funtions and on epts have een proven in a laoratory setting. author:

209

Efficient and robust multiple access control for wireless multimedia services  

Science Conference Proceedings (OSTI)

In this paper, we propose a new multiple access control (MAC) protocol for wireless distributed multimedia systems based on ATM, in which user demands are highly heterogeneous and can be classified as CBR, VBR, and ABR. Our protocol is motivated by two ... Keywords: FDD, TDMA, adaptive protocol, multiple access control, wireless ATM, wireless multimedia

Yu-Kwong Kwok; Vincent K. N. Lau

2000-10-01T23:59:59.000Z

210

Tools for designing and delivering multiple-perspective scenarios  

Science Conference Proceedings (OSTI)

This paper describes two prototype tools developed as part of a design-based investigation into the use of multiple-perspective scenarios. A multiple-perspective scenario is one constructed as many different narratives about the same events, with the ... Keywords: XML, knowledge management, scenarios, training, video-conferencing

Wally Smith; Daghan Acay; Ramon Fano; Gideon Ratner

2006-11-01T23:59:59.000Z

211

PREFAIL: a programmable tool for multiple-failure injection  

Science Conference Proceedings (OSTI)

As hardware failures are no longer rare in the era of cloud computing, cloud software systems must "prevail" against multiple, diverse failures that are likely to occur. Testing software against multiple failures poses the problem of combinatorial explosion ... Keywords: distributed systems, fault injection, testing

Pallavi Joshi; Haryadi S. Gunawi; Koushik Sen

2011-10-01T23:59:59.000Z

212

A debug interface for debugging multiple domain specific aspect languages  

Science Conference Proceedings (OSTI)

Research in the area of multi-DSAL development has been mainly devoted to enabling the interoperability of multiple aspect mechanisms. Less attention has been given to making programming with multiple aspect languages practical. For domain specific aspect ... Keywords: AspectJ, aspect-oriented programming (AOP), aspect-oriented software engineering (AOSE), awesome, cool, debugging, domain specific languages (DSLs), validate

Yoav Apter; David H. Lorenz; Oren Mishali

2012-03-01T23:59:59.000Z

213

Minimum cost multiple multicast network coding with quantized rates  

Science Conference Proceedings (OSTI)

In this paper, we consider multiple multicast sessions with intra-session network coding where rates over all links are integer multiples of a basic rate. Although having quantized rates over communication links is quite common, conventional minimum ... Keywords: Decomposition algorithm, Multicast networks, Network coding

M. A. Raayatpanah; H. Salehi Fathabadi; B. H. Khalaj; S. Khodayifar

2013-04-01T23:59:59.000Z

214

The Energy Harvesting Multiple Access Channel with Energy Storage Losses  

E-Print Network (OSTI)

The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

Yener, Aylin

215

Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee  

E-Print Network (OSTI)

1 Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee Department of Computer, USA E-mail: colinw@cisunix.unh.edu ABSTRACT Zooming and multiple windows are two techniques designed windows comes in the way they aid visual working memory. The task to which we apply our model

New Hampshire, University of

216

A Group-Theoretic Approach to Fast Matrix Multiplication  

Science Conference Proceedings (OSTI)

We develop a new, group-theoretic approach to bounding the exponent of matrix multiplication. There are two components to this approach: (1) identifying groups G that admit a certain type of embedding of matrix multiplication into the group algebra \\mathbb{C}[G] ...

Henry Cohn; Christopher Umans

2003-10-01T23:59:59.000Z

217

Energy Consumption in Downlink MIMO Relay Systems with Multiple Users  

Science Conference Proceedings (OSTI)

This paper focuses on the energy consumption problem in the downlink MIMO relay systems with multiple users. Power consumption under the target sum capacity is used as the energy efficient performance metric. Three transmission schemes, i.e. regenerate ... Keywords: Energy Consumption, MIMO, Relay, Multiple Users

Jie Xu; Ling Qiu

2010-12-01T23:59:59.000Z

218

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

219

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

220

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

222

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

223

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

224

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

225

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

226

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

227

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

228

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

229

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

230

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

231

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

232

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

233

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

234

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

235

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

236

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

237

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

238

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

239

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

240

Reverse Auction Bidding - Multiple Group Study  

E-Print Network (OSTI)

Reverse Auction Bidding is a recently developed auction method. In this form of bidding process, the roles of the bidders and the owner are interchanged in terms of the form of the economic transaction. The owner's objective is to drive the unit rates down and the bidder's objective is to maintain an acceptable profit level. A study into Reverse Auction Bidding commenced at Texas A&M University in 2004 and continues to this time, with this the eighteenth study in the series. This study is the second multi-group study in the research. In this study, a multiple group comparison was made between different numbers of bidders, with Games One, Two and Three having three, four and ten bidders respectively. All participants were faculty and students from the Department of Construction Science. The critical requirement for the participants is that they should have no prior experience using the Reverse Auction Bidding system. The eighteen studies have concentrated on new players, with future studies planned for repeat participants. A number of the recent case studies have shown personality has an impact on the performance of the bidders. However, this work was not controlled for personality, as the research objective was to determine the impact of a different number of bidders in a game. The Keirsey Temperament Sorter test was completed by all participants so that the results could be understood in terms of personality impact on the level of return to each participant. The results showed the number of bidders has a significant impact on the individual returns confirming the earlier work on varying the number of bidders. An increase in the number of bidders was shown to lead to a more competitive economic environment, which given usual economic circumstances lead to a reduction in the number of firms interested in bidding, for the self-evident economic reasons. This work points to the need to investigate a bidding group size of five or six, which is likely to be the self-constrained upper limit in a real economic system. Some interesting observations on the personality types suggest that further work is required in this area.

Zhou, Xun

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

StopBadware comments on DHS and DOC Botnets RFI ...  

Science Conference Proceedings (OSTI)

... file downloads. StopBadware collaborates with Google and Mozilla to ensure that users encountering Page 2. malware ...

2011-11-15T23:59:59.000Z

242

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents (OSTI)

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN); David, Stan A. (Knoxville, TN); Frederick, David Alan (Harriman, TN)

2010-07-27T23:59:59.000Z

243

Multiple prey traits, multiple predators: keys to understanding complex species interactions  

E-Print Network (OSTI)

Species interactions generate both natural selection and ecological community structure. Among the more interesting species interactions are those that create adaptive tradeoffs-where phenotypes conferring improved performance in interactions with one species decrease performance with another. Such tradeoffs create divergent natural selection and favor the evolution of strategies such as phenotypic plasticity. Functional tradeoffs may also provide little "enemy-free space" for a focal species in complex communities, resulting in emergent ecological impacts. Emergent community properties arise when community patterns are not predicted based on additive knowledge of pairwise interactions. These emergent impacts typically result from indirect effects, where interactions between two species depend on intermediary species. In this thesis, I examined constraints on the evolution of phenotypic plasticity and addressed its potential significance in community dynamics. I further reviewed concepts and issues related to linking functional and community studies to elucidate mechanisms underlying community structure. I proposed an integrative approach to the subject, emphasizing four major areas of promise, by combining perspectives of ecology and evolution. Freshwater physid snails induce defensive phenotypes in the presence of specialized molluscivorous sunfish. While predator-induced shells reduce predation from shell-crushing fish, I examined whether non-predatory fish induced unnecessary responses. I raised freshwater snails, Physella virgata, with either molluscivorous or non-molluscivorous sunfish species. Regardless of the predator class with which they were raised, snails exhibited two induced responses: reduced growth, and development of rotund shells. Although induced responses are adaptive in the presence of molluscivorous species, responding unnecessarily to non-molluscivores is maladaptive. Both growth reduction and rotund shells entail substantial costs without compensatory benefits in the absence of predatory fish. A pluralistic approach to studying ecological interactions shaping community dynamics should prove profitable in revealing details of complex interactions. I primarily illustrate these principles with case studies involving predation ecology in the freshwater snail-fish-crayfish model system. The system illustrates how predator impacts on prey are mediated by multiple prey traits, correlations between traits, functional tradeoffs in predator defense, interactions between predators, and interactions with other community members. These case studies demonstrate the importance of a multiple-trait and multiple-environment perspective in functional ecological studies.

Langerhans, Randall Brian

2002-01-01T23:59:59.000Z

244

Delaware River Basin Commission (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

245

Interstate Commission on the Potomac River Basin (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

246

Midwest Independent System Operator (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

247

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

248

Southern States Energy Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

249

Stator for a rotating electrical machine having multiple control windings  

DOE Patents (OSTI)

A rotating electric machine is provided which includes multiple independent control windings for compensating for rotor imbalances and for levitating/centering the rotor. The multiple independent control windings are placed at different axial locations along the rotor to oppose forces created by imbalances at different axial locations along the rotor. The multiple control windings can also be used to levitate/center the rotor with a relatively small magnetic field per unit area since the rotor and/or the main power winding provides the bias field.

Shah, Manoj R. (Latham, NY); Lewandowski, Chad R. (Amsterdam, NY)

2001-07-17T23:59:59.000Z

250

Stator for Rotating Electrical Machine Having Multiple Controlwindings  

DOE Patents (OSTI)

A rotating electric machine is provided which includes multiple independent control windings for compensating for rotor imbalances and for levitating/centering the rotor. The multiple independent control windings are placed at different axial locations along the rotor to oppose forces created by imbalances at different axial locations along the rotor. The multiple control windings can also be used to levitate/center the rotor with a relatively small magnetic field per unit area since the rotor and/or the main power winding provides the biasfield.

Shah, Manoj R.; Lewandowski, Chad R.

1999-05-05T23:59:59.000Z

251

Method for improving the steam splits in a multiple steam injection process using multiple steam headers  

SciTech Connect

This patent describes a method for enhancing the uniformity of steam distribution in a multiple steam injection system comprising a steam generator, a primary steam header, at least one secondary steam header, a primary steam line connecting the generator to the primary header, at lease one secondary steam line connecting the primary header to the secondary steam header, and a plurality of tertiary steam lines connecting the secondary steam header to a plurality of stem injection wells. It comprises injecting a surfactant into the primary steam line, mixing the surfactant and steam in the primary steam line sufficiently so that the surfactant and the steam enter the primary steam header as a foam, and mixing the surfactant and steam in the secondary steam lines sufficiently so that the surfactant and the steam enter the secondary steam header as a foam.

Stowe, G.R.

1991-03-19T23:59:59.000Z

252

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

253

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

254

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

255

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

256

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

257

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

258

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

259

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

260

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Multiple instances and symbolic variables in executable sequence charts  

Science Conference Proceedings (OSTI)

We extend live sequence charts (LSCs), a highly expressive variant of sequence diagrams, and provide the extension with an executable semantics. The extension involves support for instances that can bind to multiple objects and symbolic variables that ...

Rami Marelly; David Harel; Hillel Kugler

2002-11-01T23:59:59.000Z

262

Signal selective DOA tracking for multiple moving targets  

Science Conference Proceedings (OSTI)

A new algorithm for signal selective tracking of the directions-of-arrival (DOAs) of multiple moving targets with an array of passive sensors is presented. A new method based on the principles of maximum likelihood estimation and cyclostationarity is ...

J. Riba; J. Goldberg; G. Vazquez; M. A. Lagunas

1996-05-01T23:59:59.000Z

263

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

264

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

265

Multiple Motivations Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

266

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

267

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

268

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

269

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

270

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

271

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

272

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

273

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

274

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

275

Integrating automobile multiple intelligent warning systems : performance and policy implications  

E-Print Network (OSTI)

Intelligent driver warning systems can be found in many high-end vehicles on the road today, which will likely rapidly increase as they become standard equipment. However, introducing multiple warning systems into vehicles ...

Ho, Angela Wei Ling

2006-01-01T23:59:59.000Z

276

Practical rendering of multiple scattering effects in participating media  

Science Conference Proceedings (OSTI)

Volumetric light transport effects are significant for many materials like skin, smoke, clouds, snow or water. In particular, one must consider the multiple scattering of light within the volume. While it is possible to simulate such media using volumetric ...

Simon Premoe; Michael Ashikhmin; Jerry Tessendorf; Ravi Ramamoorthi; Shree Nayar

2004-06-01T23:59:59.000Z

277

Multiple Convection Patterns and Thermohaline Flow in an Idealized OGCM  

Science Conference Proceedings (OSTI)

This paper investigates how multiple steady states arise in an ocean general circulation model, caused by the fact that many different convection patterns can be stable under the same surface boundary conditions. Two alternative boundary ...

Stefan Rahmstorf

1995-12-01T23:59:59.000Z

278

A Bulk Microphysics Parameterization with Multiple Ice Precipitation Categories  

Science Conference Proceedings (OSTI)

A single-moment bulk microphysics scheme with multiple ice precipitation categories is described. It has 2 liquid hydrometeor categories (cloud droplets and rain) and 10 ice categories that are characterized by habit, size, and densitytwo ice ...

Jerry M. Straka; Edward R. Mansell

2005-04-01T23:59:59.000Z

279

Higher Moments of Net Proton Multiplicity Distributions at RHIC  

E-Print Network (OSTI)

We report the first measurements of the kurtosis (? [kappa]), skewness (S), and variance (? [sigma] [superscript 2]) of net-proton multiplicity (N [subscript p]-N [subscript p?] ) distributions at midrapidity for Au+Au ...

Balewski, Jan T.

280

A Common Theory of Information Fusion from Multiple Text Sources  

E-Print Network (OSTI)

A Common Theory of Information Fusion from Multiple Text Sources Step One: Cross-Document Structure families in the Northeast hit hard by this year's cold weather and the soaring cost of home heating oil

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Multiple Aircraft Tracking System for Coordinated Research Missions  

Science Conference Proceedings (OSTI)

The Multiple Aircraft Position System (MAPS) was developed by the Convective Storms Division of the National Center for Atmospheric Research, in response to the need for aircraft position in the coordination of large field projects involving ...

Peter N. Johnson; Jack L. Fink

1982-05-01T23:59:59.000Z

282

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing  

E-Print Network (OSTI)

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing Joe Pitman An innovative approach that enables greatly increased return from planetary science remote sensing missions as the primary remote sensing science payload, thereby reducing the cost, resources, complexity, integration

Marcus, Philip S.

283

Performance of multiple cabin optimization methods in airline revenue management  

E-Print Network (OSTI)

Although many airlines offer seats in multiple cabins (economy vs. premium classes) with different service quality, previous work on airline revenue management has focused on treating the cabins separately. In this thesis, ...

Lepage, Pierre-Olivier

2013-01-01T23:59:59.000Z

284

An Object Oriented Framework for Parallel Multiple Optimizations  

Science Conference Proceedings (OSTI)

This report presents a general Objected-Oriented Framework for Parallel and Multiple Optimizations. We designed a general Objected-Oriented Class Library for Parallel Numerical Optimization. All optimization problems are considered: Unconstrained, Constrained, ...

Beidi Hamma

2000-06-01T23:59:59.000Z

285

Climate Determinism Revisited: Multiple Equilibria in a Complex Climate Model  

E-Print Network (OSTI)

Multiple equilibria in a coupled oceanatmospheresea ice general circulation model (GCM) of an aquaplanet with many degrees of freedom are studied. Three different stable states are found for exactly the same set of ...

Ferreira, David

286

Multiple Equilibrium States in Combined Thermal and Saline Circulation  

Science Conference Proceedings (OSTI)

Structure and stability of the multiple equilibria of the thermohaline circulation am studied using 2 2 and 3 2 box models. Thermohaline catastrophe is a shallow phenomenon and its time evolution consists of three stages: the search stage, ...

Rui Xin Huang; James R. Luyten; Henry M. Stommel

1992-03-01T23:59:59.000Z

287

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

DOE Green Energy (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

288

Characteristics of Maximum Concentrations from Multiple Point Sources  

Science Conference Proceedings (OSTI)

A simple quasi-Newton numerical scheme is applied to determine the hypothetical worst-case meteorology that will result in the maximum combined concentrations at any receptor location in air quality modeling over short distances for multiple ...

N. M. Zoumakis

1998-07-01T23:59:59.000Z

289

Characterizations of Image Acquisition and Epipolar Geometry of Multiple Panoramas  

Science Conference Proceedings (OSTI)

Recently multiple panoramic images have emerged and received increasingly interests in applications of 3D scene visualization and reconstruction. There is a need to characterize and clarify their common natures and differences so that a more general ...

