National Library of Energy BETA

Sample records for multiple unspecified vulnerabilities

  1. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  2. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  3. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  4. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  5. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  6. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  7. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  8. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  9. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  10. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  11. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  12. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  13. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThin FilmUnited States: Energy ResourcesPark--Unspecified

  14. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  15. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  16. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  17. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  18. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  19. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  20. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

  2. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  3. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  4. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  5. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  6. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  7. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  8. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUranium toFY

  9. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemoteofDepartment of

  10. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    be used by certain political actors as a powerful instrumentto other relevant political actors in the executive andinteracting with other political actors in multiple arena

  11. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code5:Oracle

  12. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities |Unauthorized

  13. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  14. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  15. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  16. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple

  17. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultipleCross-SiteDepartment

  18. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29,...

  19. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported...

  20. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT:...

  1. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  2. V-180: IBM Application Manager For Smart Business Multiple Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (GSKit). 8) Multiple vulnerabilities are caused due to a bundled vulnerable version of Java. IMPACT: IBM Application Manager For Smart Business can be exploited by malicious...

  3. The heat-balance integral method by a parabolic profile with unspecified exponent: Analysis and Benchmark Exercises

    E-Print Network [OSTI]

    Jordan Hristov

    2010-12-12

    The heat-balance integral method of Goodman has been thoroughly analyzed in the case of a parabolic profile with unspecified exponent depending on the boundary condition imposed. That the classical Good man's boundary conditions defining the time-dependent coefficients of the prescribed temperature profile do not work efficiently at the front of the thermal layers if the specific parabolic profile at issue is employed. Additional constraints based on physical assumption enhance the heat-balance integral method and form a robust algorithm defining the parabola exponent . The method has been compared by results provided by the Veinik's method that is by far different from the Good man's idea but also assume forma tion of thermal layer penetrating the heat body. The method has been demonstrated through detailed solutions of 4 1-D heat-conduction problems in Cartesian co-ordinates including a spherical problem (through change of vari ables) and over-specified boundary condition at the face of the thermal layer.

  4. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  5. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  6. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  7. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  8. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  9. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartment ofEnergy 094:

  10. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  11. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  12. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    Deny Service U-253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact...

  13. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  14. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  15. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  16. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  17. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose...

  18. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  19. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  20. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  1. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  2. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  3. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  4. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  5. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  6. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  7. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  8. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by...

  10. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695...

  11. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  12. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  13. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUraniumDepartment

  14. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric

  15. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting Attacks

  16. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting

  17. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site

  18. T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland 2012SystemSecurity Controls

  19. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks

  20. U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |

  1. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9: IBM Java

  2. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9:1: Oracle

  3. U-273: Multiple vulnerabilities have been reported in Wireshark |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks |

  4. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle Solaris Java

  5. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department of Energy

  6. V-097: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment of7:

  7. V-105: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google Chrome

  8. V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google

  9. V-111: Multiple vulnerabilities have been reported in Puppet | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Codeof

  10. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS BugsPath8:

  11. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS

  12. V-121: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOSFlaw Lets1:

  13. V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: AppleAttacks6: Mozilla

  14. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy

  15. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H AReactionDepartment35:

  16. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:2: Drupal

  17. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers|

  18. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  19. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  20. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  1. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  2. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  3. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  4. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  5. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  6. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  7. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  8. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  9. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  10. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  11. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  12. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  13. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  14. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  15. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  16. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  17. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  18. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  19. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  20. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  1. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  2. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  3. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  4. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  5. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  6. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  8. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  9. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  11. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  12. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  15. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  16. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  18. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  19. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  20. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  1. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  2. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  3. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  4. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  5. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  6. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  7. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  8. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  9. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  10. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  11. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  12. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  13. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  14. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  15. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  16. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  17. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  18. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  19. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  20. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  1. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    política: entre o autoritarismo e a democracia. Record, 2005o autoritarismo e a democracia. Record, 2005, p. 31 raised

  2. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUranium

  3. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization LooksRed

  4. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting AttacksDepartment of

  5. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of

  6. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of| Department

  7. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35: OracleEnergy|

  8. U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: Apple QuickTime

  9. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H

  10. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6: Adobe

  11. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  12. Multiple sclerosis genetics

    E-Print Network [OSTI]

    Cree, BAC

    2014-01-01

    recurrence rates in multiple sclerosis. Proc Natl Acad Sci Ualloantigen Ag 7a in multiple sclerosis. Lancet 2: 814. Yeosusceptibility locus for multiple sclerosis. Ann Neurol 61:

  13. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  14. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  15. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  16. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  17. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  18. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  19. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  20. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  1. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  2. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  3. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  4. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  5. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  6. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  7. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  8. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  9. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  10. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  11. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  12. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  13. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  14. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  15. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  16. Vol 442|6 July 2006 Multiple introductions of H5N1 in Nigeria

    E-Print Network [OSTI]

    Cai, Long

    Vol 442|6 July 2006 37 Multiple introductions of H5N1 in Nigeria Phylogenetic analysis reveals- try farming industry is second only to oil production in Nigeria and is particularly vulnerable the two flight paths that link Nigeria with the south- ern Russian region and Europe, and with western

  17. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security...

  18. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  19. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  20. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  1. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  2. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  3. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  4. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  5. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  6. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  7. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  8. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  9. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  10. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  11. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  12. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  13. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  14. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  15. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  16. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  17. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  18. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  19. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  20. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  1. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  2. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  3. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  4. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  5. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  6. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  7. Multiple mass solvers

    E-Print Network [OSTI]

    B. Jegerlehner

    1997-08-29

    We present a general method to construct multiple mass solvers from standard algorithms. As an example, the BiCGstab-M algorithm is derived.

  8. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W. (Tracy, CA)

    1994-01-01

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  9. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  10. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  11. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  12. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  13. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  14. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  15. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  16. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  17. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  18. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  19. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  20. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  1. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  2. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  3. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  4. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  5. FOURIER TRANSFORM MULTIPLE QUANTUM NMR

    E-Print Network [OSTI]

    Drobny, G.

    2011-01-01

    of transition observed in Fourier transform multiple quantumDecember 18-19, 1979 FOURIER TRANSFORM MULTIPLE QUANTUM NMRof London, December 1978. FOURIER TRANSFO~~ MULTIPLE QUANTUM

  6. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, Jr., Harry K. (Birmingham, MI)

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  7. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  8. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  9. Fast matrix multiplication is stable

    E-Print Network [OSTI]

    Demmel, James; Holtz, Olga; Kleinberg, Robert; Dumitriu, Ioana

    2007-01-01

    Raz. On the complexity of matrix product. SIAM J. Comput. ,of fast algorithms for matrix multiplication. Num. Math. ,and Shmuel Winograd. Matrix multiplication via arithmetic

  10. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  11. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  12. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  13. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  14. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  15. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  16. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  17. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  18. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  19. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  20. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  1. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  2. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  3. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  4. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  5. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  6. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  7. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  8. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  9. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  10. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  11. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  12. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  13. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect (OSTI)

    Singleton, M

    2009-07-08

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

  14. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  15. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, Norman J. (Edmonton, CA); Zhang, Jian Z. (Edmonton, CA)

    1995-01-01

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibres to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands.

  16. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  17. Genetics of primary progressive multiple sclerosis

    E-Print Network [OSTI]

    Cree, BAC

    2014-01-01

    for association with multiple sclerosis in a N. Irish casepolymorphisms and multiple sclerosis in Northern Ireland. Jclinical course of multiple sclerosis. Neurology 68: 376–

  18. Lectin complement activation pathway in multiple sclerosis

    E-Print Network [OSTI]

    Rana, Puneet Vinod

    2012-01-01

    The pathology of multiple sclerosis is location-dependent:and management of multiple sclerosis. Am. Fam. Physician.interactions in multiple sclerosis: innate and adaptive

  19. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  20. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  1. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  2. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  3. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  4. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  5. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  6. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  7. Design of Controllers for a Multiple Input Multiple Output System 

    E-Print Network [OSTI]

    Harris, Amanda Lynne

    2012-07-16

    A method of controller design for multiple input multiple output (MIMO) system is needed that will not give the high order controllers of modern control theory but will be more systematic than the “ad hoc” method. The objective of this method...

  8. Multiple stage railgun

    DOE Patents [OSTI]

    Hawke, Ronald S. (Livermore, CA); Scudder, Jonathan K. (Pleasanton, CA); Aaland, Kristian (Livermore, CA)

    1982-01-01

    A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

  9. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  10. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  11. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  12. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  13. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  14. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu PresidentAccess |

  15. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:Servers |

  16. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks | Department

  17. Constraining multiple systems with GAIA

    E-Print Network [OSTI]

    Beauvalet, L.

    GAIA will provide observations of some multiple asteroid and dwarf systems. These observations are a way to determine and improve the quantification of dynamical parameters, such as the masses and the gravity fields, in ...

  18. Multiple Motivations Institutional Change Principle

    Broader source: Energy.gov [DOE]

    The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

  19. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  20. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  1. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  2. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  3. Performance of Multiple Pulse Multiple Delay Modulated UWB Signals in a Multiple Access Indoor Wireless Channel

    SciTech Connect (OSTI)

    Nekoogar, F

    2003-06-12

    In this paper, the performance of a two user UWB multiple access (UWB-MA) system based on multiple-pulse multiple-delay (MPMD) modulation scheme in an indoor wireless channel is evaluated by computer simulations. The indoor multipath propagation channel model used in this study is based on the modified statistical Saleh-Valenzuela model proposed by Foerester and Li from Intel. The simulation results indicate that the multipath performance of MPMD modulated signals in a multiple access system outperforms the nonmultipath case as the number of autocorrelation function (ACF) sampling points increases for each user. This is an unusual but important result, since MPMD receiver exploits multipath phenomenon in indoor wireless channels to increase the BER performance, hence the transmission rate in a UWB-MA system.

  4. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  5. Automatic Incremental Routing Using Multiple Roots

    E-Print Network [OSTI]

    Ghosh, Rumi; Garcia-Luna-Aceves, J.J.

    2013-01-01

    J. J. Garcia-Luna-Aceves, “Automatic Routing Using MultipleAutomatic Incremental Routing Using Multiple Roots RumiWe present Multi-root Automatic Incremental Rout- ing (

  6. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco...

  7. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Broader source: Energy.gov (indexed) [DOE]

    Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

  8. Multiple resonant railgun power supply

    DOE Patents [OSTI]

    Honig, Emanuel M. (Los Alamos, NM); Nunnally, William C. (Los Alamos, NM)

    1988-01-01

    A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

  9. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  10. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  11. New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one

    E-Print Network [OSTI]

    Gilbes, Fernando

    New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one contaminant at a level of concern for human contaminants in groundwater. Regional summaries of where and why groundwater is vulnerable to contamination now

  12. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  13. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  14. Multiple Exciton Generation Solar Cells

    SciTech Connect (OSTI)

    Luther, J. M.; Semonin, O. E.; Beard, M. C.; Gao, J.; Nozik, A. J.

    2012-01-01

    Heat loss is the major factor limiting traditional single junction solar cells to a theoretical efficiency of 32%. Multiple Exciton Generation (MEG) enables efficient use of the solar spectrum yielding a theoretical power conversion efficiency of 44% in solar cells under 1-sun conditions. Quantum-confined semiconductors have demonstrated the ability to generate multiple carriers but present-day materials deliver efficiencies far below the SQ limit of 32%. Semiconductor quantum dots of PbSe and PbS provide an active testbed for developing high-efficiency, inexpensive solar cells benefitting from quantum confinement effects. Here, we will present recent work of solar cells employing MEG to yield external quantum efficiencies exceeding 100%.

  15. Multiple target laser ablation system

    DOE Patents [OSTI]

    Mashburn, Douglas N. (Knoxville, TN)

    1996-01-01

    A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film.

  16. Multiple target laser ablation system

    DOE Patents [OSTI]

    Mashburn, D.N.

    1996-01-09

    A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film. 3 figs.

  17. Multiple hypothesis testing -recent developments and future

    E-Print Network [OSTI]

    Steinsland, Ingelin

    NTNU Multiple hypothesis testing - recent developments and future challenges Ingelin Steinsland developments and future challenges ­ p.1/28 #12;NTNU Outline Single hypothesis testing Multiple hypothesis testing Quantities and issues False discovery rates Future challenges Within false discovery rates

  18. A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies

    E-Print Network [OSTI]

    Kindy, Diallo Abdoulaye

    2012-01-01

    In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

  19. Multiple soil nutrient competition between plants, microbes,...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Multiple soil nutrient competition between plants, microbes, and mineral surfaces: model development, parameterization, and example applications in several...

  20. EFFICIENT DESIGNS OF MULTIPLE SCLEROSIS CLINICAL TRIALS

    E-Print Network [OSTI]

    Brennand, Tracy

    EFFICIENT DESIGNS OF MULTIPLE SCLEROSIS CLINICAL TRIALS by Dean Emile Vrecko B.Sc., University of Science Title of project: Efficient Designs of Multiple Sclerosis Clinical Trials Examining Committee: Dr Multiple sclerosis (MS) is a debilitating disease that attacks the central nervous system. Much research

  1. ORIGINAL CONTRIBUTION Modification of Multiple Sclerosis Phenotypes

    E-Print Network [OSTI]

    Reich, David

    ORIGINAL CONTRIBUTION Modification of Multiple Sclerosis Phenotypes by African Ancestry at HLA. Oksenberg, PhD Background: In those with multiple sclerosis (MS), Afri- can American individuals have a more ancestry at HLA correlated with dis- ability as measured by the Multiple Sclerosis Severity Score (P .001

  2. http://msj.sagepub.com Multiple Sclerosis

    E-Print Network [OSTI]

    Hamarneh, Ghassan

    http://msj.sagepub.com Multiple Sclerosis DOI: 10.1177/135248506071178 2006; 12; 1Mult Scler Oral://www.sagepublications.com can be found at:Multiple SclerosisAdditional services and information for http in multiple sclerosis (MS) patients at a faster rate ((/4.5% versus (/1%) than loss in whole brain volume

  3. Multiple Sclerosis Luminance Threshold and Measurements

    E-Print Network [OSTI]

    Foster, David H.

    Multiple Sclerosis Luminance Threshold and Measurements of Temporal Characteristics of Vision indicates multiple sclerosis; ON, optic neuritis. Table 1.-Clinical Details of Patients Details of Eye In patient with multiple sclerosis (MS) and In normal control subjects. The Inten Itles of the tlmull used

  4. Short Papers___________________________________________________________________________________________________ Mining Multiple-Level Association

    E-Print Network [OSTI]

    Wu, Xindong

    ___________________________________________________________________________________________________ Mining Multiple-Level Association Rules in Large Databases Jiawei Han, Member, IEEE Computer Society for efficient mining of multiple-level association rules from large transaction databases based on the Apriori. Index TermsÐData mining, knowledge discovery in databases, association rules, multiple-level association

  5. PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY

    E-Print Network [OSTI]

    Batory, Don

    PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D. SCHATZ, ROBERT A. VAN DE GEIJN- trix matrix multiplication algorithms. The journey starts with a description of how matrices implementation of matrix-vector multiplication and rank-1 update, continues on to reveal a fam- ily of matrix-matrix

  6. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  7. Multiple piece turbine rotor blade

    DOE Patents [OSTI]

    Jones, Russell B; Fedock, John A

    2013-05-21

    A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

  8. Recirculation in multiple wave conversions

    SciTech Connect (OSTI)

    Brizard, A. J. [Department of Chemistry and Physics, Saint Michael's College, Colchester, Vermont 05439 (United States); Kaufman, A. N. [Department of Physics and Lawrence Berkeley National Laboratory, University of California, Berkeley, California 94720 (United States); Tracy, E. R. [Department of Physics, College of William and Mary, Williamsburg, Virginia 23187-8795 (United States)

    2008-08-15

    A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

  9. Multiple channel data acquisition system

    DOE Patents [OSTI]

    Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

    1990-05-22

    A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

  10. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  11. Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope2, Marta M. Jankowska3, Christopher Funk4, Gregory Husak1 and

    E-Print Network [OSTI]

    Lopez-Carr, David

    Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope, and environmental degradation reduce adaptive capacity (Bremner, Lopez-Carr et al. 2010). In such a volatile context

  12. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  13. Spinal cord gray matter atrophy correlates with multiple sclerosis disability

    E-Print Network [OSTI]

    2014-01-01

    Atrophy Correlates with Multiple Sclerosis Disability Regina1,5,6 Objective: In multiple sclerosis (MS), cerebral grayPMS 5 progressive multiple sclerosis; RMS 5 relapsing

  14. In vivo evidence of glutamate toxicity in multiple sclerosis

    E-Print Network [OSTI]

    2014-01-01

    relapsing-remitting multiple sclerosis. A two year follow-upEDSS) 27 and the Multiple Sclerosis Functional Composite (P, Pitt D, Raine CS. Multiple sclerosis: altered glutamate

  15. Prognostic biomarkers of IFNb therapy in multiple sclerosis patients

    E-Print Network [OSTI]

    2015-01-01

    beta-1a Subcutaneously in Multiple Sclerosis) Study Group.1a in relapsing/remitting multiple sclerosis. Lancet 1998;BAC) and the National Multiple Sclerosis Society (to SEB).