Shou Kang Wei; Fay Huang; Reinhard Klette

2001-09-01T23:59:59.000Z

290

Adaptive multiple description mode selection for error resilient video communications  

E-Print Network (OSTI)

Streaming video applications must be able to withstand the potentially harsh conditions present on best-effort networks like the Internet, including variations in available bandwidth, packet losses, and delay. Multiple ...

Heng, Brian A., 1977-

2005-01-01T23:59:59.000Z

291

Global Transport on a Spherical Multiple-Cell Grid  

Science Conference Proceedings (OSTI)

Second- and third-order upstream nonoscillatory (UNO) advection schemes are applied on a spherical multiple-cell (SMC) grid for global transport. Similar to the reduced grid, the SMC grid relaxes the CourantFriedrichsLewy (CFL) restriction of ...

Jian-Guo Li

2011-05-01T23:59:59.000Z

292

Low-multiplicity Burst Search at the Sudbury Neutrino Observatory  

E-Print Network (OSTI)

Results are reported from a search for low-multiplicity neutrino bursts in the Sudbury Neutrino Observatory. Such bursts could indicate the detection of a nearby core-collapse supernova explosion. The data were taken from ...

Chen, Min

293

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which...

294

A Single-Product Inventory Model for Multiple Demand Classes  

E-Print Network (OSTI)

We consider a single-product inventory system that serves multiple demand classes, which differ in their shortage costs or service level requirements. We assume a critical-level control policy, and show the equivalence ...

Arslan, Hasan

2005-05-27T23:59:59.000Z

295

Application of the multiple image radiography method to breast imaging  

Science Conference Proceedings (OSTI)

The Multiple Image Radiography (MIR) method is new imaging modality that extends the capability of conventional absorption based radiography by adding the additional contrast mechanisms of x-ray refraction and ultra-small angle scatter. In order to design ...

Christopher Parham; Etta Pisano; Chad Livasy; Laura Faulconer; Miles Wernick; Jovan Brankov; Miklos Kiss; Dean Connor; Jeddy Chen; Ann Wu; Zhong Zhong; Dean Chapman

2006-06-01T23:59:59.000Z

296

Mesoscale Mapping Capabilities of Multiple-Satellite Altimeter Missions  

Science Conference Proceedings (OSTI)

The purpose of this paper is to quantify the contribution of merging multiple-satellite altimeter missions to the mesoscale mapping of sea level anomaly (H), and zonal (U) and meridional (V) geostrophic velocities. A space/time suboptimal ...

P. Y. Le Traon; G. Dibarboure

1999-09-01T23:59:59.000Z

297

Efficient partitioning of fragment shaders for multiple-output hardware  

Science Conference Proceedings (OSTI)

Partitioning fragment shaders into multiple rendering passes is an effective technique for virtualizing shading resource limits in graphics hardware. The Recursive Dominator Split (RDS) algorithm is a polynomial-time algorithm for partitioning fragment ...

Tim Foley; Mike Houston; Pat Hanrahan

2004-08-01T23:59:59.000Z

298

STUDY OF CORRELATIONS IN MOLECULAR MOTION BY MULTIPLE QUANTUM NMR  

E-Print Network (OSTI)

VoId and R. R. VoId, Prog. in NMR Spectroscopy, vol. 12. ed.1950). III MULTIPLE QUANTUM NMR SPECTROSCOPY IntroductionThe conventional NMR spectra are usually obtained by a

Tang, J-H.

2008-01-01T23:59:59.000Z

299

Geophysical Applications of Partial Wavelet Coherence and Multiple Wavelet Coherence  

Science Conference Proceedings (OSTI)

In this paper, the application of partial wavelet coherence (PWC) and multiple wavelet coherence (MWC) to geophysics is demonstrated. PWC is a technique similar to partial correlation that helps identify the resulting wavelet coherence (WTC) ...

Eric K. W. Ng; Johnny C. L. Chan

2012-12-01T23:59:59.000Z

300

Topic Extraction from Text Documents Using Multiple-Cause Networks  

Science Conference Proceedings (OSTI)

This paper presents an approach to the topic extraction from text documents using probabilistic graphical models. Multiple-cause networks with latent variables are used and the Helmholtz machines are utilized to ease the learning and inference. The learning ...

Jeong-Ho Chang; Jae Won Lee; Yuseop Kim; Byoung-Tak Zhang

2002-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Climate Determinism Revisited: Multiple Equilibria in a Complex Climate Model  

Science Conference Proceedings (OSTI)

Multiple equilibria in a coupled oceanatmospheresea ice general circulation model (GCM) of an aquaplanet with many degrees of freedom are studied. Three different stable states are found for exactly the same set of parameters and external ...

David Ferreira; John Marshall; Brian Rose

2011-02-01T23:59:59.000Z

302

MULTIPLE SULFUR ISOTOPE FRACTIONATIONS IN BIOLOGICAL SYSTEMS: A CASE STUDY WITH SULFATE REDUCERS  

E-Print Network (OSTI)

MULTIPLE SULFUR ISOTOPE FRACTIONATIONS IN BIOLOGICAL SYSTEMS: A CASE STUDY WITH SULFATE REDUCERS*, DONALD E. CANFIELD**, and KIRSTEN S. HABICHT** ABSTRACT. Multiple sulfur isotope measurements of sulfur disproportionation indicate that different types of metabolic processes impart differ- ent multiple isotope

Kaufman, Alan Jay

303

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

304

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

305

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

306

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

307

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

308

EXPERIMENTS ON SELECTIVE EXCITATION OF MULTIPLE-QUANTUM TRANSITIONS IN NMR SPECTROSCOPY  

E-Print Network (OSTI)

M. Mehring, High Resolution NMR Spectroscopy in Solids (sequences for producing quantum NMR spectra. multiple~ InMULTIPLE-QUANTUM TRANSITIONS IN NMR SPECTROSCOPY W.S. Warren

Warren, W.S.

2013-01-01T23:59:59.000Z

309

Java support on genepool: java6 (jdk1.6) will be removed on 08...  

NLE Websites -- All DOE Office Websites (Extended Search)

Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

310

Sabine River Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

311

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

312

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

313

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

314

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

315

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

316

New England Power Pool (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

317

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

318

North American Renewables Registry (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

319

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

320

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

322

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

323

Graphical functions and single-valued multiple polylogarithms  

E-Print Network (OSTI)

Graphical functions are single-valued complex functions which arise from Feynman amplitudes. We study their properties and use their connection to multiple polylogarithms to calculate Feynman periods. For the zig-zag and two more families of phi^4 periods we give exact results modulo products. These periods are proved to be expressible as integer linear combinations of single-valued multiple polylogarithms evaluated at one. For the larger family of 'constructible' graphs we give an algorithm that allows one to calculate their periods by computer algebra. The theory of graphical functions is used to prove the zig-zag conjecture.

Oliver Schnetz

2013-02-26T23:59:59.000Z

324

Cross Section to Multiplicity Ratios at Very High Energy  

E-Print Network (OSTI)

Recent data from the LHC makes it possible to examine an old speculation that at very high energy the total multiplicity and the cross section in elementary particle interactions vary in parallel with energy. Using fits incorporating the new data, it appears that the ratios of the total, elastic, and inelastic cross sections to the average multiplicity N can in fact approach constants at very high energy. The approach to the limit is however quite slow for the total and inelastic cross sections and is not yet reached at LHC energies. The elastic ratio sigma^{el}/N at 7 TeV, however, is not far from its asymptotic value.

M. M. Block; L. Stodolsky

2013-12-09T23:59:59.000Z

325

Using Multiple Unmanned Systems for a Site Security Task  

SciTech Connect

Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

2009-04-01T23:59:59.000Z

326

Minimum Requirements for NIST Webcast  

Science Conference Proceedings (OSTI)

Some organizations have firewalls preventing streaming flash content from ... Windows XP (Internet Explorer or Firefox) Windows Vista (Internet ...

2013-03-28T23:59:59.000Z

327

Multi-user transmitter preprocessing assisted uplink multi-cell multiple-input multiple-output system with base station cooperation over frequency-selective channels  

Science Conference Proceedings (OSTI)

The performance of cellular uplink multiple-input multiple-output systems, where co-channel interference (CCI) at the base stations (BSs) is a major performance impairment, is investigated in this correspondence principally from a multi-user transmitter ...

Prabagarane Nagaradjane, Prasaanth Muralidharan, Sabarish Karthik Vivek Sarathy, Yuvika Ashwina Rajan, Shriram Swaminathan

2013-04-01T23:59:59.000Z

328

Acceleration of the matrix multiplication of Radiance three phase  

NLE Websites -- All DOE Office Websites (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

329

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network (OSTI)

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

330

Simulation of multiple-gate quantum stub transistor  

Science Conference Proceedings (OSTI)

The quantum stub transistor has the potential for ultrafast, ultra low power signal processing in high density integrated circuits. However, the single gate stub transistor presents the shortcoming of requiring highly precise gate voltage to close the ... Keywords: multiple gate, simulation, stub transistor

Edval J. P. Santos; Alexandre B. Guerra

2005-08-01T23:59:59.000Z

331

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

332

Efficient pipelining for modular multiplication architectures in prime fields  

Science Conference Proceedings (OSTI)

This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation of the Montgomery algorithm, a more compact pipelined version is derived. ... Keywords: FPGA, cryptography, montgomery multiplication, public key coprocessor

Nele Mentens; Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede

2007-03-01T23:59:59.000Z

333

Memory-efficient A* heuristics for multiple sequence alignment  

Science Conference Proceedings (OSTI)

The time and space needs of an A* search are strongly influenced by the quality of the heuristic evaluation function. Usually there is a trade-off since better heuristics may require more time and/or space to evaluate. Multiple sequence alignment is ...

Matthew McNaughton; Paul Lu; Jonathan Schaeffer; Duane Szafron

2002-07-01T23:59:59.000Z

334

Transmission outage data collection for multiple related outage events  

SciTech Connect

This paper focuses on the information required to provide a basis for the analysis of forced multiple outage events. It recaps research as well as the bulk transmission outage collection up-rate that was performed. This paper identifies trends and addresses their impact on bulk transmission outage data collection.

Lauby, M.G. (Electric Power Research Inst., Palo Alto, CA (USA)); Maillant, G.R. (Electricite de France (EDF)

1989-01-01T23:59:59.000Z

335

Typicality ranking via semi-supervised multiple-instance learning  

Science Conference Proceedings (OSTI)

Most of the existing methods for natural scene categorization only consider whether a sample is relevant or irrelevant to a particular concept. However, for the samples relevant to a certain concept, their typicalities or relevancy scores to the concept ... Keywords: multiple-instance learning, natural scene categorization, semi-supervised learning, typicality ranking

Jinhui Tang; Xian-Sheng Hua; Guo-Jun Qi; Xiuqing Wu

2007-09-01T23:59:59.000Z

336

On Multiple Decoding Attempts for Reed-Solomon Codes  

E-Print Network (OSTI)

One popular approach to soft-decision decoding of Reed-Solomon (RS) codes is based on the idea of using multiple trials of a simple RS decoding algorithm in combination with successively erasing or flipping a set of symbols or bits in each trial. In this paper, we present an framework based on rate-distortion (RD) theory to analyze such multiple-decoding algorithms for RS codes. By defining an appropriate distortion measure between an error pattern and an erasure pattern, it is shown that, for a single errors-and-erasures decoding trial, the condition for successful decoding is equivalent to the condition that the distortion is smaller than a fixed threshold. Finding the best set of erasure patterns for multiple decoding trials then turns out to be a covering problem which can be solved asymptotically by rate-distortion theory. Thus, the proposed approach can be used to understand the asymptotic performance-versus-complexity trade-off of multiple errors-and-erasures decoding of RS codes. We also consider an a...

Nguyen, Phong S; Narayanan, Krishna R

2010-01-01T23:59:59.000Z

337

Correcting Specular Noise in Multiple Images of Photographed Documents  

Science Conference Proceedings (OSTI)

Portable digital cameras have become omnipresent. Their low-lost, simplicity to use, flexibility, and good quality images have widened their applicability far beyond their original purpose of taking personal photos. Every day people discover new uses ... Keywords: specular noise, photographed documents, multiple images

Ednardo Mariano; Rafael Dueire Lins; Gabriel de. Franca Pereira e. Silva; Jian Fan; Peter Majewicz; Marcelo Thielo

2011-09-01T23:59:59.000Z

338

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Remote Sensing  

E-Print Network (OSTI)

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Remote Sensing Joe Pitman,a , Alan that enables greatly increased return from earth and planetary science remote sensing missions is described are integrated into MIDAS as the primary remote sensing science payload, thereby reducing the cost, resources

Fienup, James R.

339

Asynchronous Communication Schemes for Finite Difference Methods on Multiple GPUs  

Science Conference Proceedings (OSTI)

Finite difference methods continue to provide an important and parallelisable approach to many numerical simulations problems. Iterative multigrid and multilevel algorithms can converge faster than ordinary finite difference methods but can be more difficult ... Keywords: finite-difference, GPU, multiple device, CUDA

Daniel Peter Playne; Kenneth Arthur Hawick

2010-05-01T23:59:59.000Z

340

Efficient Partitioning of Fragment Shaders for Multiple-Output Hardware  

E-Print Network (OSTI)

Partitioning fragment shaders into multiple rendering passes is an effective technique for virtualizing shading resource limits in graphics hardware. The Recursive Dominator Split (RDS) algorithm is a polynomial-time algorithm for partitioning fragment shaders for real-time rendering that has been shown to generate efficient partitions.

Tim Foley; Mike Houston; Pat Hanrahan

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Steady water waves with multiple critical layers: interior dynamics  

E-Print Network (OSTI)

We study small-amplitude steady water waves with multiple critical layers. Those are rotational two-dimensional gravity-waves propagating over a perfect fluid of finite depth. It is found that arbitrarily many critical layers with cat's-eye vortices are possible, with different structure at different levels within the fluid. The corresponding vorticity depends linearly on the stream function.

Mats Ehrnstrm; Joachim Escher; Gabriele Villari

2010-04-29T23:59:59.000Z

342

Multiple regression models of the volumetric stem biomass  

Science Conference Proceedings (OSTI)

The development of a simple model was presented for obtaining the volumetric stem biomass of a tropical tree species. To model the volumetric stem biomass, Cinnamomum of family Lauracea was chosen. Mensuration data were collected based on two volumetric ... Keywords: best model, correlation tests, interactions, multiple regression, selection criteria, stem volume, volumetric equations

Noraini Abdullah; Zainodin H. J. Jubok; J. B. Nigel Jonney

2008-07-01T23:59:59.000Z

343

Communicated by Steve Nowlan Competition and Multiple Cause Models  

E-Print Network (OSTI)

somewhat independently of each other. An added advantage of such multiple cause models is that a few causes parts of the input. In this paper, we use the probabilistic theory that underlies Keeler #12 for training. The input values for the dots are 0 and those for the white boxes are 1. et d ' s (1991

Dayan, Peter

344

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents (OSTI)

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

345

hal00281082, VARIATIONAL CHARACTERIZATIONS OF THE EFFECTIVE MULTIPLICATION  

E-Print Network (OSTI)

in nuclear reactor theory. This work follows a very recent paper by M. Mokhtar­ Kharroubi [22] devoted FACTOR OF A NUCLEAR REACTOR CORE Bertrand LODS Université Blaise Pascal (Clermont II) Laboratoire de. KEYWORDS: effective multiplication factor, nuclear reactor, neutron transport equation, energy

Paris-Sud XI, Université de

346

Multiplicative updates in coordination games and the theory of evolution  

Science Conference Proceedings (OSTI)

In this paper we point out a new and unexpected connection between three fields: Evolution Theory, Game Theory, and Algorithms. In particular, we study the standard equations of population genetics for Evolution, in the presence of recombination (sex), ... Keywords: algorithmic game theory, multiplicative weight updates, theory of evolution

Erick Chastain; Adi Livnat; Christos Papadimitriou; Umesh Vazirani

2013-01-01T23:59:59.000Z

347

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents (OSTI)

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect.

Olson, Jerry M. (Lakewood, CO); Kurtz, Sarah R. (Golden, CO)

1992-01-01T23:59:59.000Z

348

Capacity-constrained multiple-market price discrimination  

Science Conference Proceedings (OSTI)

This paper studies a multiple-market price discrimination problem with different markets' demand elasticity and supply constraints, whereas the markets share a common capacity. We model the problem as a continuous nonlinear knapsack problem, and propose ... Keywords: Knapsack problem, Nonlinear programming, Price discrimination

Bin Zhang

2012-01-01T23:59:59.000Z

349

Plan-based policies for efficient multiple battery load management  

Science Conference Proceedings (OSTI)

Efficient use of multiple batteries is a practical problem with wide and growing application. The problem can be cast as a planning problem under uncertainty. We describe the approach we have adopted to modelling and solving this problem, seen as a Markov ...

Maria Fox; Derek Long; Daniele Magazzeni

2012-05-01T23:59:59.000Z

350

On redundancy, efficiency, and robustness in coverage for multiple robots  

Science Conference Proceedings (OSTI)

Motivated by potential efficiency and robustness gains, there is growing interest in the use of multiple robots for coverage. In coverage, robots visit every point in a target area, at least once. Previous investigations of multi-robot coverage focus ... Keywords: Coverage, Multi-robot systems, Path-planning

Noam Hazon; Gal A. Kaminka

2008-12-01T23:59:59.000Z

351

Scheduling Multiple Multithreaded Applications on Asymmetric and Symmetric Chip Multiprocessors  

E-Print Network (OSTI)

Tomer Y. Morad, AvinoamKolodny, Uri C. Weiser Department of Electrical Engineering, Technion, Haifa-thread applications result in sub-optimal usage of the multiprocessor resources, unfairness between applications multiple multithreaded applications are run in parallel, this lack of awareness results in lower throughput

Kolodny, Avinoam

352

Low Complexity Power Allocation in Multiple-antenna Relay Networks  

E-Print Network (OSTI)

Dept. of Electrical and Computer Engineering Queen's University, Kingston, Ontario, K7L3N6, Canada of research and enables efficient spectrum usage by resource sharing among multiple nodes in a network. Major antenna cooperative system is studied in [3], where the upper and lower bounds for capacity indicate

Blostein, Steven D.

353

Predicting Gene Structures from Multiple RT-PCR Tests  

E-Print Network (OSTI)

Predicting Gene Structures from Multiple RT-PCR Tests (Extended Abstract) Jakub Kov´ac1 , Tom RT-PCR experiments in gene finding. We present hardness results and practical algorithms for several variants of the problem. We also apply our methods to a real RT-PCR data set in the Drosophila genome. We

Vinar, Tomas

354

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network (OSTI)

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

355

Display of clouds taking into account multiple anisotropic scattering and sky light  

Science Conference Proceedings (OSTI)

Keywords: clouds, multiple scattering, optical length, participating media, photo-realism, radiative transfer, sky light

Tomoyuki Nishita; Yoshinori Dobashi; Eihachiro Nakamae

1996-08-01T23:59:59.000Z

356

A new grouping genetic algorithm for the quadratic multiple knapsack problem  

Science Conference Proceedings (OSTI)

The quadratic multiple knapsack problem is an extension of the well known 0/1 multiple knapsack problem. In the quadratic multiple knapsack problem, profit values are associated not only with individual objects but also with pairs of objects. Profit ... Keywords: combinatorial optimization, grouping genetic algorithm, knapsack problem, quadratic multiple knapsack problem

Alok Singh; Anurag Singh Baghel

2007-04-01T23:59:59.000Z

357

Comparing Single and Multiple Turbine Representations in a Wind Farm Simulation: Preprint  

SciTech Connect

This paper compares single turbine representation versus multiple turbine representation in a wind farm simulation.

Muljadi, E.; Parsons, B.

2006-03-01T23:59:59.000Z

358

Trajectory Design and Implementation for Multiple Autonomous Underwater Vehicles Based on Ocean Model Predictions  

E-Print Network (OSTI)

for Multiple Autonomous Underwater Vehicles Based on OceanAUVs) Autonomous Underwater Vehicles Evolving ocean

2009-01-01T23:59:59.000Z

359

Appendix 1 Other Software (for on managed desktop) -eclipse, notepad++  

E-Print Network (OSTI)

Camtasia for screen recording and something for video editing. cannot access web of knowledge remotelyBeans Flash CS4 Matlab7 Visual Studio Eclipse, Matlab, Visual Studio 2010 end note, ref manmager Erdas - Imagine for remote sensing Erdas Imagine. eViews firefox firefox or google chrome Firefox Webreader FTP

Martin, Stephen John

360

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Multiple Title: ADAS System Life Cycle Support, 2012-2015 Description: Subcontractor shall provide annual telephone support and hardware/software update support for the ARINC AIM alarm display and annunciation system (ADAS) security systems used at the SPR from 2012-2015. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment (categorical exclusions). (b) To find that a proposal is categorically excluded, DOE shall determine the following: (1) The proposed action fits within a class of actions that is listed in Appendix A or B of Subpart D;

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Experiments on multiple short-delay blasting of coal  

SciTech Connect

Investigation was made to determine conditions under which short-delay multiple blasting could be used in coal mines without causing ignition of gas, coal dust, or mixtures of gas and dust. Additional aims were to determine effects of blasting on mine roof; to find quantity and breakage of coal produced by multiple blasting; to measure amount of float dust formed during shooting; and to study relative time requirement in different blasting procedures. Various recommendations that should help greatly to reduce incidence of misfires are presented. Paper presented at Seventh International Conference of Directors of Safety in Mines Research at the Safety in Mines Research Establishment, Ministry of Fuel and Power, Buxton, England, July 7-12, 1952.

Nagy, J.; Hartmann, I.; Christofel, F.P.; Seiler, E.C.

1952-01-01T23:59:59.000Z

362

BAYESIAN ANALYSIS OF MULTIPLE HARMONIC OSCILLATIONS IN THE SOLAR CORONA  

SciTech Connect

The detection of multiple mode harmonic kink oscillations in coronal loops enables us to obtain information on coronal density stratification and magnetic field expansion using seismology inversion techniques. The inference is based on the measurement of the period ratio between the fundamental mode and the first overtone and theoretical results for the period ratio under the hypotheses of coronal density stratification and magnetic field expansion of the wave guide. We present a Bayesian analysis of multiple mode harmonic oscillations for the inversion of the density scale height and magnetic flux tube expansion under each of the hypotheses. The two models are then compared using a Bayesian model comparison scheme to assess how plausible each one is given our current state of knowledge.

Arregui, I.; Asensio Ramos, A.; Diaz, A. J., E-mail: iarregui@iac.es [Instituto de Astrofisica de Canarias, Via Lactea s/n, E-38205 La Laguna, Tenerife (Spain)

2013-03-01T23:59:59.000Z

363

ARM - Publications: Science Team Meeting Documents: Single and Multiple  

NLE Websites -- All DOE Office Websites (Extended Search)

Single and Multiple scattering in optically thick multifractal clouds Single and Multiple scattering in optically thick multifractal clouds Grosdidier, Yves McGill University Lovejoy, Shaun McGill University Watson, Brian St. Lawrence University, Physics Department Schertzer, Daniel Ecole Nationale des Ponts et Chauss'es Satellite studies have shown that cloud radiances (at both visible and infra red wavelengths) are scale invariant over scales spanning much of the meteorologically significant range, and airborne lidar data have shown that vertical cross sections of passive scalar clouds are also scaling but with quite different exponents in the horizontal and vertical directions (quantified by an "elliptical dimension" = Del-23/9 close to the empirical value 2.55±0.02). This multifractality is the result of huge

364

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams  

NLE Websites -- All DOE Office Websites (Extended Search)

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Richard Parker,. Parker Geoscience Consulting, LLC, Arvada, Colorado, USA; Zhiyue Xu and Claude Reed, Argonne National Laboratory, Argonne, Illinois, USA; Ramona Graves, Department of Petroleum Engineering, Colorado School of Mines, Golden, Colorado, USA; Brian Gahan and Samih Batarseh, Gas Technology Institute, Des Plaines, Illinois, USA ABSTRACT Studies on drilling petroleum reservoir rocks with lasers show that modern infrared lasers have the capability to spall (thermally fragment), melt and vaporize natural earth materials with the thermal spallation being the most efficient rock removal mechanism. Although laser irradiance as low as 1000 W/cm 2 is sufficient to spall rock, firing the

365

Self-organizing traffic lights at multiple-street intersections  

E-Print Network (OSTI)

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

366

Full Rate Collaborative Diversity Scheme for Multiple Access Fading Channels  

E-Print Network (OSTI)

User cooperation is a well-known approach to achieve diversity without multiple antennas, however at the cost of inevitable loss of rate mostly due to the need of additional channels for relaying. A new collaborative diversity scheme is proposed here for multiple access fading channels to attain full rate with near maximum diversity. This is achieved by allowing two users and their corresponding relays to transmit/forward data on the same channel by exploiting unique spatial-signatures of their fading channels. The base-station jointly detects the co-channel users' data using maximum-likelihood search algorithm over small set of possible data combinations. Full data rate with significant diversity gain near to two-antenna Alamouti scheme is shown.

Shakya, Indu; Stipidis, Elias

2011-01-01T23:59:59.000Z

367

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks  

E-Print Network (OSTI)

This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

Yu, Hong

2012-01-01T23:59:59.000Z

368

MODTRAN cloud and multiple scattering upgrades with application to AVIRIS  

Science Conference Proceedings (OSTI)

Recent upgrades to the MODTRAN atmospheric radiation code improve the accuracy of its radiance predictions, especially in the presence of clouds and thick aerosols, and for multiple scattering in regions of strong molecular line absorption. The current public-released version of MODTRAN (MODTRAN3.7) features a generalized specification of cloud properties, while the current research version of MODTRAN (MODTRAN4) implements a correlated-k (CK) approach for more accurate calculation of multiple scattered radiance. Comparisons to cloud measurements demonstrate the viability of the CK approach. The impact of these upgrades on predictions for AVIRIS viewing scenarios is discussed for both clear and clouded skies; the CK approach provides refined predictions for AVIRIS nadir and near-nadir viewing.

Berk, A.; Bernstein, L.S.; Acharya, P.K.; Robertson, D.C.; Adler-Golden, S.M. [Spectral Sciences, Inc., Burlington, MA (United States)] [Spectral Sciences, Inc., Burlington, MA (United States); Anderson, G.P.; Chetwynd, J.H. [Air Force Research Lab., Hanscom AFB, MA (United States). Geophysics Directorate] [Air Force Research Lab., Hanscom AFB, MA (United States). Geophysics Directorate

1998-09-01T23:59:59.000Z

369

Multiple fuel supply system for an internal combustion engine  

DOE Patents (OSTI)

A multiple fuel supply or an internal combustion engine wherein phase separation of components is deliberately induced. The resulting separation permits the use of a single fuel tank to supply components of either or both phases to the engine. Specifically, phase separation of a gasoline/methanol blend is induced by the addition of a minor amount of water sufficient to guarantee separation into an upper gasoline phase and a lower methanol/water phase. A single fuel tank holds the two-phase liquid with separate fuel pickups and separate level indicators for each phase. Either gasoline or methanol, or both, can be supplied to the engine as required by predetermined parameters. A fuel supply system for a phase-separated multiple fuel supply contained in a single fuel tank is described.

Crothers, William T. (Sunol, CA)

1977-01-01T23:59:59.000Z

370

Quantum Dot Solar Cells with Multiple Exciton Generation  

DOE Green Energy (OSTI)

We have measured the quantum yield of the multiple exciton generation (MEG) process in quantum dots (QDs) of the lead-salt semiconductor family (PbSe, PbTe, and PbS) using fs pump-probe transient absorption measurements. Very high quantum yields (up to 300%) for charge carrier generation from MEG have been measured in all of the Pb-VI QDs. We have calculated the potential maximum performance of various MEG QD solar cells in the detailed balance limit. We examined a two-cell tandem PV device with singlet fission (SF), QD, and normal dye (N) absorbers in the nine possible series-connected combinations to compare the tandem combinations and identify the combinations with the highest theoretical efficiency. We also calculated the maximum efficiency of an idealized single-gap MEG QD solar cell with M multiplications and its performance under solar concentration.

Hanna, M. C.; Beard, M. C.; Johnson, J. C.; Murphy, J.; Ellingson, R. J.; Nozik, A. J.

2005-11-01T23:59:59.000Z

371

Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing  

SciTech Connect

Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

Elder, J.; Vandekamp, R.

2011-02-10T23:59:59.000Z

372

SWAMP+: multiple subsequence alignment using associative massive parallelism  

SciTech Connect

A new parallel algorithm SWAMP+ incorporates the Smith-Waterman sequence alignment on an associative parallel model known as ASC. It is a highly sensitive parallel approach that expands traditional pairwise sequence alignment. This is the first parallel algorithm to provide multiple non-overlapping, non-intersecting subsequence alignments with the accuracy of Smith-Waterman. The efficient algorithm provides multiple alignments similar to BLAST while creating a better workflow for the end users. The parallel portions of the code run in O(m+n) time using m processors. When m = n, the algorithmic analysis becomes O(n) with a coefficient of two, yielding a linear speedup. Implementation of the algorithm on the SIMD ClearSpeed CSX620 confirms this theoretical linear speedup with real timings.

Steinfadt, Shannon Irene [Los Alamos National Laboratory; Baker, Johnnie W [KENT STATE UNIV.

2010-10-18T23:59:59.000Z

373

Simulations of Multiplicity Distributions and Perturbations to Nubar Data  

SciTech Connect

The objectives of this project are: (1) Use covariance data to generate random samples of energy dependent nubar; (2) Input the new samples of nubar into MCNP; (3) Run simulations and compare to experimental data; and (4) Repeat until a set of nubar that matches multiplicity distribution without significantly altering k{sub eff} is found. Some conclusions are: (1) Demonstrated that by adjusting nubar within covariance data can recreate multiplicity distributions correctly; (2) k{sub eff} was not changed that significantly, and more trials will likely generate a better result; (3) Can adjust FOM to produce a set of data that does what is desired; and (4) The covariances are tiny relative to the variances.

Bolding, Simon R. [Los Alamos National Laboratory

2013-01-14T23:59:59.000Z

374

Measurement of jet multiplicity in top pair events  

E-Print Network (OSTI)

The normalized differential $t\\bar t$ cross section in jet multiplicity bins is presented, measured in proton-proton collisions using 5.0~fb$^{-1}$ of data collected at $\\sqrt{s}$ = 7~\\TeV. The analysis is performed in the electron + jets and the muon + jets channels. The jet multiplicity distribution is sensitive to initial state radiation. A comparison of the data with different Monte Carlo generators is shown. After background subtraction, the data are in agreement with $t\\bar t$ signal Monte Carlo distributions. Additionally, the measurement of the top quark pair differential cross-section in the number of radiated additional hard partons in the muon + jets channel is presented. The measured fractions of events with $t\\bar t$ + 0, 1, and $\\geq$ 2 additional partons are in good agreement with different Monte Carlo predictions.

CMS Collaboration

2012-01-01T23:59:59.000Z

375

The Riemannian Penrose Inequality with Charge for Multiple Black Holes  

E-Print Network (OSTI)

We present a proof of the Riemannian Penrose inequality with charge $r\\leq m + \\sqrt{m^2-q^2}$, where $A=4\\pi r^2$ is the area of the outermost apparent horizon with possibly multiple connected components, $m$ is the total ADM mass, and $q$ the total charge of a strongly asymptotically flat initial data set for the Einstein-Maxwell equations, satisfying the charged dominant energy condition, with no charged matter outside the horizon.

Marcus Khuri; Gilbert Weinstein; Sumio Yamada

2013-08-17T23:59:59.000Z

376

Efficient Software Implementation for Finite Field Multiplication in Normal Basis  

E-Print Network (OSTI)

Abstract. Finite field arithmetic is becoming increasingly important in today's computer systems, particularly for implementing cryptographic operations. Among various arithmetic operations, finite field multiplication is of particular interest since it is a major building block for elliptic curve cryptosystems. In this paper, we present new techniques for efficient software implementation of binary field multiplication in normal basis. Our techniques are more efficient in terms of both speed and memory compared with alternative approaches. 1 Introduction Finite field arithmetic is becoming increasingly important in today's computer systems, particularly for implementing cryptographic operations. Among the more common finite fields in cryptography are odd-characteristic finite fields of degree 1 and even-characteristic finite fields of degree greater than 1. The latter is conventionally known as GF (2m) arithmetic or binary field arithmetic. GF (2m) arithmetic is further classified according to the choice of basis for representing elements of the finite field; two common choices are polynomial basis and normal basis. Fast implementation techniques for GF (2m) arithmetic have been studied intensively in the past twenty years. Among various arithmetic operations, GF (2m) multiplication has attracted most of the attention since it is a major building block for implementing elliptic curve cryptosystems. Depending on the choice of basis, the mathematical formula for a GF (2m) multiplication can be quite different, thus making major differences in practical implementation. Currently, it seems that normal basis representation (especially optimal normal basis) offers the best performance in hardware [9-11], while in software polynomial basis representation is more efficient [2, 3, 8].