  16. Genetic associations with brain cortical thickness in multiple sclerosis

    E-Print Network [OSTI]

    2015-01-01

    Weinshenker, B.G. (2000) Multiple sclerosis. N Engl J Medcorrelations in multiple sclerosis: HLA genes in?uencecerebral cortex in multiple sclerosis. Brain 126, Shannon,

  17. Coulomb pairing resonances in multiple-ring aromatic molecules

    E-Print Network [OSTI]

    Huber, D L

    2015-01-01

    We present an analysis of the Coulomb pairing resonances observed in photo-double-ionization studies of CnHm aromatic molecules with multiple benzene-like rings. It is applied to naphthalene, anthracene, phenanthrene, pyrene and coronene, all of which have six-member rings, and azulene which is comprised of a five-member and a seven-member ring. There is a high energy resonance at ~ 40 eV that is found in all of the molecules cited and is associated with paired electrons localized on carbon sites on the perimeter of the molecule, each of which having two carbon sites as nearest neighbors. The low energy resonance at 10 eV, which is found only in pyrene and coronene, is attributed to the formation of paired electrons localized on arrays of interior carbon atoms that have the point symmetry of the molecule with each carbon atom having three nearest neighbors. The origin of the anomalous increase in the doubly charged to singly charged parent-ion ratio that is found above the 40 eV resonance in all of the cited ...

  18. Multiple Nash-equilibrium in Quantum Game

    E-Print Network [OSTI]

    Georgy Parfionov

    2008-06-06

    Methods of exploring Nash equilibrium in quantum games are studied. Analytical conditions of the existence, the uniqueness or the multiplicity of the equilibria are found.

  19. Multiscale Mathematics For Plasma Kinetics Spanning Multiple...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Multiscale Mathematics For Plasma Kinetics Spanning Multiple Collisionality Regimes Citation Details In-Document Search Title: Multiscale Mathematics For Plasma...

  20. ORISE: Multiple research appointments available through Agricultural...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multiple research appointments available through Agricultural Research Service Postdoctoral Research Program Selected candidates participate in USDA research for one to four years...

  1. Automatic Routing Using Multiple Prefix Labels

    E-Print Network [OSTI]

    Garcia-Luna-Aceves, J.J.; Ghosh, R.

    2012-01-01

    Automatic Routing Using Multiple Prefix Labels Rumi GhoshWe present Multi-label Automatic Routing (MAR), the firstthe routing is automatic based on the positional labels of

  2. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password

  3. TMD-MPI: AN MPI IMPLEMENTATION FOR MULTIPLE PROCESSORS ACROSS MULTIPLE FPGAS

    E-Print Network [OSTI]

    Chow, Paul

    TMD-MPI: AN MPI IMPLEMENTATION FOR MULTIPLE PROCESSORS ACROSS MULTIPLE FPGAS Manuel Salda~na the CMC/SOCRN, Xilinx for hardware and tools, and CONACYT in Mexico provided funding to Manuel Salda~na

  4. Code design for multiple-input multiple-output broadcast channels 

    E-Print Network [OSTI]

    Uppal, Momin Ayub

    2009-06-02

    Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical ...

  5. 36-220 Lab #11 Multiple Regression

    E-Print Network [OSTI]

    Spirtes, Peter

    36-220 Lab #11 Multiple Regression Please write your name below, tear off this front page and give;36-220 Lab #11 Multiple Regression First let's download the dataset we will need for the lab. Download gas Simple Regression Analysis 1. Fit the least squares regression line to describe the relationship between

  6. Persistent Surveillance Using Multiple Unmanned Air Vehicles

    E-Print Network [OSTI]

    Stanford University

    require long endurance and unmanned aerial vehicles are a natural choice for the sensing platforms1 Persistent Surveillance Using Multiple Unmanned Air Vehicles Nikhil Nigam and Ilan Kroo. These are tested in a multiple unmanned air vehicle (UAV) simulation environment, developed for this program

  7. Multiple Criteria Decision Support by Evolutionary Computation

    E-Print Network [OSTI]

    Zitzler, Eckart

    1 Multiple Criteria Decision Support by Evolutionary Computation Marco Laumanns, Eckart Zitzler difficult or impossible. In addition, they can handle multiple criteria simultaneously, being able to gener of these variables form the set of decision alternatives. The criteria to judge each decision relate to the output

  8. Photonic-assisted microwave frequency multiplication with a tunable multiplication factor

    E-Print Network [OSTI]

    Yao, Jianping

    Photonic-assisted microwave frequency multiplication with a tunable multiplication factor Liang Gao,1,2 Weilin Liu,1 Xiangfei Chen,2 and Jianping Yao1, * 1 Microwave Photonics Research Laboratory); published October 31, 2013 Photonic-assisted microwave frequency multiplication with a tunable

  9. Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage Systems*

    E-Print Network [OSTI]

    Pedram, Massoud

    Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage massimo.poncino@polito.it Abstract-- Hybrid electrical energy storage (HEES) systems consist of multiple banks of heterogeneous electrical energy storage (EES) elements that are connected to each other through

  10. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  11. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  12. Neutron multiplication error in TRU waste measurements

    SciTech Connect (OSTI)

    Veilleux, John [Los Alamos National Laboratory; Stanfield, Sean B [CCP; Wachter, Joe [CCP; Ceo, Bob [CCP

    2009-01-01

    Total Measurement Uncertainty (TMU) in neutron assays of transuranic waste (TRU) are comprised of several components including counting statistics, matrix and source distribution, calibration inaccuracy, background effects, and neutron multiplication error. While a minor component for low plutonium masses, neutron multiplication error is often the major contributor to the TMU for items containing more than 140 g of weapons grade plutonium. Neutron multiplication arises when neutrons from spontaneous fission and other nuclear events induce fissions in other fissile isotopes in the waste, thereby multiplying the overall coincidence neutron response in passive neutron measurements. Since passive neutron counters cannot differentiate between spontaneous and induced fission neutrons, multiplication can lead to positive bias in the measurements. Although neutron multiplication can only result in a positive bias, it has, for the purpose of mathematical simplicity, generally been treated as an error that can lead to either a positive or negative result in the TMU. While the factors that contribute to neutron multiplication include the total mass of fissile nuclides, the presence of moderating material in the matrix, the concentration and geometry of the fissile sources, and other factors; measurement uncertainty is generally determined as a function of the fissile mass in most TMU software calculations because this is the only quantity determined by the passive neutron measurement. Neutron multiplication error has a particularly pernicious consequence for TRU waste analysis because the measured Fissile Gram Equivalent (FGE) plus twice the TMU error must be less than 200 for TRU waste packaged in 55-gal drums and less than 325 for boxed waste. For this reason, large errors due to neutron multiplication can lead to increased rejections of TRU waste containers. This report will attempt to better define the error term due to neutron multiplication and arrive at values that are more realistic and accurate. To do so, measurements of standards and waste drums were performed with High Efficiency Neutron Counters (HENC) located at Los Alamos National Laboratory (LANL). The data were analyzed for multiplication effects and new estimates of the multiplication error were computed. A concluding section will present alternatives for reducing the number of rejections of TRU waste containers due to neutron multiplication error.

  13. An improved model for multiple effect distillation

    E-Print Network [OSTI]

    Mistry, Karan H.