Peng Ning; Yiqun Lisa Yin

2001-01-01T23:59:59.000Z

377

Near Optimal Multiple Alignment Within a Band In Polynomial Time  

E-Print Network (OSTI)

. c­Diagonal Alignment Let S = fs1 ; s2 ; : : : ; sng be a set of n sequences, each of length m, and M one gap per sequence. Given n sequences S = fs1 ; : : : ; sng, over alpha­ bet \\Sigma = f1; : : : ; Ag ; : : : ; sng, each s i has length m. Output: a multiple alignment M. 1. for L from m to nm do for any s i 1

Ma, Bin

378

The resonance absorption probability function for neutron and multiplicative integral  

E-Print Network (OSTI)

The analytical approximations for the moderating neutrons flux density like Fermi spectra, widely used in reactor physics, involve the probability function for moderating neutron to avoid the resonant absorption obtained using some restrictive assumptions regarding the acceptable resonances width. By means of multiplicative integral (Volterra integral) theory for a commutative algebra an analytical expression for the probability function is obtained rigorously without any restrictive assumptions.

Rusov, V D; Kosenko, S I; Chernegenko, S A

2012-01-01T23:59:59.000Z

379

System Configured For Applying Multiple Modifying Agents To A Substrate.  

DOE Patents (OSTI)

The present invention is related to the modifying of substrates with multiple modifying agents in a single continuous system. At least two processing chambers are configured for modifying the substrate in a continuous feed system. The processing chambers can be substantially isolated from one another by interstitial seals. Additionally, the two processing chambers can be substantially isolated from the surrounding atmosphere by end seals. Optionally, expansion chambers can be used to separate the seals from the processing chambers.

Propp, W. Alan (Idaho Falls, ID); Argyle, Mark D. (Idaho Falls, ID); Janikowski, Stuart K. (Idaho Falls, ID); Fox, Robert V. (Idaho Falls, ID); Toth, William J. (Idaho Falls, ID); Ginosar, Daniel M. (Idaho Falls, ID); Allen, Charles A. (Idaho Falls, ID); Miller, David L. (Idaho Falls, ID)

2005-11-08T23:59:59.000Z

380

ALTERNATIVES TO HELIUM-3 FOR NEUTRON MULTIPLICITY DETECTORS  

Science Conference Proceedings (OSTI)

Collaboration between the Pacific Northwest National Laboratory (PNNL) and the Los Alamos National Laboratory (LANL) is underway to evaluate neutron detection technologies that might replace the high-pressure helium (3He) tubes currently used in neutron multiplicity counter for safeguards applications. The current stockpile of 3He is diminishing and alternatives are needed for a variety of neutron detection applications including multiplicity counters. The first phase of this investigation uses a series of Monte Carlo calculations to simulate the performance of an existing neutron multiplicity counter configuration by replacing the 3He tubes in a model for that counter with candidate alternative technologies. These alternative technologies are initially placed in approximately the same configuration as the 3He tubes to establish a reference level of performance against the 3He-based system. After these reference-level results are established, the configurations of the alternative models will be further modified for performance optimization. The 3He model for these simulations is the one used by LANL to develop and benchmark the Epithermal Neutron Multiplicity Counter (ENMC) detector, as documented by H.O. Menlove, et al. in the 2004 LANL report LA-14088. The alternative technologies being evaluated are the boron-tri-fluoride-filled proportional tubes, boron-lined tubes, and lithium coated materials previously tested as possible replacements in portal monitor screening applications, as documented by R.T. Kouzes, et al. in the 2010 PNNL report PNNL-72544 and NIM A 623 (2010) 10351045. The models and methods used for these comparative calculations will be described and preliminary results shown

Ely, James H.; Siciliano, Edward R.; Swinhoe, Martyn T.

2012-02-07T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments (OSTI)

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

382

Diesel engine emissions reduction by multiple injections having increasing pressure  

DOE Patents (OSTI)

Multiple fuel charges are injected into a diesel engine combustion chamber during a combustion cycle, and each charge after the first has successively greater injection pressure (a higher injection rate) than the prior charge. This injection scheme results in reduced emissions, particularly particulate emissions, and can be implemented by modifying existing injection system hardware. Further enhancements in emissions reduction and engine performance can be obtained by using known measures in conjunction with the invention, such as Exhaust Gas Recirculation (EGR).

Reitz, Rolf D. (Madison, WI); Thiel, Matthew P. (Madison, WI)

2003-01-01T23:59:59.000Z

383

Multiple-energy techniques in industrial computerized tomography  

SciTech Connect

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

384

Prospects for Multiple Weak Gauge Boson Production at Supercollider Energies  

E-Print Network (OSTI)

We discuss the prospects for observing multiple weak gauge boson production at the SSC and LHC. We summarize conventional perturbative cross sections for processes involving 1-6 final state weak gauge bosons and compare them with more speculative scenarios including 1) a toy model of a strongly interacting Higgs sector patterned after hadronic multipion production and 2) the nonperturbative production of O(30) weak gauge bosons in a weakly coupled gauge sector.

D. A. Morris

1993-08-24T23:59:59.000Z

385

DEVELOPMENT OF A WIRELINE CPT SYSTEM FOR MULTIPLE TOOL USAGE  

SciTech Connect

The first phase of development of a wireline cone penetrometer system for multiple tool usage was completed under DOE award number DE-AR26-98FT40366. Cone penetrometer technology (CPT) has received widespread interest and is becoming more commonplace as a tool for environmental site characterization activities at several Department of Energy (DOE) facilities. Although CPT already offers many benefits for site characterization, the wireline system can improve CPT technology by offering greater utility and increased cost savings. Currently the use of multiple CPT tools during a site characterization (i.e. piezometric cone, chemical sensors, core sampler, grouting tool) must be accomplished by withdrawing the entire penetrometer rod string to change tools. This results in multiple penetrations being required to collect the data and samples that may be required during characterization of a site, and to subsequently seal the resulting holes with grout. The wireline CPT system allows multiple CPT tools to be interchanged during a single penetration, without withdrawing the CPT rod string from the ground. The goal of the project is to develop and demonstrate a system by which various tools can be placed at the tip of the rod string depending on the type of information or sample desired. Under the base contract, an interchangeable piezocone and grouting tool was designed, fabricated, and evaluated. The results of the evaluation indicate that success criteria for the base contract were achieved. In addition, the wireline piezocone tool was validated against ASTM standard cones, the depth capability of the system was found to compare favorably with that of conventional CPT, and the reliability and survivability of the system were demonstrated.

Stephen P. Farrington; Martin L. Gildea; J. Christopher Bianchi

1999-08-01T23:59:59.000Z

386

The resonance absorption probability function for neutron and multiplicative integral  

E-Print Network (OSTI)

The analytical approximations for the moderating neutrons flux density like Fermi spectra, widely used in reactor physics, involve the probability function for moderating neutron to avoid the resonant absorption obtained using some restrictive assumptions regarding the acceptable resonances width. By means of multiplicative integral (Volterra integral) theory for a commutative algebra an analytical expression for the probability function is obtained rigorously without any restrictive assumptions.

V. D. Rusov; V. A. Tarasov; S. I. Kosenko; S. A. Chernegenko

2012-08-05T23:59:59.000Z

387

Surface analyses and modelling of rate multiplicity and instabilities  

DOE Green Energy (OSTI)

Catalytic partial and complete oxidations of chemical species are a quite important class of reactions in the production of many commercial chemicals and in the elimination of environmental pollutants. This research focuses on a sub-class of oxidation reactions in which CO is a key player -- be it a reactant, intermediate, or product -- in the catalytic sequence and chemistry. The first three years of our research has followed two parallel paths which have a common destination and which together provide a framework for the proposed new research. The first path has involved the development of a combined experimental/modelling and analysis methodology for constructing feasible mechanistic sequences and their corresponding kinetic models of catalytic reactions that exhibit multiple rate behavior. The rather well-studied Pt catalyzed CO oxidation served as the test reaction. Our approach involves the measurement of basic kinetic features (apparent reaction orders, activation energy) and multiplicity features (location of ignition and extinction points) over a wide range of conditions (catalyst temperature, total pressure, feed composition), and a kinetic modelling part, in which potential reaction sequences are constructed and screened based on their ability to predict the experimentally observed kinetic and multiplicity features over a wide range of conditions. The second path has involved the development of an under-utilized (in catalysis) spectroscopic technique, Fourier transform infrared emission spectroscopy (FTIRES), to monitor the surface of a catalyst during reaction. Main accomplishments from both studies are summarized.

Harold, M.P.; Conner, W.C.

1990-11-01T23:59:59.000Z

388

Multiple Reference Fourier Transform Holography: Five Images for the Price  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Reference Fourier Transform Multiple Reference Fourier Transform Holography: Five Images for the Price of One Improving the quality of a high magnification image on an optical microscope is simply a matter of cranking up the intensity of the illumination lamp. The same is true for x-ray microscopes, but complications arise when there just aren't enough x-rays or even worse when the sample is susceptible to damage caused by the intense x-ray beam. To address these challenges we have demonstrated a novel technique for improving the quality of a microscopic image without increasing the x-ray exposure to the specimen. This affords new opportunities to explore materials prone to soft x-ray damage, like polymer or biological samples. Our technique uses coherent x-ray scattering to simultaneously acquire multiple images of a specimen, which can easily be combined later to enhance the image quality. Applying our technique in the weak illumination limit we imaged a nanoscale test object by detecting only 2500 photons.

389

STOMP, Subsurface Transport Over Multiple Phases, theory guide  

Science Conference Proceedings (OSTI)

This guide describes the simulator`s governing equations, constitutive functions and numerical solution algorithms of the STOMP (Subsurface Transport Over Multiple Phases) simulator, a scientific tool for analyzing multiple phase subsurface flow and transport. The STOMP simulator`s fundamental purpose is to produce numerical predictions of thermal and hydrologic flow and transport phenomena in variably saturated subsurface environments, which are contaminated with volatile or nonvolatile organic compounds. Auxiliary applications include numerical predictions of solute transport processes including radioactive chain decay processes. In writing these guides for the STOMP simulator, the authors have assumed that the reader comprehends concepts and theories associated with multiple-phase hydrology, heat transfer, thermodynamics, radioactive chain decay, and nonhysteretic relative permeability, saturation-capillary pressure constitutive functions. The authors further assume that the reader is familiar with the computing environment on which they plan to compile and execute the STOMP simulator. The STOMP simulator requires an ANSI FORTRAN 77 compiler to generate an executable code. The memory requirements for executing the simulator are dependent on the complexity of physical system to be modeled and the size and dimensionality of the computational domain. Likewise execution speed depends on the problem complexity, size and dimensionality of the computational domain, and computer performance. One-dimensional problems of moderate complexity can be solved on conventional desktop computers, but multidimensional problems involving complex flow and transport phenomena typically require the power and memory capabilities of workstation or mainframe type computer systems.

White, M.D.; Oostrom, M.

1996-10-01T23:59:59.000Z

390

Upper Limits from Counting Experiments with Multiple Pipelines  

E-Print Network (OSTI)

In counting experiments, one can set an upper limit on the rate of a Poisson process based on a count of the number of events observed due to the process. In some experiments, one makes several counts of the number of events, using different instruments, different event detection algorithms, or observations over multiple time intervals. We demonstrate how to generalize the classical frequentist upper limit calculation to the case where multiple counts of events are made over one or more time intervals using several (not necessarily independent) procedures. We show how different choices of the rank ordering of possible outcomes in the space of counts correspond to applying different levels of significance to the various measurements. We propose an ordering that is matched to the sensitivity of the different measurement procedures and show that in typical cases it gives stronger upper limits than other choices. As an example, we show how this method can be applied to searches for gravitational-wave bursts, where multiple burst-detection algorithms analyse the same data set, and demonstrate how a single combined upper limit can be set on the gravitational-wave burst rate.

Patrick J. Sutton

2009-05-26T23:59:59.000Z

391

Theories of Multiple Equilibria-A Critical Reexamination. Part I: Barotropic Models  

Science Conference Proceedings (OSTI)

Previous results claiming the existence of multiple equilibria based on simple barotropic or two-layer models of the atmosphere are reexamined. While not ruling out the existence of multiple equilibria we find that the application of these ...

K. K. Tung; A. J. Rosenthal

1985-12-01T23:59:59.000Z

392

Propagation models for multiple-antenna systems : methodology, measurements and statistics  

E-Print Network (OSTI)

The trend in wireless communications is towards utilization of multiple antenna systems. While techniques such as beam-forming and spatial diversity have been implemented for some time, the emergence of Multiple-Input ...

Herring, Keith, 1981-

2008-01-01T23:59:59.000Z

393

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

394

Single-inductor, multiple-output buck converter with parallel source transient recovery  

E-Print Network (OSTI)

To address the need for multiple regulated voltage supplies in electronic devices, this thesis presents a modeling and design study of a single-inductor, multiple-output (SIMO) DC-DC buck converter with parallel source ...

King, Charles Jackson, III

2009-01-01T23:59:59.000Z

395

Error control coding for the N-user mod-2 multiple-access channel  

Science Conference Proceedings (OSTI)

The efficient use of transmission facilities often requires the sharing of resources by a number of users. Commonly used methods of shared media access are time division multiple access (TDMA), frequency-division multiple access (FDMA), code-division ...

V. P. Telang; M. A. Herro

1998-07-01T23:59:59.000Z

396

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

397

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

398

STUDY OF LIQUID CRYSTAL CONFORMATION BY MULTIPLE QUANTUM NMR: n-PENTYL CYANOBIPHENYL  

E-Print Network (OSTI)

The proton::. and to of twist NMR spectrum of Proton The toCONFORMATION BY MULTIPLE QUANTUM NMR: n-PENTYL CYANOBIPHENYLCONFORMATION BY MULTIPLE QUANTUM NMR: n~PENTYL CYANOBIPHENYL

Sinton, S.

2013-01-01T23:59:59.000Z

399

Analysis of Wind Power and Load Data at Multiple Time Scales  

NLE Websites -- All DOE Office Websites (Extended Search)

Analysis of Wind Power and Load Data at Multiple Time Scales Title Analysis of Wind Power and Load Data at Multiple Time Scales Publication Type Report Year of Publication 2010...

400

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodolog...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific...

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Reflected Neutron Effects in Multiplicity Measurements of Bare HEU Assemblies  

SciTech Connect

In a passive multiplicity characterization of highly enriched uranium (HEU) assemblies, fission chains are initiated by the characteristically fast neutrons from spontaneous fission of {sup 238}U and {sup 235}U as well as cosmic-ray spallation neutrons. Active interrogation of HEU uses other physical mechanisms for starting chains by inducing fission from high-energy neutrons, high-energy gamma-rays, delayed neutrons, or thermal neutrons. In all cases a contribution to the initiation of fission chains is the reflection of neutrons that initially escape the assembly and re-enter it after undergoing some scattering. The reflected neutron flux is geometry dependent and a combination of fast and thermal energies. The reflected thermal neutron contribution occurs hundreds of microseconds after the beginning of the fission chain and can be distinguished from the cosmic-ray spallation neutrons unrelated to fission chains, resulting in an HEU detection signature with high signal-to-noise. However, the reflected thermal neutron flux can be eliminated with an efficient thermal neutron absorber to investigate reflected neutron effects. In this paper, active and passive multiplicity measurements with HEU oxide assemblies of up to 16 kg of fuel pins and HEU metal assemblies of up to five 18 kg storage castings are reported. Each case demonstrates the differences in HEU signature when a borated thermal neutron absorber is present and shows the various detectable signatures with 3He proportional counters, the standard detector for differential die-way and neutron multiplicity measurements, and liquid scintillators, a detector capable of operating on the timescale of fission chains.