    Increasing global demand for fresh water is driving research and development of advanced desalination technologies. As a result, a detailed model of multiple effect distillation (MED) is developed that is flexible, simple ...

  14. Modular multiplication operator and quantized baker's maps

    SciTech Connect (OSTI)

    Lakshminarayan, Arul [Max-Planck-Institut fuer Physik komplexer Systeme, Noethnitzer Strasse 38, D-01187 Dresden (Germany)

    2007-10-15

    The modular multiplication operator, a central subroutine in Shor's factoring algorithm, is shown to be a coherent superposition of two quantum baker's maps when the multiplier is 2. The classical limit of the maps being completely chaotic, it is shown that there exist perturbations that push the modular multiplication operator into regimes of generic quantum chaos with spectral fluctuations that are those of random matrices. For the initial state of relevance to Shor's algorithm we study fidelity decay due to phase and bit-flip errors in a single qubit and show exponential decay with shoulders at multiples or half-multiples of the order. A simple model is used to gain some understanding of this behavior.

  15. Fair resource allocation in multiple access channels

    E-Print Network [OSTI]

    ParandehGheibi, Ali

    2008-01-01

    We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

  16. Software Productivity Measurement Using Multiple Size Measures

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Software Productivity Measurement Using Multiple Size Measures Software Productivity MeasurementContents Introduction Background Related work Motivation Productivity measurement - Measurement model - Productivity measure construction - Productivity analysis Conclusion Discussion #12;Software Engineering Lab, KAIST 3

  17. Algorithms for Multiple Vehicle Routing Problems 

    E-Print Network [OSTI]

    Bae, Jung Yun

    2014-06-02

    require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental rout- ing problems involving multiple vehicles that arise in these applications. The main objective of this dissertation is to develop... . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.2 Approximation algorithm for MDMTHPP . . . . . . . . . . . 8 2.1.3 Optimal constrained forest as a two matroid intersection problem 11 2.2 Single depot multiple terminal Hamiltonian path problems . . . . . . 14 2.2.1 Problem statement...

  18. Topological Performance Measures as Surrogates for Physical Flow Models for Risk and Vulnerability Analysis for Electric Power Systems

    E-Print Network [OSTI]

    LaRocca, Sarah; Hassel, Henrik; Guikema, Seth

    2013-01-01

    Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist which can be used to this end. However, there are relatively few studies comparing the implications of using different modeling approaches in the context of comprehensive risk analysis of critical infrastructures. Thus in this paper, we suggest a classification of these models, which span from simple topologically-oriented models to advanced physical flow-based models. Here, we focus on electric power systems and present a study aimed at understanding the tradeoffs between simplicity and fidelity in models used in the context of risk analysis. Specifically, the purpose of this pa...

  19. Genetic associations with brain cortical thickness in multiple sclerosis

    E-Print Network [OSTI]

    2015-01-01

    relapse onset of multiple sclerosis. Brain 131, 808–817.Weinshenker, B.G. (2000) Multiple sclerosis. N Engl J Medcorrelations in multiple sclerosis: HLA genes in?uence

  20. Exploring Two Phases of Design-by-Analogy "Multiple Solutions" and "Multiple Analogies" 

    E-Print Network [OSTI]

    Gadwal, Apeksha

    2010-10-12

    the wire only. ? The kitchen utensil must be capable of containing the powdered substance and carrying the powdered substance 1 meter without losing the powdered substance. Create as many solutions as possible based on the analogy. Fig. 11... for a Gecko?s Foot example. As the structural consistency requirement and one-to?one constraint restrict the use of analogies to draw multiple solutions, this leads to the first research question: Can engineers draw multiple solutions (multiple...

  1. Wireless Relay Communication System for Multiple Small Robots

    E-Print Network [OSTI]

    Baumgartner, Jeremy Gordon

    2015-01-01

    Wireless Relay Communication System for Multiple SmallCRUZ WIRELESS RELAY COMMUNICATION SYSTEM FOR MULTIPLE SMALLa wire- less relay communication system is developed to test

  2. AltaRock Energy Announces Successful Multiple-Zone Stimulation...

    Broader source: Energy.gov (indexed) [DOE]

    created multiple stimulated zones from a single wellbore at the Newberry Enhanced Geothermal System (EGS) Demonstration site. Creating multiple stimulated zones from a single...

  3. Permeation of Multiple Isotopes in the Transition Between Surface...

    Office of Environmental Management (EM)

    Permeation of Multiple Isotopes in the Transition Between Surface- and Diffusion-Limited Regimes Permeation of Multiple Isotopes in the Transition Between Surface- and...

  4. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    between multiple distinct structures provides multiple opportunities for antiviral drug design. Drugs that inhibit the ring, the dimer, or the hexameric filament structure, or...

  5. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J of Madras and Faculty of Environmental Studies, York University. Pages 451 ­ 464. SOLID WASTE MANAGEMENT the responsibility of solid waste management remains primarily with the municipal bodies, several other stakeholder

  6. ISET Journal of Earthquake Technology, Paper No. 502, Vol. 46, No. 1, March 2009, pp. 2945 SEISMIC PERFORMANCE AND VULNERABILITY OF INDIAN CODE-

    E-Print Network [OSTI]

    Gupta, Vinay Kumar

    The current seismic design practice in India is based on the force-based design philosophy, with a partial-based seismic design does not provide complete insight into the expected performance and associated risks of the designed buildings. KEYWORDS: Force-Based Design, Pushover Analysis, Seismic Performance, Vulnerability, RC

  7. Hawaii International Conference on System Science, January 2004, Hawaii, copyright 2004 IEEE Dynamical and probabilistic approaches to the study of blackout vulnerability of the

    E-Print Network [OSTI]

    Dynamical and probabilistic approaches to the study of blackout vulnerability of the power transmission grid to a similar characterization for power transmission system blackouts are identified in the OPA dynamical model of series of blackouts. The comparison between the CASCADE and OPA models yields parameters that can

  8. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the...

  9. Multislice brain myelin water fractions at 3T in multiple sclerosis

    E-Print Network [OSTI]

    Oh, Joonmi; Han, Eric T.; Lee, Michael C.; Nelson, Sarah J.; Pelletier, Daniel

    2007-01-01

    diagnostic criteria for multiple sclerosis: guidelines forimpairment in multiple sclerosis: an expanded disabilityimpairment in multiple sclerosis: an expanded disability

  10. Hybrid Pulsators -- Pulsating Stars with Multiple Identities

    E-Print Network [OSTI]

    Zhou, A -Y

    2015-01-01

    We have carried out a statistic survey on the pulsating variable stars with multiple identities. These stars were identified to exhibit two types of pulsation or multiple light variability types in the literature, and are usually called hybrid pulsators. We extracted the hybrid information based on the Simbad database. Actually, all the variables with multiple identities are retrieved. The survey covers various pulsating stars across the Hertzsprung-Russell diagram. We aim at giving a clue in selecting interesting targets for further observation. Hybrid pulsators are excellent targets for asteroseismology. An important implication of such stars is their potential in advancing the theories of both stellar evolution and pulsation. By presenting the statistics, we address the open questions and prospects regarding current status of hybrid pulsation studies.

  11. Enhancing video transmission in MANETs utilizing multiple interfaces and multiple channels per node

    E-Print Network [OSTI]

    Bouras, Christos

    . Simulation results indicate that the mechanism improves the networks capacity for video transmissionEnhancing video transmission in MANETs utilizing multiple interfaces and multiple channels per node}@cti.gr, gkamas@aeavellas.gr {politaki, tsanai}@ceid.upatras.gr Abstract. Mobile Ad hoc NETworks (MANETs

  12. Optimization for Fractional Cooperation in Multiple-Source Multiple-Relay Systems

    E-Print Network [OSTI]

    Adve, Raviraj

    . Chu Dept. of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada Email Toronto, Ontario, Canada Email: aeckford@yorku.ca Raviraj S. Adve Dept. of Electrical and ComputerOptimization for Fractional Cooperation in Multiple-Source Multiple-Relay Systems Josephine P. K

  13. Net-X: System eXtensions for Supporting Multiple Channels, Multiple Interfaces,

    E-Print Network [OSTI]

    Vaidya, Nitin

    Net-X: System eXtensions for Supporting Multiple Channels, Multiple Interfaces, and Other Interface-- There are several interface capabilities that may be available in next generation wireless networks. Some examples of interface capabilities include the ability to set the channel of operation and data rate on a frequent basis

  14. Charged-particle multiplicity at LHC energies

    ScienceCinema (OSTI)

    None

    2011-10-06

    The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

  15. Quantum internet using code division multiple access

    E-Print Network [OSTI]

    Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

    2013-09-12

    A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  16. RESEARCH Open Access Impaired multiple object tracking in children with

    E-Print Network [OSTI]

    Nguyen, Danh

    demands related to monitoring multiple targets reflecting a reduced acuity in spatiotemporal cognitive

  17. Semiconductor laser with multiple lasing wavelengths

    DOE Patents [OSTI]

    Fischer, Arthur J.; Choquette, Kent D.; Chow, Weng W.