McConchie, Seth M [ORNL; Hausladen, Paul [ORNL; Mihalczo, John T [ORNL

2010-01-01T23:59:59.000Z

402

Energy- and time-efficient matrix multiplication on FPGAs  

E-Print Network (OSTI)

AbstractWe develop new algorithms and architectures for matrix multiplication on configurable devices. These have reduced energy dissipation and latency compared with the state-of-the-art field-programmable gate array (FPGA)-based designs. By profiling well-known designs, we identify energy hot spots, which are responsible for most of the energy dissipation. Based on this, we develop algorithms and architectures that offer tradeoffs among the number of I/O ports, the number of registers, and the number of PEs. To avoid time-consuming low-level simulations for energy profiling and performance prediction of many alternate designs, we derive functions to represent the impact of algorithm design choices on the system-wide energy dissipation, area, and latency. These functions are used to either optimize the energy performance or provide tradeoffs for a family of candidate algorithms and architectures. For selected designs, we perform extensive low-level simulations using state-of-the-art tools and target FPGA devices. We show a design space for matrix multiplication on FPGAs that results in tradeoffs among energy, area, and latency. For example, our designs improve the energy performance of state-of-the-art FPGA-based designs by 29%51% without any increase in the arealatency product. The latency of our designs is reduced one-third to one-fifteenth while area is increased 1.99.4 times. In terms of comprehensive metrics such as Energy-Area-Time, our designs exhibit superior performance compared with the state-of-the-art by 50%79%. Index TermsAlgorithm design, configurable hardware, energy-delay tradeoff, field-programmable gate array (FPGA), linear array, matrix multiplication, performance estimation. I.

Ju-wook Jang; Seonil B. Choi; Viktor K. Prasanna

2005-01-01T23:59:59.000Z

403

DOE Designated User Facilities Multiple Laboratories * ARM Climate Research Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Designated User Facilities Designated User Facilities Multiple Laboratories * ARM Climate Research Facility Argonne National Laboratory * Advanced Photon Source (APS) * Electron Microscopy Center for Materials Research * Argonne Tandem Linac Accelerator System (ATLAS) * Center for Nanoscale Materials (CNM) * Argonne Leadership Computing Facility (ALCF) * Brookhaven National Laboratory * National Synchrotron Light Source (NSLS) * Accelerator Test Facility (ATF) * Relativistic Heavy Ion Collider (RHIC) * Center for Functional Nanomaterials (CFN) * National Synchrotron Light Source II (NSLS-II ) (under construction) Fermi National Accelerator Laboratory * Fermilab Accelerator Complex Idaho National Laboratory * Advanced Test Reactor ** * Wireless National User Facility (WNUF)

404

Radiation detector having a multiplicity of individual detecting elements  

DOE Patents (OSTI)

A radiation detector has a plurality of detector collection element arrays immersed in a radiation-to-electron conversion medium. Each array contains a multiplicity of coplanar detector elements radially disposed with respect to one of a plurality of positions which at least one radiation source can assume. Each detector collector array is utilized only when a source is operative at the associated source position, negating the necessity for a multi-element detector to be moved with respect to an object to be examined. A novel housing provides the required containment of a high-pressure gas conversion medium.

Whetten, Nathan R. (Burnt Hills, NY); Kelley, John E. (Albany, NY)

1985-01-01T23:59:59.000Z

405

The DASCH Data Processing Pipeline and Multiple Exposure Plate Processing  

E-Print Network (OSTI)

Digital Access to a Sky Century @ Harvard (DASCH) is a project to digitize the collection of approximately 525,000 astronomical plates held at the Harvard College Observatory. This paper presents an overview of the DASCH data processing pipeline, with special emphasis on the processing of multiple-exposure plates. Such plates extended the dynamic range of photograph emulsions and improved photometric accuracy by minimizing variations in plate development procedures. Two approaches are explored in this paper: The repetitive use of astrometry.net (Lang et al. 2010) and local correlation searches. Both procedures have yielded additional quality control checks useful to the pipeline.

Los, Edward; Tang, Sumin; Servillat, Mathieu; Laycock, Silas

2011-01-01T23:59:59.000Z

406

Solving $k$-Nearest Vector Problem on Multiple Graphics Processors  

E-Print Network (OSTI)

In a recommendation system, customers' preferences are encoded into vectors, and finding the nearest vectors to each vector is an essential part. We define this part of problem as a $k$-nearest vector problem and give an effective algorithm to solve it on multiple graphics processor units (GPUs). By an experiment, we show that when the size of the problem is large, an implementation of the algorithm on two GPUs runs more than 260 times faster than a single core implementation on a latest CPU. We also show that our algorithm scales well with respect to the number of GPUs.

Kato, Kimikazu

2009-01-01T23:59:59.000Z

407

Multiple Access Channels with Generalized Feedback and Confidential Messages  

E-Print Network (OSTI)

This paper considers the problem of secret communication over a multiple access channel with generalized feedback. Two trusted users send independent confidential messages to an intended receiver, in the presence of a passive eavesdropper. In this setting, an active cooperation between two trusted users is enabled through using channel feedback in order to improve the communication efficiency. Based on rate-splitting and decode-and-forward strategies, achievable secrecy rate regions are derived for both discrete memoryless and Gaussian channels. Results show that channel feedback improves the achievable secrecy rates.

Tang, Xiaojun; Spasojevic, Predrag; Poor, H Vincent

2007-01-01T23:59:59.000Z

408

Enhanced Photofission-based, Coincidence/Multiplicity Inspection Measurements  

SciTech Connect

An enhanced active interrogation system has been developed that integrates a transportable Idaho National Laboratory (INL) photonuclear inspection system, using a pulsed bremsstrahlung source and a reconfigurable neutron detection system, with a Los Alamos National Laboratory (LANL) list-mode data acquisition system. A series of active interrogation experiments have shown enhanced nuclear material detection and identification utilizing pulsed photofission-induced, neutron coincidence/multiplicity counting between pulses of an up-to-10-MeV electron accelerator. This paper describes the integrated inspection system and presents some key shielded and unshielded nuclear material inspection results. The enhanced inspection methodology has applicability to homeland security and possible nuclear weapon dismantlement treaties.

J.L. Jones; D.R. Norman; K.J. Haskell; M.T. Swinhoe; S.J. Tobin; W.H. Geist; R.B. Rothrock; C.R. Freeman

2010-07-01T23:59:59.000Z

409

Engineering the Multiple Use of the Right of Way  

Science Conference Proceedings (OSTI)

Transmission line owners and operators are under increasing pressure to share the use of their rights-of-way with other systems and for other activities. The objective of the "Engineering the Multiple Use of the Right of Way" project is to develop a guide for the design and maintenance of transmission lines so that the systems can operate reliably and activities can be carried out safety on these shared rights-of-way. It is a multi-year project conducted from 2004 to 2007. The first task of the project ...

2006-11-13T23:59:59.000Z

410

Multiple piece turbine engine airfoil with a structural spar  

DOE Patents (OSTI)

A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.

Vance, Steven J. (Orlando, FL)

2011-10-11T23:59:59.000Z

411

Resistance to ground of combined grid-multiple rods electrodes  

SciTech Connect

The resistance to ground of substations ground electrodes is one of the most important parameters determining the potential rise of the grounded equipment and other metal work within substation with respect to the remote earth as well as the potentials which might be transferred outside the substation. The resistance to ground of a wide set of square and rectangular grid electrodes combined with multiple rods, buried in uniform and two-layer soils, has been analyzed using available exact computer software. Based upon the results of this analysis, analytical expressions and graphs for electrodes resistance to ground are provided, appropriate for practical application.

Nahman, J.M. [Faculty of Electrical Engineering, Belgrade (Yugoslavia)] [Faculty of Electrical Engineering, Belgrade (Yugoslavia); Djordjevic, V.B. [Energoprojekt-Hidroinzenjering, Belgrade (Yugoslavia)] [Energoprojekt-Hidroinzenjering, Belgrade (Yugoslavia)

1996-07-01T23:59:59.000Z

412

Detection of electromagnetic radiation using micromechanical multiple quantum wells structures  

DOE Patents (OSTI)

An apparatus and method for detecting electromagnetic radiation employs a deflectable micromechanical apparatus incorporating multiple quantum wells structures. When photons strike the quantum-well structure, physical stresses are created within the sensor, similar to a "bimetallic effect." The stresses cause the sensor to bend. The extent of deflection of the sensor can be measured through any of a variety of conventional means to provide a measurement of the photons striking the sensor. A large number of such sensors can be arranged in a two-dimensional array to provide imaging capability.

Datskos, Panagiotis G [Knoxville, TN; Rajic, Slobodan [Knoxville, TN; Datskou, Irene [Knoxville, TN

2007-07-17T23:59:59.000Z

413

Huddle: automatically generating interfaces for systems of multiple connected appliances  

E-Print Network (OSTI)

Systems of connected appliances, such as home theaters and presentation rooms, are becoming commonplace in our homes and workplaces. These systems are often difficult to use, in part because users must determine how to split the tasks they wish to perform into sub-tasks for each appliance and then find the particular functions of each appliance to complete their sub-tasks. This paper describes Huddle, a new system that automatically generates taskbased interfaces for a system of multiple appliances based on models of the content flow within the multi-appliance system. ACM Classification: H5.2 [Information interfaces and

Jeffrey Nichols; On Rothrock; Duen Horng Chau; Brad A. Myers

2006-01-01T23:59:59.000Z

414

Impact of Intel's new instruction sets on software implementation of GF(2)[x] multiplication  

Science Conference Proceedings (OSTI)

PCLMULQDQ, a new instruction that supports GF(2)[x] multiplication, was introduced by Intel in 2010. This instruction brings dramatic change to software implementation of multiplication in GF(2^m) fields. In this paper, we present improved Karatsuba ... Keywords: AVX, Cryptography, GF(2)[x] multiplication, Karatsuba algorithm, PCLMULQDQ, SSE

Chen Su; Haining Fan

2012-06-01T23:59:59.000Z

415

Energy Minimization Using Multiple Supply Voltages Jui-Ming Chang and Massoud Pedram  

E-Print Network (OSTI)

Energy Minimization Using Multiple Supply Voltages Jui-Ming Chang and Massoud Pedram Department and energy costs of these level shifters must be taken into account when comparing a multiple-supply voltage a dynamic programming technique for solv- ing the multiple supply voltage scheduling problem in both non

Pedram, Massoud

416

Hoping for A to Z While Rewarding Only A: Complex Organizations and Multiple Goals  

Science Conference Proceedings (OSTI)

This paper explores the trade-offs inherent in the pursuit and fulfillment of multiple performance goals in complex organizations. We examine two related research questions: (1) What are the organizational implications of pursuing multiple performance ... Keywords: complex organizations, multiple performance goals

Sendil K. Ethiraj; Daniel Levinthal

2009-01-01T23:59:59.000Z

417

Spectral multiplicity for powers of weakly mixing automorphisms  

SciTech Connect

We study the behaviour of the maximal spectral multiplicity m(R{sup n}) for the powers of a weakly mixing automorphism R. For some particular infinite sets A we show that there exists a weakly mixing rank-one automorphism R such that m(R{sup n})=n and m(R{sup n+1})=1 for all positive integers n element of A. Moreover, the cardinality cardm(R{sup n}) of the set of spectral multiplicities for the power R{sup n} is shown to satisfy the conditions cardm(R{sup n+1})=1 and cardm(R{sup n})=2{sup m(n)}, m(n){yields}{infinity}, n element of A. We also construct another weakly mixing automorphism R with the following properties: all powers R{sup n} have homogeneous spectra and the set of limit points of the sequence {l_brace}m(R{sup n})/n:n element of N{r_brace} is infinite. Bibliography: 17 titles.

Ryzhikov, Valerii V [M. V. Lomonosov Moscow State University, Faculty of Mechanics and Mathematics, Moscow (Russian Federation)

2012-07-31T23:59:59.000Z

418

Energetics of Multiple-Ion Species Hohlraum Plasmas  

DOE Green Energy (OSTI)

A study of the laser-plasma interaction processes in multiple-ion species plasmas has been performed in plasmas that are created to emulate the plasma conditions in indirect drive inertial confinement fusion targets. Gas-filled hohlraums with densities of xe22/cc are heated to Te=3keV and backscattered laser light is measured by a suite of absolutely calibrated backscatter diagnostics. Ion Landau damping is increased by adding hydrogen to the CO2/CF4 gas fill. We find that the backscatter from stimulated Brillouin scattering is reduced is monotonically reduced with increasing damping, demonstrating that Landau damping is the controlling damping mechanism in ICF relevant high-electron temperature plasmas. The reduction in backscatter is accompanied by a comparable increase in both transmission of a probe beam and an increased hohlraum radiation temperature, showing that multiple-ion species plasmas improve the overall hohlraum energetics/performance. Comparison of the experimental data to linear gain calculations as well as detailed full-scale 3D laser-plasma interaction simulations show quantitative agreement. Our findings confirm the importance of Landau damping in controlling backscatter from high-electron temperature hohlraum plasmas and have lead to the inclusion of multi-ion species plasmas in the hohlraum point design for upcoming ignition campaigns at the National Ignition Facility.

Neumayer, P; Berger, R; Callahan, D; Divol, L; Froula, D; London, R; MacGowan, B J; Meezan, N; Michel, P; Ross, J S; Sorce, C; Widmann, K; Suter, L; Glenzer, S H

2007-11-05T23:59:59.000Z

419

Hanford Technical Basis for Multiple Dosimetry Effective Dose Methodology  

SciTech Connect

The current method at Hanford for dealing with the results from multiple dosimeters worn during non-uniform irradiation is to use a compartmentalization method to calculate the effective dose (E). The method, as documented in the current version of Section 6.9.3 in the 'Hanford External Dosimetry Technical Basis Manual, PNL-MA-842,' is based on the compartmentalization method presented in the 1997 ANSI/HPS N13.41 standard, 'Criteria for Performing Multiple Dosimetry.' With the adoption of the ICRP 60 methodology in the 2007 revision to 10 CFR 835 came changes that have a direct affect on the compartmentalization method described in the 1997 ANSI/HPS N13.41 standard, and, thus, to the method used at Hanford. The ANSI/HPS N13.41 standard committee is in the process of updating the standard, but the changes to the standard have not yet been approved. And, the drafts of the revision of the standard tend to align more with ICRP 60 than with the changes specified in the 2007 revision to 10 CFR 835. Therefore, a revised method for calculating effective dose from non-uniform external irradiation using a compartmental method was developed using the tissue weighting factors and remainder organs specified in 10 CFR 835 (2007).

Hill, Robin L.; Rathbone, Bruce A.

2010-08-01T23:59:59.000Z

420

Smart Energy Management of Multiple Full Cell Powered Applications  

DOE Green Energy (OSTI)

In this research project the University of South Alabama research team has been investigating smart energy management and control of multiple fuel cell power sources when subjected to varying demands of electrical and thermal loads together with demands of hydrogen production. This research has focused on finding the optimal schedule of the multiple fuel cell power plants in terms of electric, thermal and hydrogen energy. The optimal schedule is expected to yield the lowest operating cost. Our team is also investigating the possibility of generating hydrogen using photoelectrochemical (PEC) solar cells through finding materials for efficient light harvesting photoanodes. The goal is to develop an efficient and cost effective PEC solar cell system for direct electrolysis of water. In addition, models for hydrogen production, purification, and storage will be developed. The results obtained and the data collected will be then used to develop a smart energy management algorithm whose function is to maximize energy conservation within a managed set of appliances, thereby lowering O/M costs of the Fuel Cell power plant (FCPP), and allowing more hydrogen generation opportunities. The Smart Energy Management and Control (SEMaC) software, developed earlier, controls electrical loads in an individual home to achieve load management objectives such that the total power consumption of a typical residential home remains below the available power generated from a fuel cell. In this project, the research team will leverage the SEMaC algorithm developed earlier to create a neighborhood level control system.

Mohammad S. Alam

2007-04-23T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Quantum Dot Solar Cells: High Efficiency through Multiple Exciton Generation  

DOE Green Energy (OSTI)

Impact ionization is a process in which absorbed photons in semiconductors that are at least twice the bandgap can produce multiple electron-hole pairs. For single-bandgap photovoltaic devices, this effect produces greatly enhanced theoretical thermodynamic conversion efficiencies that range from 45-85%, depending upon solar concentration, the cell temperature, and the number of electron-hole pairs produced per photon. For quantum dots (QDs), electron-hole pairs exist as excitons. We have observed astoundingly efficient multiple exciton generation (MEG) in QDs of PbSe (bulk Eg = 0.28 eV), ranging in diameter from 3.9 to 5.7nm (Eg = 0.73, 0.82, and 0.91 eV, respectively). The effective masses of electron and holes are about equal in PbSe, and the onset for efficient MEG occurs at about three times the QD HOMO-LUMO transition (its ''bandgap''). The quantum yield rises quickly after the onset and reaches 300% at 4 x Eg (3.64 eV) for the smallest QD; this means that every QD in the sample produces three electron-hole pairs/photon.

Hanna, M. C.; Ellingson, R. J.; Beard, M.; Yu, P.; Micic, O. I.; Nozik, A. J.; c.

2005-01-01T23:59:59.000Z

422

Multiple cell radiation detector system, and method, and submersible sonde  

DOE Patents (OSTI)

A multiple cell radiation detector includes a central cell having a first cylindrical wall providing a stopping power less than an upper threshold; an anode wire suspended along a cylindrical axis of the central cell; a second cell having a second cylindrical wall providing a stopping power greater than a lower threshold, the second cylindrical wall being mounted coaxially outside of the first cylindrical wall; a first end cap forming a gas-tight seal at first ends of the first and second cylindrical walls; a second end cap forming a gas-tight seal at second ends of the first and second cylindrical walls; and a first group of anode wires suspended between the first and second cylindrical walls.

Johnson, Larry O. (Island Park, ID); McIsaac, Charles V. (Idaho Falls, ID); Lawrence, Robert S. (Shelley, ID); Grafwallner, Ervin G. (Arco, ID)

2002-01-01T23:59:59.000Z

423

Charging system with galvanic isolation and multiple operating modes  

SciTech Connect

Systems and methods are provided for operating a charging system with galvanic isolation adapted for multiple operating modes. A vehicle charging system comprises a DC interface, an AC interface, a first conversion module coupled to the DC interface, and a second conversion module coupled to the AC interface. An isolation module is coupled between the first conversion module and the second conversion module. The isolation module comprises a transformer and a switching element coupled between the transformer and the second conversion module. The transformer and the switching element are cooperatively configured for a plurality of operating modes, wherein each operating mode of the plurality of operating modes corresponds to a respective turns ratio of the transformer.

Kajouke, Lateef A.; Perisic, Milun; Ransom, Ray M.

2013-01-08T23:59:59.000Z

424

Creation of multiple identical single photon emitters in diamond  

E-Print Network (OSTI)

Emitters of indistinguishable single photons are crucial for the growing field of quantum technologies. To realize scalability and increase the complexity of quantum optics technologies, multiple independent yet identical single photon emitters are also required. However typical solid-state single photon sources are dissimilar, necessitating the use of electrical feedback or optical cavities to improve spectral overlap between distinct emitters. Here, we present controllable growth of bright silicon-vacancy (SiV-) centres in bulk diamond which intrinsically show almost identical emission (spectral overlap of up to 83%) and near transform-limited excitation linewidths. We measure the photo-physical properties of defects at room and cryogenic temperatures, and demonstrate incorporation into a solid immersion lens (SIL). Our results have impact upon the application of single photon sources for quantum optics and cryptography, and the production of next generation fluorophores for bio-imaging.

Lachlan J. Rogers; Kay D. Jahnke; Luca Marseglia; Christoph. Mller; Boris Naydenov; Hardy Schauffert; C. Kranz; T. Teraji; Junichi Isoya; Liam P. McGuinness; Fedor Jelezko

2013-10-14T23:59:59.000Z

425

MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations  

Office of Legacy Management (LM)

52. 52. APR 9 1986 MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations International Minerals and Chemical Corporation P.O. Box 7047 Lakeland, Florida 33807 Dear Mr. Speir: The Department of Energy is evaluating the radiological condition of sites that were utilized by the Manhattan Engineer District and the Atomic Energy Commission (AEC) during the early years of nuclear energy development to determine whether they need remedial action and whether the Department has authority to perform such action. As you may be aware through previous correspondence, the International Minerals and Chemical Corporation facility in Mulberry, Florida, was identified as one such site, as a result of some research, development, and pilot plant work conducted at the

426

Integrating multiple internet directories by instance-based learning  

E-Print Network (OSTI)

Finding desired information on the Internet is becoming increasingly difficult. Internet directories such as Yahoo!, which organize web pages into hierarchical categories, provide one solution to this problem; however, such directories are of limited use because some bias is applied both in the collection and categorization of pages. We propose a method for integrating multiple Internet directories by instance-based learning. Our method provides the mapping of categories in order to transfer documents from one directory to another, instead of simply merging two directories into one. We present herein an effective algorithm for determining similar categories between two directories via a statistical method called the k-statistic. In order to evaluate the proposed method, we conducted experiments using two actual Internet directories, Yahoo! and Google. The results show that the proposed method achieves extensive improvements relative to both the Naive Bayes and Enhanced Naive Bayes approaches, without any text analysis on documents. 1

Ryutaro Ichise; Hiedeaki Takeda; Shinichi Honiden

2003-01-01T23:59:59.000Z

427

Will multiple probes of dark energy find modified gravity?  

SciTech Connect

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w{sub 0}-w{sub a} plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Shapiro, Charles [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); Dodelson, Scott [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States); Department of Astronomy and Astrophysics, University of Chicago, Chicago, Illinois 60637 (United States); Kavli Institute for Cosmological Physics, Chicago, Illinois 60637 (United States); Hoyle, Ben [Institut de Ciencies del Cosmos, Barcelona (Spain); Samushia, Lado [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); National Abastumani Astrophysical Observatory, Ilia State University, 2A Kazbegi Ave, GE-0160 Tbilisi (Georgia); Flaugher, Brenna [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States)

2010-08-15T23:59:59.000Z

428

Multiple spherically converging shock waves in liquid deuterium  

Science Conference Proceedings (OSTI)

To achieve ignition, inertial confinement fusion target designs use a sequence of shocks to compress the target before it implodes. To minimize the entropy acquired by the fuel, the strength and timing of these shocks will be precisely set during a series of tuning experiments that adjust the laser pulse to achieve optimal conditions. We report measurements of the velocity and timing of multiple, converging shock waves inside spherical targets filled with liquid (cryogenic) deuterium. These experiments produced the highest reported shock velocity observed in liquid deuterium (U{sub s} = 135 km/s at {approx}25 Mb) and observed an increase in shock velocity due to spherical convergence. These direct-drive experiments are best simulated when hydrodynamic codes use a nonlocal model for the transport of absorbed laser energy from the coronal plasma to the ablation surface.

Boehly, T. R.; Goncharov, V. N.; Seka, W.; Hu, S. X.; Marozas, J. A. [Laboratory for Laser Energetics, 250 East River Road, Rochester, New York 14423-1299 (United States); Meyerhofer, D. D. [Laboratory for Laser Energetics and Departments of Mechanical Engineering and Physics, University of Rochester, Rochester, New York 14627 (United States); Celliers, P. M.; Hicks, D. G.; Barrios, M. A.; Fratanduono, D.; Collins, G. W. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States)

2011-09-15T23:59:59.000Z

429

Multiple mapping conditioning of velocity in turbulent jet flames  

Science Conference Proceedings (OSTI)

Multiple mapping conditioning (MMC) has emerged as a new approach to model turbulent reacting flows. This study revises the standard MMC closure for velocity in turbulent jet flows from linearity in the reference space to linearity in the composition space. This modeling amendment ensures that the standard velocity model in conditional moment closure studies can now be used for MMC computation as well. A simplified model for the velocity-dependence of MMC drift coefficients is derived without loss of generality and is implemented for the revised velocity closure. Modeling results have been corroborated against the Direct Numerical Simulation database of a spatially evolving, planar turbulent jet flame. The revised model shows marked improvement over standard MMC closure in predicting velocity statistics close to the nozzle. (author)

Vaishnavi, P. [Mechanical Engineering Department, Imperial College, London SW7 2AZ (United Kingdom); Kronenburg, A. [Institut fuer Technische Verbrennung, Universitaet Stuttgart, 70174 Stuttgart (Germany)

2010-10-15T23:59:59.000Z

430

Single transmission line interrogated multiple channel data acquisition system  

DOE Patents (OSTI)

A single transmission line interrogated multiple channel data acquisition system is provided in which a plurality of remote station/sensor circuits each monitors a specific process variable and each transmits measurement values over a single transmission line to a master interrogating station when addressed by said master interrogating station. Typically, as many as 330 remote stations may be parallel connected to the transmission line which may exceed 7,000 feet. The interrogation rate is typically 330 stations/second. The master interrogating station samples each station according to a shared, charging transmit-receive cycle. All remote station address signals, all data signals from the remote stations/sensors and all power for all of the remote station/sensors are transmitted via a single continuous terminated coaxial cable. A means is provided for periodically and remotely calibrating all remote sensors for zero and span. A provision is available to remotely disconnect any selected sensor station from the main transmission line.

Fasching, George E. (Morgantown, WV); Keech, Jr., Thomas W. (Morgantown, WV)

1980-01-01T23:59:59.000Z

431

Making Prony analysis more accurate using multiple signals  

SciTech Connect

Prony analysis has proven to be a valuable tool in estimating the modal content of power oscillations from measured ringdowns. The accuracy of the mode estimates is limited by the noise content always found in field measured signals. Current Prony analysis methods assume the system to be single output, and individual signals are analyzed independently often resulting in conflicting frequency and damping estimates (due to noise effects). This paper considers a simple extension to Prony analysis that allows multiple signals to be analyzed simultaneously resulting in one set of mode estimates. Examples are used to show that this extension improves the accuracy of modal estimates and simplifies the analysis steps. The first example uses a Monte Carlo type simulation model and the second analyzes field measured data from the western North American power system.

Trudnowski, D.J. [Univ. of Montana, Butte, MT (United States); Johnson, J.M.; Hauer, J.F. [Pacific Northwest National Lab., Richland, WA (United States)

1999-02-01T23:59:59.000Z

432

Multiple delivery cesium oven system for negative ion sources  

Science Conference Proceedings (OSTI)

Distribution of cesium in large negative ion beam sources to be operational in ITER, is presently based on the use of three or more cesium ovens, which operate simultaneously and are controlled remotely. However, use of multiple Cs ovens simultaneously is likely to pose difficulties in operation and maintenance of the ovens. An alternate method of Cs delivery, based on a single oven distribution system is proposed as one which could reduce the need of simultaneous operation of many ovens. A proof of principle experiment verifying the concept of a multinozzle distributor based Cs oven has been carried out at Institute for Plasma Research. It is also observed that the Cs flux is not controlled by Cs reservoir temperature after few hours of operation but by the temperature of the distributor which starts behaving as a Cs reservoir.

Bansal, G.; Bhartiya, S.; Pandya, K.; Bandyopadhyay, M.; Singh, M. J.; Soni, J.; Gahlaut, A.; Parmar, K. G.; Chakraborty, A. [Institute for Plasma Research, Bhat, Gandhinagar, Gujarat 382428 (India)

2012-02-15T23:59:59.000Z

433

Compact waveguide power divider with multiple isolated outputs  

DOE Patents (OSTI)

The waveguide power divider comprises an input waveguide of rectangular cross-section coupled to multiple reduced height output waveguides of rectangular cross-section. The input is coupled to the output waveguides by axial slots. The length of the slots is selected such that the wave direction of the input waveguide is preserved in the output waveguides. The width of the output guide is equal to the width of the input waveguide so that the input and output guides have the same cutoff wavelength. Waves will then travel with the same phase velocity in the input and output guides. The unused ends of the input and output guides are terminated in matched loads. The load at the end of the input guide absorbs power that is not coupled to the output guides.

Moeller, C.P.

1986-05-27T23:59:59.000Z

434

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network (OSTI)

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model is employed to predict the cooling tower performance at various conditions. Natural convection when the fan is off is accounted by using an assumed airflow rate. The energy savings at five cities representing different typical climates are studied using typical meteorological year data. The results show that, if the tower capacity can be increased by 50% and 100% by running extra tower cells, the annual total fan power usage can be reduced by 44% and 61%, respectively. A cumulative saving percent curve is generated to help estimate the annual total savings percent when extra cooling tower capacity is available during only part of a year.

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

435

Higher moments of net-proton multiplicity distributions  

Science Conference Proceedings (OSTI)

Higher moments of event-by-event net-proton multiplicity distributions have been applied to search for the QCD critical point. Model results are used to provide a baseline for this search. The measured moment products, {kappa}{sigma}{sup 2} and S{sigma} of net-proton distributions, which are directly connected to the thermodynamical baryon number susceptibility ratio in Lattice QCD and Hadron Resonance Gas (HRG) model, are compared to the transport and thermal model results. We argue that a non-monotonic dependence of {kappa}{sigma}{sup 2} and S{sigma} as a function of beam energy can be used to search for the QCD critical point.

Luo Xiaofeng, E-mail: xfluo@lbl.gov [Central China Normal University, Institute of Particle Physics (China); Mohanty, Bedangadas [Variable Energy Cyclotron Center (India); Ritter, Hans Georg; Xu Nu [Lawrence Berkeley National Laboratory (United States)

2012-06-15T23:59:59.000Z

436

Multiple particle production processes in the light'' of quantum optics  

Science Conference Proceedings (OSTI)

Ever since the observation that high-energy nuclear active'' cosmic-ray particles create bunches of penetrating particles upon hitting targets, a controversy has raged about whether these secondaries are created in a single act'' or whether many hadrons are just the result of an intra-nuclear cascade, yielding one meson in every step. I cannot escape the impression that: the latter kind of model appeals naturally as a consequence of an innate bio-morphism in our way of thinking and that in one guise or another it has tenaciously survived to this day, also for hadron-hadron collisions, via multi-peripheral models to the modern parton shower approach. Indeed, from the very beginning of theoretical consideration of multiparticle production, the possibility of many particles arising from a single hot'' system has been explored, with many fruitful results, not the least of which are the s{sup 1/4} dependence of the mean produced particle multiplicity and the thermal'' shape of the P{sub T} spectra. An important consequence of the thermodynamical-hydrodynamical models is that particle emission is treated in analogy to black-body radiation, implying for the secondaries a set of specific Quantum-Statistical properties, very similar to those observed in quantum optics. From here on I shall try to review a number of implications and applications of this QS analogy in the study of multiplicity distributions of the produced secondaries. I will touch only in passing another very important topic of this class, the Bose-Einstein two-particle correlations.

Friedlander, E.M.

1990-09-01T23:59:59.000Z

437

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci  

E-Print Network (OSTI)

A model of mutation rate evolution for multiple loci under arbitrary selection is analyzed. Results are obtained using techniques from Karlin (1982) that overcome the weak selection constraints needed for tractability in prior studies of multilocus event models. A multivariate form of the reduction principle is found: reduction results at individual loci combine topologically to produce a surface of mutation rate alterations that are neutral for a new modifier allele. New mutation rates survive if and only if they fall below this surface - a generalization of the hyperplane found by Zhivotovsky et al. (1994) for a multilocus recombination modifier. Increases in mutation rates at some loci may evolve if compensated for by decreases at other loci. The strength of selection on the modifier scales in proportion to the number of germline cell divisions, and increases with the number of loci affected. Loci that do not make a difference to marginal fitnesses at equilibrium are not subject to the reduction principle, and under fine tuning of mutation rates would be expected to have higher mutation rates than loci in mutation-selection balance. Other results include the nonexistence of 'viability analogous, Hardy-Weinberg' modifier polymorphisms under multiplicative mutation, and the sufficiency of average transmission rates to encapsulate the effect of modifier polymorphisms on the transmission of loci under selection. A conjecture is offered regarding situations, like recombination in the presence of mutation, that exhibit departures from the reduction principle. Constraints for tractability are: tight linkage of all loci, initial fixation at the modifier locus, and mutation distributions comprising transition probabilities of reversible Markov chains.