    2003-07-29

    A new class of multi-terminal vertical-cavity semiconductor laser components has been developed. These multi-terminal laser components can be switched, either electrically or optically, between distinct lasing wavelengths, or can be made to lase simultaneously at multiple wavelengths.

  18. MAIN THEOREM OF COMPLEX MULTIPLICATION BRIAN CONRAD

    E-Print Network [OSTI]

    Conrad, Brian

    MAIN THEOREM OF COMPLEX MULTIPLICATION BRIAN CONRAD In [S, Ch. IV, §18] the Main Theorem of complex and abelian varieties. The aim of the Main Theorem is as follows. Let (A, i) be an abelian variety over Q Galois automorphisms. In these notes, we give a complete proof of the Main Theorem of complex

  19. Selectivity in multiple quantum nuclear magnetic resonance

    SciTech Connect (OSTI)

    Warren, W.S.

    1980-11-01

    The observation of multiple-quantum nuclear magnetic resonance transitions in isotropic or anisotropic liquids is shown to give readily interpretable information on molecular configurations, rates of motional processes, and intramolecular interactions. However, the observed intensity of high multiple-quantum transitions falls off dramatically as the number of coupled spins increases. The theory of multiple-quantum NMR is developed through the density matrix formalism, and exact intensities are derived for several cases (isotropic first-order systems and anisotropic systems with high symmetry) to shown that this intensity decrease is expected if standard multiple-quantum pulse sequences are used. New pulse sequences are developed which excite coherences and produce population inversions only between selected states, even though other transitions are simultaneously resonant. One type of selective excitation presented only allows molecules to absorb and emit photons in groups of n. Coherent averaging theory is extended to describe these selective sequences, and to design sequences which are selective to arbitrarily high order in the Magnus expansion. This theory and computer calculations both show that extremely good selectivity and large signal enhancements are possible.

  20. Steady water waves with multiple critical layers

    E-Print Network [OSTI]

    Mats Ehrnström; Joachim Escher; Erik Wahlén

    2011-04-01

    We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

  1. ANALYSIS OF MINING EXPLOSION PERFORMANCE WITH MULTIPLE

    E-Print Network [OSTI]

    Stump, Brian W.

    ANALYSIS OF MINING EXPLOSION PERFORMANCE WITH MULTIPLE SENSOR DATA AND PHYSICAL MODELS Brian W Martin Thunder Basin Coal Company Wright, Wyoming #12;Analysis of Mining Explosion Performance 2 1 to Different Types of Mining Explosions · Single Shot · Cast Blast · Coal Fragmentation #12;Analysis of Mining

  2. MULTIPLE BUYING OR SELLING WITH VECTOR OFFERS

    E-Print Network [OSTI]

    Ferguson, Thomas S.

    MULTIPLE BUYING OR SELLING WITH VECTOR OFFERS F. THOMAS BRUSS , Universit´e Libre de Bruxelles of the house-selling problem to selling k houses. Let the offers, X1, X2, . . ., be independent, identically with recall of past offers and to problems with a discount. KEYWORDS: OPTIMAL STOPPING, HOUSE-SELLING, JOB

  3. SINGLE AND MULTIPLE ANTENNA COMMUNICATION SYSTEMS: PERFORMANCE

    E-Print Network [OSTI]

    Wehlau, David

    ), the Ontario Premier's Research Excellence Award (PREA), the Department of Electrical and Computer EngineeringSINGLE AND MULTIPLE ANTENNA COMMUNICATION SYSTEMS: PERFORMANCE ANALYSIS AND JOINT SOURCE-CHANNEL CODING by Firouz Behnamfar A thesis submitted to the Department of Electrical and Computer Engineering

  4. T-632: Google Chrome OS before R12 0.12.433.38 Beta Update

    Broader source: Energy.gov [DOE]

    CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

  5. Intravalley Multiple Scattering of Quasiparticles in Graphene

    E-Print Network [OSTI]

    J. Y. Vaishnav; Justin Q. Anderson; Jamie D. Walls

    2011-05-28

    We develop a theoretical description of intravalley scattering of quasiparticles in graphene from multiple short-range scatterers of size much greater than the carbon-carbon bond length. Our theory provides a method to rapidly calculate the Green's function in graphene for arbitrary configurations of scatterers. We demonstrate that non-collinear multiple scattering trajectories generate pseudospin rotations that alter quasiparticle interference, resulting in significant modifications to the shape, intensity, and pattern of the interference fringes in the local density of states (LDOS). We illustrate these effects via theoretical calculations of the LDOS for a variety of scattering configurations in single layer graphene. A clear understanding of impurity scattering in graphene is a step towards exploiting graphene's unique properties to build future devices.

  6. Multiple Scattering Measurements in the MICE Experiment

    SciTech Connect (OSTI)

    Carlisle, T.; Cobb, J.; Neuffer, D.; /Fermilab

    2012-05-01

    The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

  7. Experience with pipelined multiple instruction streams

    SciTech Connect (OSTI)

    Jordon, H.F.

    1984-01-01

    Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

  8. Multiple quadrature by Monte Carlo techniques 

    E-Print Network [OSTI]

    Voss, John Dietrich

    1966-01-01

    of a multiple integral ordinarily hopeless to attempt by 1 classical methods. " In this paper the Monte Carlo Method of numerical quadrature is used to integrate some functions that are extremely difficult and tedious to integrate by any other known... and the table of known values can be extended. The method developed here may also be used to evaluate the distribution at any desired values of the parameters . C HAP TER II THEORETICAL CONSIDERATIONS Hammersley has said: "Every Monte Carlo computation...

  9. Lamp method and apparatus using multiple reflections

    DOE Patents [OSTI]

    MacLennan, Donald A. (Butler, PA); Turner, Brian (Damascus, MD); Kipling, Kent (Gaithersburg, MD)

    1999-01-01

    A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

  10. Lamp method and apparatus using multiple reflections

    DOE Patents [OSTI]

    MacLennan, D.A.; Turner, B.; Kipling, K.

    1999-05-11

    A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

  11. MCNP6 Fission Multiplicity with FMULT Card

    SciTech Connect (OSTI)

    Wilcox, Trevor; Fensin, Michael Lorne; Hendricks, John S.; James, Michael R.; McKinney, Gregg W.

    2012-06-18

    With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

  12. Benchmarking of multiple preequilibrium routines in GNASH

    SciTech Connect (OSTI)

    Chadwick, M.B.; Young, P.G.

    1994-08-01

    The authors compare two different models for multiple preequilibrium emission (MPE) in GNASH: the older exciton MPE model; and a new generalized MPE model which is parameter-free. They analyze the proton-induced reactions on zirconium and lead, which were the focus of a recent NEA intermediate-energy code intercomparison, using both the MPE models. They find that the new generalized MPE model better describes the measurements.

  13. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  14. MPACT Fast Neutron Multiplicity System Prototype Development

    SciTech Connect (OSTI)

    D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

    2013-09-01

    This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

  15. Multiple-reflection optical gas cell

    DOE Patents [OSTI]

    Matthews, Thomas G. (Oak Ridge, TN)

    1983-01-01

    A multiple-reflection optical cell for Raman or fluorescence gas analysis consists of two spherical mirrors positioned transverse to a multiple-pass laser cell in a confronting plane-parallel alignment. The two mirrors are of equal diameter but possess different radii of curvature. The spacing between the mirrors is uniform and less than half of the radius of curvature of either mirror. The mirror of greater curvature possesses a small circular portal in its center which is the effective point source for conventional F1 double lens collection optics of a monochromator-detection system. Gas to be analyzed is flowed into the cell and irradiated by a multiply-reflected composite laser beam centered between the mirrors of the cell. Raman or fluorescence radiation originating from a large volume within the cell is (1) collected via multiple reflections with the cell mirrors, (2) partially collimated and (3) directed through the cell portal in a geometric array compatible with F1 collection optics.

  16. Constant-mesh, multiple-shaft transmission

    SciTech Connect (OSTI)

    Rea, J.E.; Mills, D.D.; Sewell, J.S.

    1992-04-21

    This patent describes a multiple-shaft, constant-mesh transmission adapted to establish selectively a reverse torque delivery path and a forward drive torque delivery path and having a torque input means including a torque input shaft, a mainshaft aligned with the input shaft, a countershaft geared to the input shaft in spaced, parallel relationship with respect to the mainshaft, a torque output shaft joined to the mainshaft; multiple mainshaft gear elements journalled on the main airshaft, multiple cluster gear elements carried by the countershaft in meshing engagement with the mainshaft gear elements, one of the cluster gear elements being rotatably journalled on the countershaft; a reverse idle gear, a reverse gear journalled on the countershaft, the reverse idler gear being in constant mesh with the reverse gear and one of the mainshaft gear elements; first clutch means for connecting selectively the reverse gear and the countershaft; second synchronizer clutch means for connecting selectively the one of the mainshaft gear elements to the mainshaft; and third synchronizer clutch means for selectively connecting another of the mainshaft gear elements to the mainshaft; the first clutch means being a double-acting clutch with a first common axially movable clutch element adapted upon movement in one axial direction to drivably connected the reverse gear to the countershaft and adapted upon movement in the opposite axial direction to connect the one cluster gear element to the countershaft.

  17. Radial velocities of southern visual multiple stars

    SciTech Connect (OSTI)

    Tokovinin, Andrei; Pribulla, Theodor; Fischer, Debra E-mail: pribulla@ta3.sk

    2015-01-01

    High-resolution spectra of visual multiple stars were taken in 2008–2009 to detect or confirm spectroscopic subsystems and to determine their orbits. Radial velocities of 93 late-type stars belonging to visual multiple systems were measured by numerical cross-correlation. We provide the individual velocities, the width, and the amplitude of the Gaussians that approximate the correlations. The new information on the multiple systems resulting from these data is discussed. We discovered double-lined binaries in HD 41742B, HD 56593C, and HD 122613AB, confirmed several other known subsystems, and constrained the existence of subsystems in some visual binaries where both components turned out to have similar velocities. The orbits of double-lined subsystems with periods of 148 and 13 days are computed for HD 104471 Aa,Ab and HD 210349 Aa,Ab, respectively. We estimate individual magnitudes and masses of the components in these triple systems and update the outer orbit of HD 104471 AB.

  18. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  19. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

    2015-08-31

    The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grassesmore »(prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.« less

  20. Multiple, Simultaneous, Martensitic Transformations: Implications on Transformation Texture Intensities

    E-Print Network [OSTI]

    Cambridge, University of

    kind of martensite to be followed as a function of the steel temperature. The problem is relevantMultiple, Simultaneous, Martensitic Transformations: Implications on Transformation Texture, multiple martensitic transformations. Abstract. A theory is developed for martensite variants that have

  1. Information Processing in Multiple Sclerosis: Accuracy versus Speed

    E-Print Network [OSTI]

    Steiger, Katherine Anne

    2007-12-27

    Previous research has suggested that slowed speed of information processing is the primary cognitive impairment that occurs in multiple sclerosis (MS). The proposed study employed multiple cognitive measures to replicate these findings. Individuals...

  2. Introduction Multiple sclerosis (MS) is an inflammatory disease of the

    E-Print Network [OSTI]

    Strominger, Jack L.

    Introduction Multiple sclerosis (MS) is an inflammatory disease of the CNS affecting 0 the frequency of relapses by 30% in relapsing-remitting multiple sclerosis (MS) patients. In the present study

  3. Single-valued periods and multiple zeta values

    E-Print Network [OSTI]

    Francis Brown

    2013-09-20

    The values at 1 of single-valued multiple polylogarithms span a certain subalgebra of multiple zeta values. In this paper, the properties of this algebra are studied from the point of view of motivic periods.

  4. On the decomposition of motivic multiple zeta values

    E-Print Network [OSTI]

    Francis Brown

    2011-02-08

    We review motivic aspects of multiple zeta values, and as an application, we give an exact-numerical algorithm to decompose any (motivic) multiple zeta value of given weight into a chosen basis up to that weight.

  5. Genetic associations with brain cortical thickness in multiple sclerosis

    E-Print Network [OSTI]

    2015-01-01

    onset of multiple sclerosis. Brain 131, 808–817. Georgala,in multiple sclerosis. Brain 126, Shannon, P. , Markiel,Genes, Brain and Behavior (2015) 14: 217–227 doi:

  6. Combinatorial Path Planning for a System of Multiple Unmanned Vehicles 

    E-Print Network [OSTI]

    Yadlapalli, Sai Krishna

    2011-02-22

    involving Unmanned Aerial Vehicles (UAVs) or ground robots requiring multiple vehicles with different capabilities to visit a set of locations....

  7. When is a linear functional multiplicative? Krzysztof Jarosz

    E-Print Network [OSTI]

    Jarosz, Krzysztof

    When is a linear functional multiplicative? Krzysztof Jarosz Abstract. We discuss the problem) be the set of all (nonzero) linear and multiplicative functionals on A, that is, the set of functionals: · for the algebra C [0, 1] of all continuous functions defined on the unit segment [0, 1] any linear multiplicative

  8. REVIEW Open Access Endogenous retroviruses and multiple sclerosis

    E-Print Network [OSTI]

    Schierup, Mikkel Heide

    REVIEW Open Access Endogenous retroviruses and multiple sclerosis­ new pieces to the puzzle Kari K a role in multiple sclerosis (MS) has long been considered; accumulating findings suggest this to be most alternative ways to challenge autoimmune diseases. Keywords: Multiple sclerosis, Endogenous retroviruses, HERV

  9. Potential of Urinary Metabolites for Diagnosing Multiple Sclerosis Teklab Gebregiworgis,,

    E-Print Network [OSTI]

    Powers, Robert

    Potential of Urinary Metabolites for Diagnosing Multiple Sclerosis Teklab Gebregiworgis ABSTRACT: A definitive diagnostic test for multiple sclerosis (MS) does not exist; instead physicians use healthy and MS drug-treated EAE mice. Multiple sclerosis (MS) is a demyelinating disease of the central

  10. Multiple Sclerosis Journal The Author(s) 2013

    E-Print Network [OSTI]

    Gaser, Christian

    Multiple Sclerosis Journal 0(0) 1­8 © The Author(s) 2013 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/1352458513478673 msj.sagepub.com MULTIPLE SCLEROSIS MSJ JOURNAL Introduction (MRIs) are the most striking finding in multiple sclerosis (MS) and they have become the most important

  11. Aalborg Universitet Hierarchical Control for Multiple DC Microgrids Clusters

    E-Print Network [OSTI]

    Vasquez, Juan Carlos

    Aalborg Universitet Hierarchical Control for Multiple DC Microgrids Clusters Shafiee, Qobad). Hierarchical Control for Multiple DC Microgrids Clusters. I E E E Transactions on Energy Conversion, 29(4), 922. Dragicevic, J. C. Vasquez, and J. M. Guerrero, "Hierarchical Control for Multiple DC-Microgrids Clusters

  12. The Ramsey Multiplicity of K4 Konrad Piwakowski

    E-Print Network [OSTI]

    Radziszowski, Stanislaw P.

    The Ramsey Multiplicity of K4 Konrad Piwakowski Stanislaw P. Radziszowski Department of Foundations of computer algorithms, we improve the lower bound on the Ramsey multiplicity of K4, and thus show that the exact value of it is equal to 9. The Ramsey multiplicity M(G) of a graph G is defined as the smallest

  13. Multiplicity Distributions in QCD at Very High Energies

    E-Print Network [OSTI]

    I. M. Dremin

    1994-08-18

    Recent results in QCD on multiplicity distributions are briefly reviewed. QCD is able to predict very tiny features of multiplicity distributions which demonstrate that the negative binomial distribution (and, more generally, any infinitely divisible distribution) is inappropriate for precise description of experimental data. New fits of high energy multiplicity distributions can be derived.