Lee Altenberg

2009-09-14T23:59:59.000Z

438

Multiple-code benchmark simulation study of coupled THMC processes in the excavation disturbed zone associated with geological nuclear waste repositories  

E-Print Network (OSTI)

MULTIPLE-CODE BENCHMARK SIMULATION STUDY OF COUPLED THMCinternational, multiple-code benchmark test (BMT) study isinternational, multiple-model benchmark test (BMT) study of

2006-01-01T23:59:59.000Z

439

CONTAINMENT EVALUATION OF PU-METAL TRANSPORT USING MULTIPLE BARRIERS  

Science Conference Proceedings (OSTI)

A methodology was developed previously by SRNL to show that Al-SNF with cladding breaches can be directly transported in standard casks and maintained within the allowable release rates. This novel approach may be extended to other nuclear material systems. Utilizing an adaptation to the methodology, a containment analysis has been performed for the scenario of non-routine transfer of a damaged 9975 package containing plutonium metal from K-area monitored storage to F-area on the Savannah River Site. A multiple barrier system with each barrier having a defined leakage rate of less than 1 x 10{sup -3} cm{sup 3}/sec of air at Standard Temperature and Pressure was analyzed to determine the number of barriers needed to transport the package under normal transportation conditions to meet transportation requirements for containment. The barrier system was analyzed parametrically to achieve a composite system that met the federal requirements for the maximum permissible release rate. The multiple barrier system acts to retard the release of radioactivity. That is, a build-up in the radioactivity release rate occurs with time. For example, a system with three barriers (e.g., sealed plastic barrier) with a total free volume of 4,500 cm{sup 3} could be transported for a total time of up to approximately 10 days with a release rate within the permissible rate. Additional number of barriers, or volume of the barriers, or both, would extend to this period of time. For example, a system with seven barriers with a total free volume of 4,500 cm{sup 3} could be transported for up to 100 days. Plastic bags are one type of barrier used in movement of radioactive materials and capable of achieving a leak rate of 1 x 10{sup -3} cm{sup 3}/sec of air at STP. Low-density polyethylene bags can withstand high temperature (up to 180 C); a barrier thickness of 10 mils should be suitable for the barrier system.

Vinson, D.

2011-07-18T23:59:59.000Z

440

Design and Analysis of Flexible Biodiesel Processes with Multiple Feedstocks  

E-Print Network (OSTI)

With the growing interest in converting a wide variety of biomass-based feedstocks to biofuels, there is a need to develop effective procedures for the design and optimization of multi-feedstock biorefineries. The unifying goal of this work is the development of systematic methodologies and procedures for designing flexible multifeedstock biorefineries. This work addresses four problems that constitute building blocks towards achieving the unifying goal of the dissertation. The first problem addresses the design and techno-economic analysis of an integrated system for the production of biodiesel from algal oil. With the sequestration of carbon dioxide from power plant flue gases, algae growth and processing has the potential to reduce greenhouse gas emissions. Algae are a non-food oil feedstock source and various pathways and technologies for obtaining algal oil were investigated. Detailed economic and sensitivity analysis reveal specific scenarios that lead to profitability of algal oil as an alternative feedstock. In the second problem, a new safety metric is introduced and utilized in process design and selection. A case study was solved to assess the potential of producing biodiesel from sewage sludge. The entire process was evaluated based on multiple criteria including cost, technology and safety. The third problem is concerned with incorporating flexibility in the design phase of the development of multi-feedstock biofuel production processes. A mathematical formulation is developed for determining the optimal flexible design for a biorefinery that is to accommodate the use of multiple feedstocks. Various objective functions may be utilized for the flexible plant depending on the purpose of the flexibility analysis and a case study is presented to demonstrate one such objective function. Finally, the development of a systematic procedure for incorporating flexibility and heat integration in the design phase of a flexible feedstock production process is introduced for the fourth problem. A mathematical formulation is developed for use in determining the heat exchange network design. By incorporating the feedstock scenarios under investigation, a mixed integer linear program is generated and a flexible heat exchange network scheme can be developed. The solution provides for a network that can accommodate the heating and cooling demands of the various scenarios while meeting minimum utility targets.

Pokoo-Aikins, Grace Amarachukwu

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

442

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

443

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

444

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

445

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

446

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

447

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

448

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

449

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

450

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

451

MULTIPLICATION MEASUREMENTS WITH HIGHLY ENRICHED URANIUM METAL SLABS  

SciTech Connect

A series of neutron multiplication measurements with arrays of 1 by 8 by 10 in. slabs of 93.4% U/sup 235/-enriched uranium metal was made to provide data from which safety criteria for the storage of these fissile units can be established. Each slab contained 22.9 kg of U/sup 235/. A maximum of 125 units was assembled. The arrays studied were cubic lattices of the units and were usually parallelepipedal in shape. Arrays were both unmoderated and Plexiglas- moderated and were surrounded in most cases by a 1-in.-thick Plexiglas reflector. The lattice densities (ratio of fissile unit volume to lattice cell volume) were between 0.023 and 0.06. Unmoderated lattices with a density of 0.06 would require 145 plus or minus 5 units for criticality, while those with a density of 0.023 would require 350 plus or minus 30 units. In lattices in which the fissile units are separated by 1 in. of Plexiglas, approximately 27 units would be required for a critical array with a lattice density of 0.06 and about 75 units for a density of 0.023. Distributing Foamglas (containing 2% boron) throughout a moderated array increased the critical number of fissile units by a factor of 5, while Styrofoam had a small effect. (auth)

Mihalczo, J.T.; Lynn, J.J.

1959-07-27T23:59:59.000Z

452

A Fuzzy Logic Framework for Integrating Multiple Learned Models  

SciTech Connect

The Artificial Intelligence field of Integrating Multiple Learned Models (IMLM) explores ways to combine results from sets of trained programs. Aroclor Interpretation is an ill-conditioned problem in which trained programs must operate in scenarios outside their training ranges because it is intractable to train them completely. Consequently, they fail in ways related to the scenarios. We developed a general-purpose IMLM solution, the Combiner, and applied it to Aroclor Interpretation. The Combiner's first step, Scenario Identification (M), learns rules from very sparse, synthetic training data consisting of results from a suite of trained programs called Methods. S1 produces fuzzy belief weights for each scenario by approximately matching the rules. The Combiner's second step, Aroclor Presence Detection (AP), classifies each of three Aroclors as present or absent in a sample. The third step, Aroclor Quantification (AQ), produces quantitative values for the concentration of each Aroclor in a sample. AP and AQ use automatically learned empirical biases for each of the Methods in each scenario. Through fuzzy logic, AP and AQ combine scenario weights, automatically learned biases for each of the Methods in each scenario, and Methods' results to determine results for a sample.

Bobi Kai Den Hartog

1999-03-01T23:59:59.000Z

453

Textureless Macula Swelling Detection with Multiple Retinal Fundus Images  

SciTech Connect

Retinal fundus images acquired with non-mydriatic digital fundus cameras are a versatile tool for the diagnosis of various retinal diseases. Because of the ease of use of newer camera models and their relatively low cost, these cameras can be employed by operators with limited training for telemedicine or Point-of-Care applications. We propose a novel technique that uses uncalibrated multiple-view fundus images to analyse the swelling of the macula. This innovation enables the detection and quantitative measurement of swollen areas by remote ophthalmologists. This capability is not available with a single image and prone to error with stereo fundus cameras. We also present automatic algorithms to measure features from the reconstructed image which are useful in Point-of-Care automated diagnosis of early macular edema, e.g., before the appearance of exudation. The technique presented is divided into three parts: first, a preprocessing technique simultaneously enhances the dark microstructures of the macula and equalises the image; second, all available views are registered using non-morphological sparse features; finally, a dense pyramidal optical flow is calculated for all the images and statistically combined to build a naiveheight- map of the macula. Results are presented on three sets of synthetic images and two sets of real world images. These preliminary tests show the ability to infer a minimum swelling of 300 microns and to correlate the reconstruction with the swollen location.

Giancardo, Luca [ORNL; Meriaudeau, Fabrice [ORNL; Karnowski, Thomas Paul [ORNL; Tobin Jr, Kenneth William [ORNL; Grisan, Enrico [University of Padua, Padua, Italy; Favaro, Paolo [Heriot-Watt University, Edinburgh; Ruggeri, Alfredo [University of Padua, Padua, Italy; Chaum, Edward [University of Tennessee, Knoxville (UTK)

2010-01-01T23:59:59.000Z

454

Multiple crossbar network: A switched high-speed local network  

SciTech Connect

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

455

Real-time multi-mode neutron multiplicity counter  

DOE Patents (OSTI)

Embodiments are directed to a digital data acquisition method that collects data regarding nuclear fission at high rates and performs real-time preprocessing of large volumes of data into directly useable forms for use in a system that performs non-destructive assaying of nuclear material and assemblies for mass and multiplication of special nuclear material (SNM). Pulses from a multi-detector array are fed in parallel to individual inputs that are tied to individual bits in a digital word. Data is collected by loading a word at the individual bit level in parallel, to reduce the latency associated with current shift-register systems. The word is read at regular intervals, all bits simultaneously, with no manipulation. The word is passed to a number of storage locations for subsequent processing, thereby removing the front-end problem of pulse pileup. The word is used simultaneously in several internal processing schemes that assemble the data in a number of more directly useable forms. The detector includes a multi-mode counter that executes a number of different count algorithms in parallel to determine different attributes of the count data.

Rowland, Mark S; Alvarez, Raymond A

2013-02-26T23:59:59.000Z

456

Probing Radiation Damage in Plutonium Alloys with Multiple Measurement Techniques  

SciTech Connect

A material subjected to radiation damage will usually experience changes in its physical properties. Measuring these changes in the physical properties provides a basis to study radiation damage in a material which is important for a variety of real world applications from reactor materials to semiconducting devices. When investigating radiation damage, the relative sensitivity of any given property can vary considerably based on the concentration and type of damage present as well as external parameters such as the temperature and starting material composition. By measuring multiple physical properties, these differing sensitivities can be leveraged to provide greater insight into the different aspects of radiation damage accumulation, thereby providing a broader understanding of the mechanisms involved. In this report, self-damage from {alpha}-particle decay in Pu is investigated by measuring two different properties: magnetic susceptibility and resistivity. The results suggest that while the first annealing stage obeys second order chemical kinetics, the primary mechanism is not the recombination of vacancy-interstitial close pairs.

McCall, S K; Fluss, M J; Chung, B W

2010-04-21T23:59:59.000Z

457

Parallel IP Lookup using Multiple SRAM-based Pipelines  

E-Print Network (OSTI)

Pipelined SRAM-based algorithmic solutions have become competitive alternatives to TCAMs (ternary content addressable memories) for high throughput IP lookup. Multiple pipelines can be utilized in parallel to improve the throughput further. However, several challenges must be addressed to make such solutions feasible. First, the memory distribution over different pipelines as well as across different stages of each pipeline must be balanced. Second, the traffic among these pipelines should be balanced. Third, the intra-flow packet order should be preserved. In this paper, we propose a parallel SRAM-based multi-pipeline architecture for IP lookup. A two-level mapping scheme is developed to balance the memory requirement among the pipelines as well as across the stages in a pipeline. To balance the traffic, we propose a flow pre-caching scheme to exploit the inherent caching in the architecture. Our technique uses neither a large reorder buffer nor complex reorder logic. Instead, a payload exchange scheme exploiting the pipeline delay is used to maintain the intra-flow packet order. Extensive simulation using real-life traffic traces shows that the proposed architecture with 8 pipelines can achieve a throughput of up to 10 billion packets per second (GPPS) while preserving intra-flow packet order.

Weirong Jiang; et al.

2008-01-01T23:59:59.000Z

458

Detection and track of a stochastic target using multiple measurements  

SciTech Connect

The authors are interested in search and tracking problems. In a search, the target might be located among a number of hiding places. Multiple measurements from various locations might be used to determine the likelihood that a particular hiding place is occupied. An obvious example would be a search for a weak radiation source in a building. Search teams might make many measurements with radiation detectors and analyze this data to determine likely areas for further searching. In this paper the authors present a statistical interpretation of the implications of measurements made on a stochastic system, one which makes random state transitions with known average rates. Knowledge of the system is represented as a statistical ensemble of instances which accord with measurements and prior information. The evolution of ratios of populations in this ensemble due to measurements and stochastic transitions may be calculated efficiently. Applied to target detection and tracking, this approach allows a rigorous definition of probability of detection and probability of false alarm and reveals a computationally useful functional relationship between the two. An example of a linear array of simple counters is considered in detail. For it, accurate analytic approximations are developed for detection and tracking statistics as functions of system parameters. A single measure of effectiveness for individual sensors is found which is a major determinant of system performance and which would be useful for initial sensor design.

Cunningham, C.T.

1995-11-01T23:59:59.000Z

459

Interaction of Multiple Distributed Energy Resources in Voltage Regulation  

Science Conference Proceedings (OSTI)

Distributed energy resources (DE) with power electronics (PE) interfaces with the right control are capable of providing reactive power related ancillary services; voltage regulation in particular has drawn much attention. In this paper the problem of how to coordinate control multiple DEs to regulate the local voltage in the distribution system is addressed. A control method for voltage regulation using the DE PE controller is presented and based on the proposed control scheme; the voltage regulation of a distribution system with one DE and two DEs are tested, respectively. The factors affecting the gain parameters of the PE controller are investigated. The simulation results show that the parameters of the controller determine its dynamic response for voltage regulation and the factors associated with the network characteristics, such as locations of DEs and the amount of load, affect the impact range of the controller. The research work presented in this paper can be potentially used for the control system design of Smart Grid or Utility of the Future.

Li, Huijuan [University of Tennessee, Knoxville (UTK); Li, Fangxing [ORNL; Xu, Yan [ORNL; Rizy, D Tom [ORNL; Kueck, John D [ORNL

2008-01-01T23:59:59.000Z

460

Observation of multiple sausage oscillations in cool postflare loop  

E-Print Network (OSTI)

Using simultaneous high spatial (1.3 arc sec) and temporal (5 and 10 s) resolution H-alpha observations from the 15 cm Solar Tower Telescope at ARIES, we study the oscillations in the relative intensity to explore the possibility of sausage oscillations in the chromospheric cool postflare loop. We use standard wavelet tool, and find the oscillation period of ~ 587 s near the loop apex, and ~ 349 s near the footpoint. We suggest that the oscillations represent the fundamental and the first harmonics of fast sausage waves in the cool postflare loop. Based on the period ratio P1/P2 ~ 1.68, we estimate the density scale height in the loop as ~ 17 Mm. This value is much higher than the equilibrium scale height corresponding to H-alpha temperature, which probably indicates that the cool postflare loop is not in hydrostatic equilibrium. Seismologically estimated Alfv\\'en speed outside the loop is ~ 300-330 km/s. The observation of multiple oscillations may play a crucial role in understanding the dynamics of lower solar atmosphere, complementing such oscillations already reported in the upper solar atmosphere (e.g., hot flaring loops).

A. K. Srivastava; T. V. Zaqarashvili; W. Uddin; B. N. Dwivedi; Pankaj Kumar

2008-06-05T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

UTILIZATION OF PHOSWICH DETECTORS FOR SIMULTANEOUS, MULTIPLE RADIATION DETECTION  

Science Conference Proceedings (OSTI)

A phoswich radiation detector is comprised of a phosphor sandwich in which several different phosphors are viewed by a common photomultiplier. By selecting the appropriate phosphors, this system can be used to simultaneously measure multiple radiation types (alpha, beta, gamma and/or neutron) with a single detector. Differentiation between the signals from the different phosphors is accomplished using digital pulse shape discrimination techniques. This method has been shown to result in accurate discrimination with highly reliable and versatile digital systems. This system also requires minimal component count (i.e. only the detector and a computer for signal processing). A variety of detectors of this type have been built and tested including: (1) a triple phoswich system for alpha/beta/gamma swipe counting, (2) two well-type detectors for measuring low levels of low energy photons in the presence of a high energy background, (3) a large area detector for measuring beta contamination in the presence of a photon background, (4) another large area detector for measuring low energy photons from radioactive elements such as uranium in the presence of a photon background. An annular geometry, triple phoswich system optimized for measuring alpha/beta/gamma radiation in liquid waste processing streams is currently being designed.