  14. Statistical estimation of multiple faults in aircraft gas turbine engines

    E-Print Network [OSTI]

    Ray, Asok

    415 Statistical estimation of multiple faults in aircraft gas turbine engines S Sarkar, C Rao of multiple faults in aircraft gas-turbine engines, based on a statistical pattern recognition tool called commercial aircraft engine. Keywords: aircraft propulsion, gas turbine engines, multiple fault estimation

  15. Multiple Subject Credential Program Advisement Guide Elementary Education

    E-Print Network [OSTI]

    Su, Xiao

    Multiple Subject Credential Program Advisement Guide Elementary Education San José State University ELED Advisement Guide Revised 12.16.2014 1 Introduction to SJSU Multiple Subject Credential Program The Multiple Subject Credential authorizes its holder to teach in a "self-contained" classroom in which several

  16. Baroclinic Multiple Zonal Jets on the Sphere SUKYOUNG LEE

    E-Print Network [OSTI]

    Lee, Sukyoung

    Baroclinic Multiple Zonal Jets on the Sphere SUKYOUNG LEE Department of Meteorology December 2004) ABSTRACT Multiple zonal jets are investigated with a two-level primitive equation model the meridional scale of the multiple zonal jets, and that these jets are maintained in part by an eddy momentum

  17. Protein search for multiple targets on DNA

    E-Print Network [OSTI]

    Martin Lange; Maria Kochugaeva; Anatoly B. Kolomeisky

    2015-08-03

    Protein-DNA interactions are crucial for all biological processes. One of the most important fundamental aspects of these interactions is the process of protein searching and recognizing specific binding sites on DNA. A large number of experimental and theoretical investigations have been devoted to uncovering the molecular description of these phenomena, but many aspects of the mechanisms of protein search for the targets on DNA remain not well understood. One of the most intriguing problems is the role of multiple targets in protein search dynamics. Using a recently developed theoretical framework we analyze this question in detail. Our method is based on a discrete-state stochastic approach that takes into account most relevant physical-chemical processes and leads to fully analytical description of all dynamic properties. Specifically, systems with two and three targets have been explicitly investigated. It is found that multiple targets in most cases accelerate the search in comparison with a single target situation. However, the acceleration is not always proportional to the number of targets. Surprisingly, there are even situations when it takes longer to find one of the multiple targets in comparison with the single target. It depends on the spatial position of the targets, distances between them, average scanning lengths of protein molecules on DNA, and the total DNA lengths. Physical-chemical explanations of observed results are presented. Our predictions are compared with experimental observations as well as with results from a continuum theory for the protein search. Extensive Monte Carlo computer simulations fully support our theoretical calculations.

  18. Multiple frequency method for operating electrochemical sensors

    DOE Patents [OSTI]

    Martin, Louis P. (San Ramon, CA)

    2012-05-15

    A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

  19. Experience with pipelined multiple instruction streams

    SciTech Connect (OSTI)

    Jordan, H.F.

    1984-01-01

    The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

  20. Expression of multiple proteins in transgenic plants

    DOE Patents [OSTI]

    Vierstra, Richard D. (Madison, WI); Walker, Joseph M. (Madison, WI)

    2002-01-01

    A method is disclosed for the production of multiple proteins in transgenic plants. A DNA construct for introduction into plants includes a provision to express a fusion protein of two proteins of interest joined by a linking domain including plant ubiquitin. When the fusion protein is produced in the cells of a transgenic plant transformed with the DNA construction, native enzymes present in plant cells cleave the fusion protein to release both proteins of interest into the cells of the transgenic plant. Since the proteins are produced from the same fusion protein, the initial quantities of the proteins in the cells of the plant are approximately equal.

  1. Comments on Multiple M2-branes

    E-Print Network [OSTI]

    Jonathan Bagger; Neil Lambert

    2008-02-02

    Recently a three-dimensional field theory was derived that is consistent with all the symmetries expected of the worldvolume action for multiple M2-branes. In this note we examine several physical predictions of this model and show that they are in agreement with expected M2-brane dynamics. In particular, we discuss the quantization of the Chern-Simons coefficient, the vacuum moduli space, a massive deformation leading to fuzzy three-sphere vacua, and a possible large n limit. In this large n limit, the fuzzy funnel solution correctly reproduces the mass of an M5-brane.

  2. Multiple volume compressor for hot gas engine

    DOE Patents [OSTI]

    Stotts, Robert E. (Clifton Park, NY)

    1986-01-01

    A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

  3. Observation of laser multiple filamentation process and multiple electron beams acceleration in a laser wakefield accelerator

    SciTech Connect (OSTI)

    Li, Wentao; Liu, Jiansheng; Wang, Wentao; Chen, Qiang; Zhang, Hui; Tian, Ye; Zhang, Zhijun; Qi, Rong; Wang, Cheng; Leng, Yuxin; Li, Ruxin; Xu, Zhizhan

    2013-11-15

    The multiple filaments formation process in the laser wakefield accelerator (LWFA) was observed by imaging the transmitted laser beam after propagating in the plasma of different density. During propagation, the laser first self-focused into a single filament. After that, it began to defocus with energy spreading in the transverse direction. Two filaments then formed from it and began to propagate independently, moving away from each other. We have also demonstrated that the laser multiple filamentation would lead to the multiple electron beams acceleration in the LWFA via ionization-induced injection scheme. Besides, its influences on the accelerated electron beams were also analyzed both in the single-stage LWFA and cascaded LWFA.

  4. San Dieguito Citizen Science Multiple Species Monitoring Program 1 San Dieguito Citizen Science Multiple Species Monitoring Program

    E-Print Network [OSTI]

    Wang, Deli

    San Dieguito Citizen Science Multiple Species Monitoring Program 1 San Dieguito Citizen Science Multiple Species Monitoring Program The goal from current citizen science groups (such as Audubon and SD Tracking Team

  5. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect (OSTI)

    Boyer, Brian D.

    2012-06-18

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  6. Safeguarding Vulnerable Groups Policy

    E-Print Network [OSTI]

    Martin, Ralph R.

    is defined by the Children Act 1989 and Joint Chief Inspectors Report on Arrangements to Safeguard Children social work 4. Assistance with general household activities 5. Assistance with conduct of a persons own

  7. Dynamics, risk, and vulnerability

    E-Print Network [OSTI]

    Ligon, Ethan A.

    2011-01-01

    month, plus that obtained from reprocessing, from businessthe quantity used for reprocessing or to feed animals, given

  8. Multiple output timing and trigger generator

    SciTech Connect (OSTI)

    Wheat, Robert M. [Los Alamos National Laboratory; Dale, Gregory E [Los Alamos National Laboratory

    2009-01-01

    In support of the development of a multiple stage pulse modulator at the Los Alamos National Laboratory, we have developed a first generation, multiple output timing and trigger generator. Exploiting Commercial Off The Shelf (COTS) Micro Controller Units (MCU's), the timing and trigger generator provides 32 independent outputs with a timing resolution of about 500 ns. The timing and trigger generator system is comprised of two MCU boards and a single PC. One of the MCU boards performs the functions of the timing and signal generation (the timing controller) while the second MCU board accepts commands from the PC and provides the timing instructions to the timing controller. The PC provides the user interface for adjusting the on and off timing for each of the output signals. This system provides 32 output or timing signals which can be pre-programmed to be in an on or off state for each of 64 time steps. The width or duration of each of the 64 time steps is programmable from 2 {micro}s to 2.5 ms with a minimum time resolution of 500 ns. The repetition rate of the programmed pulse train is only limited by the time duration of the programmed event. This paper describes the design and function of the timing and trigger generator system and software including test results and measurements.