William H. Miller; Manuel Diaz de Leon

2003-04-15T23:59:59.000Z

462

Anomaly Detection in Multiple Scale for Insider Threat Analysis  

Science Conference Proceedings (OSTI)

We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

Kim, Yoohwan [ORNL; Sheldon, Frederick T [ORNL; Hively, Lee M [ORNL

2012-01-01T23:59:59.000Z

463

Multiple slug scaling of linear and pattern laboratory chemical floods  

SciTech Connect

Linear floods were conducted in a synthetic water-wet matrix. The multiple slug scaling approach used oil saturation distributions measured by microwave attenuation in one laboratory flood to predict accurately the tertiary residual oil saturation and tertiary oil breakthrough in another laboratory linear flood run with larger slug sizes. Oil saturation distributions at 0.11 V/V/sub p/ intervals during the flood, as well as at S/sub orc/, were also accurately predicted. A laboratory quarter five-spot pattern flood involving sequential injection of a small surfactant slug, a small polymer slug, and continuous drive water was run in a water-wet synthetic matrix. Linear flood oil saturation distributions were scaled to predict the oil saturation distributions in the pattern using a fixed twelve streamtube model for the flow. Details of this scaling procedure are given. Residual tertiary oil saturation, tertiary recovery, and oil saturation changes with time were predicted to within the experimental errors involved in the procedures. The observed tertiary oil breakthrough was later than predicted. Observed oil saturation distributions tended to show more oil left in the corners of the model than predicted by the scaling theory. These secondary effects and the overall behavior of the pattern flood are considered in terms of the chosen streamtube network and the assumptions of stable unit mobility flow. (JMT)

Haskin, H.K.; Davis, L.A.

1982-01-01T23:59:59.000Z

464

Multiple channel coincidence detector and controller for microseismic data analysis  

DOE Patents (OSTI)

A multiple channel coincidence detector circuit is provided for analyzing data either in real time or recorded data on a magnetic tape during an experiment for determining location and progression of fractures in an oil field or the like while water is being injected at high pressure in wells located in the field. The circuit is based upon the utilization of a set of parity generator trees combined with monostable multivibrators to detect the occurrence of two events at any pair of channel input terminals that are within a preselected time frame and have an amplitude above a preselected magnitude. The parity generators perform an exclusive OR function in a timing circuit composed of monostable multivibrators that serve to yield an output when two events are present in the preselected time frame. Any coincidences falling outside this time frame are considered either noise or not otherwise useful in the analysis of the recorded data. Input pulses of absolute magnitude below the low-level threshold setting of a bipolar low-level threshold detector are unwanted and therefore rejected. A control output is provided for a utilization device from a coincidence hold circuit that may be used to halt a tape search unit at the time of coincidence or perform other useful control functions.

Fasching, George E. (Morgantown, WV)

1976-11-16T23:59:59.000Z

465

Two-phase flow characteristics in multiple orifice valves  

SciTech Connect

This work presents an experimental investigation on the characteristics of two-phase flow through multiple orifice valve (MOV), including frictional pressure drop and void fraction. Experiments were carried out using an MOV with three different sets of discs with throat thickness-diameter ratios (s/d) of 1.41, 1.66 and 2.21. Tests were run with air and water flow rates ranging between 1.0 and 3.0 m{sup 3}/h, respectively. The two-phase flow patterns established for the experiment were bubbly and slug. Two-phase frictional multipliers, frictional pressure drop and void fraction were analyzed. The determined two-phase multipliers were compared against existing correlations for gas-liquid flows. None of the correlations tested proved capable of predicting the experimental results. The large discrepancy between predicted and measured values points at the role played by valve throat geometry and thickness-diameter ratio in the hydrodynamics of two-phase flow through MOVs. A modification to the constants in the two-phase multiplier equation used for pipe flow fitted the experimental data. A comparison between computed frictional pressure drop, calculated with the modified two-phase multiplier equation and measured pressure drop yielded better agreement, with less than 20% error. (author)

Alimonti, Claudio [Sapienza University of Rome, Department ICMA, Via Eudossiana 18, 00184 Roma (Italy); Falcone, Gioia; Bello, Oladele [The Harold Vance Department of Petroleum Engineering, Texas A and M University, 3116 TAMU, Richardson Building, College Station, TX 77843 (United States)

2010-11-15T23:59:59.000Z

466

Comparing Single and Multiple Turbine Representations in a Wind Farm Simulation (Presentation)  

DOE Green Energy (OSTI)

Presentation for the European Wind Energy Conference held February 27--March 2, 2006, in Athens, Greece, comparing single and multiple turbine representations in a wind farm simulation.

Parsons, B.

2006-02-01T23:59:59.000Z

467

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High Discussion: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. The code...

468

Vehicle Yaw Control Utilizing Hybrid Electric Drivetrains with Multiple Electric Motors.  

E-Print Network (OSTI)

??Vehicles with multiple electric motors coupled to individual wheels have excitingopportunities for safety control systems. An investigation is conducted to determine whatdynamic benefits can be (more)

D'Iorio, James

2008-01-01T23:59:59.000Z

469

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network (OSTI)

29 Appendix A. PJM Windat Multiple Time Scales Appendix A. PJM Wind Data The windpower data for the PJM control area cover the period January

Coughlin, Katie

2011-01-01T23:59:59.000Z

470

Determination of 3-D Cloud Ice Water Contents by Combining Multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Determination of 3-D Cloud Ice Water Contents by Combining Multiple Data Sources from Satellite, Ground Radar, and a Numerical Model Liu, Guosheng Florida State University Seo,...

471

Structure and Composition Peculiarities of GaN/AlN Multiple ...  

Science Conference Proceedings (OSTI)

Thickness of AlN and GaN layers in MQWs (multiple quantum wells) were ... InAs Quantum Dots by Ballistic Electron Emission Microscopy and Spectroscopy.

472

Fission prompt gamma-ray multiplicity distribution measurements and simulations at DANCE  

SciTech Connect

The nearly energy independence of the DANCE efficiency and multiplicity response to {gamma} rays makes it possible to measure the prompt {gamma}-ray multiplicity distribution in fission. We demonstrate this unique capability of DANCE through the comparison of {gamma}-ray energy and multiplicity distribution between the measurement and numerical simulation for three radioactive sources {sup 22}Na, {sup 60}Co, and {sup 88}Y. The prospect for measuring the {gamma}-ray multiplicity distribution for both spontaneous and neutron-induced fission is discussed.

Chyzh, A; Wu, C Y; Ullmann, J; Jandel, M; Bredeweg, T; Couture, A; Norman, E

2010-08-24T23:59:59.000Z

473

ARM: ARSCL: multiple outputs from first Clothiaux algorithms on Vaisala or Belfort ceilometers, Micropulse lidar, and MMCR  

DOE Data Explorer (OSTI)

ARSCL: multiple outputs from first Clothiaux algorithms on Vaisala or Belfort ceilometers, Micropulse lidar, and MMCR

Richard Coulter; Kevin Widener; Nitin Bharadwaj; Karen Johnson; Timothy Martin

474

NASEO 2010 Winter Fuels Outlook Conference October 13, 2010 Washington...  

Gasoline and Diesel Fuel Update (EIA)

In Netscape or Mozilla you may need to save the file in order to look at it. Click here to download presentation file...

475

End-of-life flows of multiple cycle consumer products  

SciTech Connect

Explicit expressions for the end-of-life flows (EOL) of single and multiple cycle products (MCPs) are presented, including deterministic and stochastic EOL exit. The expressions are given in terms of the physical parameters (maximum lifetime, T, annual cycling frequency, f, number of cycles, N, and early discard or usage loss). EOL flows are also obtained for hi-tech products, which are rapidly renewed and thus may not attain steady state (e.g. electronic products, passenger cars). A ten-step recursive procedure for obtaining the dynamic EOL flow evolution is proposed. Applications of the EOL expressions and the ten-step procedure are given for electric household appliances, industrial machinery, tyres, vehicles and buildings, both for deterministic and stochastic EOL exit, (normal, Weibull and uniform exit distributions). The effect of the physical parameters and the stochastic characteristics on the EOL flow is investigated in the examples: it is shown that the EOL flow profile is determined primarily by the early discard dynamics; it also depends strongly on longevity and cycling frequency: higher lifetime or early discard/loss imply lower dynamic and steady state EOL flows. The stochastic exit shapes the overall EOL dynamic profile: Under symmetric EOL exit distribution, as the variance of the distribution increases (uniform to normal to deterministic) the initial EOL flow rise becomes steeper but the steady state or maximum EOL flow level is lower. The steepest EOL flow profile, featuring the highest steady state or maximum level, as well, corresponds to skew, earlier shifted EOL exit (e.g. Weibull). Since the EOL flow of returned products consists the sink of the reuse/remanufacturing cycle (sink to recycle) the results may be used in closed loop product lifecycle management operations for scheduling and sizing reverse manufacturing and for planning recycle logistics. Decoupling and quantification of both the full age EOL and of the early discard flows is useful, the latter being the target of enacted legislation aiming at increasing reuse.

Tsiliyannis, C.A., E-mail: anion@otenet.gr [ANION Environmental Ltd., 26 Lykoudi Str., Athens, GR 11141 (Greece)

2011-11-15T23:59:59.000Z

476

Nested stochastic simulation algorithms for chemical kinetic systems with multiple time scales  

E-Print Network (OSTI)

Nested stochastic simulation algorithms for chemical kinetic systems with multiple time scales an efficient numerical algorithm for simulating chemical kinetic systems with multiple time scales. This algo. Our analysis of such multi-scale chemical kinetic systems allows us to identify the slow variables

Van Den Eijnden, Eric

477

Spin-polarized current oscillations in diluted magnetic semiconductor multiple quantum wells Manuel Bejar,1  

E-Print Network (OSTI)

Spin-polarized current oscillations in diluted magnetic semiconductor multiple quantum wells Manuel and charge dynamics of electrons in n-doped II-VI semiconductor multiple quantum wells when one or more quantum wells are doped with Mn. The interplay between strongly nonlinear interwell charge transport

Sánchez, David

478

Simulation of multiple fluids with solidliquid phase?transition  

Science Conference Proceedings (OSTI)

Physically based multiphase fluid simulation has been a hot topic in computer graphics. Since there are complex changing interface topology and interactions among air, solid, and different fluids, few papers have devoted to simulate the multiple fluids ... Keywords: free surface, hierarchical lattice, multiple fluids, solidliquid phase transition

Changbo Wang; Qiang Zhang; Huajun Xiao; Qiuyan Shen

2012-05-01T23:59:59.000Z

479

Design evaluation and optimisation in multiple response nonlinear mixed effect models: PFIM 3.0  

Science Conference Proceedings (OSTI)

Nonlinear mixed effect models (NLMEM) with multiple responses are increasingly used in pharmacometrics, one of the main examples being the joint analysis of the pharmacokinetics (PK) and pharmacodynamics (PD) of a drug. Efficient tools for design evaluation ... Keywords: D-optimality, Fisher information matrix, Multiple response models, Nonlinear mixed effect models, Optimal designs, PFIM

Caroline Bazzoli; Sylvie Retout; France Mentr

2010-04-01T23:59:59.000Z

480

Microfabricated capillary electrophoresis chip and method for simultaneously detecting multiple redox labels  

DOE Patents (OSTI)

This invention relates to a microfabricated capillary electrophoresis chip for detecting multiple redox-active labels simultaneously using a matrix coding scheme and to a method of selectively labeling analytes for simultaneous electrochemical detection of multiple label-analyte conjugates after electrophoretic or chromatographic separation.

Mathies, Richard A. (Moraga, CA); Singhal, Pankaj (Berkeley, CA); Xie, Jin (Walnut Creek, CA); Glazer, Alexander N. (Orinda, CA)

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mozilla firefox multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Rollout strategy-based probabilistic causal model approach for the multiple fault diagnosis  

Science Conference Proceedings (OSTI)

Multiple fault diagnosis (MFD) is used as an effective measure to tackle the problems of real-shop floor environment for reducing the total lifetime maintenance cost of the system. It is a well-known computationally complex problem, where computational ... Keywords: Multiple fault diagnosis, Probabilistic causal model, Rollout strategy

Nishikant Mishra; Alok Kumar Choudhary; M. K. Tiwari; Ravi Shankar

2010-08-01T23:59:59.000Z

482

A modified tabu search strategy for multiple-response grinding process optimisation  

Science Conference Proceedings (OSTI)

Multiple-response grinding process is usually too complex to optimise, requiring a large number of interacting process variables and responses. Experimentation techniques, such as factorial design, fractional factorial design and Response Surface ... Keywords: ANN, GA, Mahalanobis distance, TS, artificial neural networks, back propagation algorithms, desirability function, genetic algorithms, multiple-response grinding, optimisation, tabu search

Indrajit Mukherjee; Pradip Kumar Ray

2008-05-01T23:59:59.000Z

483

A Multiple View Approach to Support Common Ground in Distributed and Synchronous Geo-Collaboration  

Science Conference Proceedings (OSTI)

In this paper we investigate strategies to support knowledgesharing in distributed, synchronous collaboration. Our goalis to propose, justify, and assess a multiple view approachto support common ground in geo-collaboration within multi-roleteams. We ... Keywords: Multiple views, common ground, distributed and synchronous geo-collaboration

Gregorio Convertino; Craig H. Ganoe; Wendy A. Schafer; Beth Yost; John M. Carroll

2005-07-01T23:59:59.000Z

484

Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds  

Science Conference Proceedings (OSTI)

Distributing multiple replicas in geographically-dispersed clouds is a popular approach to reduce latency to users. It is important to ensure that each replica should have availability and data integrity features; that is, the same as the original data ... Keywords: Cloud computing, Complete bidirectional directed graph, Data security, Multiple replicas data possession checking, Optimal spanning tree

Jing He; Yanchun Zhang; Guangyan Huang; Yong Shi; Jie Cao

2012-09-01T23:59:59.000Z

485

Multiple attribute decision-making methods for the dynamic operator allocation problem  

Science Conference Proceedings (OSTI)

This study explores two multiple attribute decision-making (MADM) methods to solve a dynamic operator allocation problem. Both methods use an analytic hierarchy process (AHP) to determine attribute weights a priori. The first method uses a technique ... Keywords: AHP, Fuzzy set theory, Integrated circuit packaging, Multiple attribute decision making, TOPSIS

Taho Yang; Mu-Chen Chen; Chih-Ching Hung

2007-01-01T23:59:59.000Z

486

Energy-efficient datapath scheduling using multiple voltages and dynamic clocking  

Science Conference Proceedings (OSTI)

Recently, dynamic frequency scaling has been explored at the CPU and system levels for power optimization. Low-power datapath scheduling using multiple supply voltages has been well researched. In this work, we develop new datapath scheduling algorithms ... Keywords: High-level synthesis, dynamic frequency clocking, low-power datapath synthesis, multiple voltage scheduling, resource-constrained scheduling, time-constrained scheduling

Saraju P. Mohanty; N. Ranganathan

2005-04-01T23:59:59.000Z

487

428 IEEE SYSTEMS JOURNAL, VOL. 3, NO. 4, DECEMBER 2009 Multiple Human Tracking and Identification With  

E-Print Network (OSTI)

for tracking and identifying multiple humans based on their body heat radiation. This study aims to make py428 IEEE SYSTEMS JOURNAL, VOL. 3, NO. 4, DECEMBER 2009 Multiple Human Tracking and Identification conditions, as well as a complement for conventional video and audio human tracking and identification

Hu, Fei

488

Outer bounds for multiple-access channels with feedback using dependence balance  

Science Conference Proceedings (OSTI)

We use the idea of dependence balance to obtain a new outer bound for the capacity region of the discrete memoryless multiple-access channel with noiseless feedback (MAC-FB). We consider a binary additive noisy MAC-FB whose feedback capacity is not known. ... Keywords: cut-set bound, dependence balance, multiple-access channel with feedback (MAC-FB)

Ravi Tandon; Sennur Ulukus

2009-10-01T23:59:59.000Z

489

Multiplicity of positive solutions for nonlinear field equations in $\\R^{N}$  

E-Print Network (OSTI)

In this paper we study the multiplicity of positive solutions for nonlinear elliptic equations on $\\R^N$. The number of solutions is greater or equal than the number of disjoint intervals on which the nonlinear term is negative. Applications are given to multiplicity of standing waves for the nonlinear Schr\\"odinger, Klein-Gordon and Klein-Gordon-Maxwell equations.

Bonanno, Claudio

2009-01-01T23:59:59.000Z