  9. 3-D simulations of multiple beam klystrons

    SciTech Connect (OSTI)

    Smithe, David N.; Bettenhausen, Mike; Ludeking, Larry; Caryotakis, G.; Sprehn, Daryl; Scheitrum, Glenn [Mission Research Corporation, 8560 Cinderbed Rd., Suite 700, Newington, Virginia 22122 (United States); Stanford Linear Accelerator Center, 2575 Sand Hill Rd., Menlo Park, California 94025 (United States)

    1999-05-07

    The MAGIC3D simulation code is being used to assess the multi-dimensional physics issues relating to the design and operation of multiple beam klystrons. Investigations, to date, include a detailed study of the mode structure of the cavities in the 19-beam hexagonally packed geometry and a study of the velocity spread caused by the cavity mode's field profile. Some attempts to minimize this effect are investigated. Additional simulations have provided quantification of the beam loading Q in a dual input cavity, and optimization of a dual output cavity. An important goal of the simulations is an accurate picture of beam transport along the length of the MBK. We have quantified the magnitude and spatial variation of the beam-line space charge interactions within a cavity gap. Present simulations have demonstrated the transport of the beam through three cavities (the present limits of our simulation size) without difficulty; additional length simulations are expected. We have also examined unbalanced beam-line scenarios, e.g., one beam-line suppressed, and find little disturbance to the transport in individual cavity tests, with results for multiple cavity transport expected.

  10. Boredom and Distraction in Multiple Unmanned Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control

    E-Print Network [OSTI]

    Cummings, Mary "Missy"

    Institute of Technology Cambridge, MA Operators currently controlling Unmanned Aerial Vehicles report in autonomous flight control of unmanned aerial vehicles (UAVs), it is not uncommon in search and reconnaissance: boredom, distraction, multiple unmanned vehicles, human supervisory control, task load, workload 1

  11. Modeling the Cumulative Genetic Risk for Multiple Sclerosis from Genome Wide Association Data

    E-Print Network [OSTI]

    2011-01-01

    antigen; LD: linkage disequilibrium; MS: multiple sclerosis;MSSS: Multiple Sclerosis Severity Score; ROC: receiverDS: The causal cascade to multiple sclerosis: a model for MS

  12. Characterization of Complex Genetic Component Contributing to the Susceptibility for Multiple Sclerosis and Rheumatoid Arthritis

    E-Print Network [OSTI]

    Briggs, Farren Basil Shaw

    2010-01-01

    JR, Barcellos LF. Multiple sclerosis genetics: leaving noand pathogenesis of multiple sclerosis. Semin Immunol 2009;risk factors in multiple sclerosis aetiology. Lancet Neurol

  13. Effect of pioglitazone treatment in a patient with secondary multiple sclerosis

    E-Print Network [OSTI]

    Pershadsingh, Harrihar A; Heneka, Michael T; Saini, Rashmi; Amin, Navin M; Broeske, Daniel J; Feinstein, Douglas L

    2004-01-01

    with secondary multiple sclerosis Harrihar A Pershadsingh*an animal model of multiple sclerosis (MS). We thereforefrom the National Multiple Sclerosis Society (DLF), Takeda

  14. Impact of parental multiple sclerosis on early childhood development: A retrospective cohort study

    E-Print Network [OSTI]

    2015-01-01

    Razaz, H Tremlett MULTIPLE SCLEROSIS MSJ JOURNAL OriginalImpact of parental multiple sclerosis on early childhoodA retrospective cohort study Multiple Sclerosis Journal DOI:

  15. Successful treatment of psoriasis with ustekinumab in patients with multiple sclerosis

    E-Print Network [OSTI]

    Chang, Shurong; Chambers, Cindy J; Liu, Fu-Tong; Armstrong, April W

    2015-01-01

    therapy fail in multiple sclerosis? Expert review ofof ustekinumab in multiple sclerosis, the data presented inrelapsing-remitting multiple sclerosis: a phase II, double-

  16. Potential immunological consequences of pharmacological suppression of gastric acid production in patients with multiple sclerosis

    E-Print Network [OSTI]

    Biswas, Sangita; Benedict, Stephen H; Lynch, Sharon G; LeVine, Steven M

    2012-01-01

    in patients with multiple sclerosis. BMC Medicine 2012 10:adverse effects in multiple sclerosis. Ann Neurol 2011, 69:cytotoxicity in multiple sclerosis by central nervous system

  17. Conformational epitopes of myelin oligodendrocyte glycoprotein are targets of potentially pathogenic antibody responses in multiple sclerosis

    E-Print Network [OSTI]

    Menge, Til; Lalive, Patrice H; von Büdingen, H -Christian; Genain , Claude P

    2011-01-01

    antibody responses in multiple sclerosis. Journal ofof biomarkers in multiple sclerosis. Brain 2004, 127:1463-diagnostic criteria for multiple sclerosis: guidelines from

  18. Genetics and the environment converge to dysregulate N-glycosylation in multiple sclerosis.

    E-Print Network [OSTI]

    2011-01-01

    alters the severity of multiple sclerosis. J. Neuroimmunol.diagnostic criteria for multiple sclerosis: guidelines fromon the diagnosis of multiple sclerosis. Ann. Neurol. 50,

  19. Quantitative MRI analysis in children with multiple sclerosis: a multicenter feasibility pilot study

    E-Print Network [OSTI]

    2013-01-01

    children with multiple sclerosis: a multicenter feasibilityA, Hader W, et al: Multiple sclerosis in childhood: clinicalIL, Zaffaroni M: Multiple sclerosis in childhood: clinical

  20. Generalized skin drug eruption to natalizumab in a patient with multiple sclerosis

    E-Print Network [OSTI]

    André, Marisa C; Pacheco, David; Antunes, Joana; Silva, Raquel; Filipe, Paulo; Almeida, L M Soares de

    2010-01-01

    International Natalizumab Multiple Sclerosis Trial Group.Natalizumab for Relapsing Multiple Sclerosis. 2003. N Engl Jin a patient with multiple sclerosis Marisa C André MD,

  1. The genetic basis of multiple sclerosis: a model for MS susceptibility

    E-Print Network [OSTI]

    Goodin, Douglas S

    2010-01-01

    The genetic basis of multiple sclerosis: a model for MSet al: McAlpine’s Multiple Sclerosis. 4 edition. Churchillfamilial aggregation in multiple sclerosis. Nature 1995, 4.

  2. Open Ring Sign Diagnostic of Multiple Sclerosis in the Emergency Department

    E-Print Network [OSTI]

    Nappe, Thomas M.; Niehaus, Matthew T; Goyke, Terrence E

    2015-01-01

    Ring Sign Diagnostic of Multiple Sclerosis in the Emergencyin Pseudotumoral Multiple Sclerosis: Important RadiologicalSign Diagnostic of Multiple Sclerosis 2. Masdeu JC, Quinto

  3. Multiple predictor smoothing methods for sensitivity analysis.

    SciTech Connect (OSTI)

    Helton, Jon Craig; Storlie, Curtis B.

    2006-08-01

    The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

  4. MPACT Fast Neutron Multiplicity System Design Concepts

    SciTech Connect (OSTI)

    D. L. Chichester; S. A. Pozzi; J. L. Dolan; M. T. Kinlaw; A. C. Kaplan; M. Flaska; A. Enqvist; J. T. Johnsom; S. M. Watson

    2012-10-01

    This report documents work performed by Idaho National Laboratory and the University of Michigan in fiscal year (FY) 2012 to examine design parameters related to the use of fast-neutron multiplicity counting for assaying plutonium for materials protection, accountancy, and control purposes. This project seeks to develop a new type of neutron-measurement-based plutonium assay instrument suited for assaying advanced fuel cycle materials. Some current-concept advanced fuels contain high concentrations of plutonium; some of these concept fuels also contain other fissionable actinides besides plutonium. Because of these attributes the neutron emission rates of these new fuels may be much higher, and more difficult to interpret, than measurements made of plutonium-only materials. Fast neutron multiplicity analysis is one approach for assaying these advanced nuclear fuels. Studies have been performed to assess the conceptual performance capabilities of a fast-neutron multiplicity counter for assaying plutonium. Comparisons have been made to evaluate the potential improvements and benefits of fast-neutron multiplicity analyses versus traditional thermal-neutron counting systems. Fast-neutron instrumentation, using for example an array of liquid scintillators such as EJ-309, have the potential to either a) significantly reduce assay measurement times versus traditional approaches, for comparable measurement precision values, b) significantly improve assay precision values, for measurement durations comparable to current-generation technology, or c) moderating improve both measurement precision and measurement durations versus current-generation technology. Using the MCNPX-PoliMi Monte Carlo simulation code, studies have been performed to assess the doubles-detection efficiency for a variety of counter layouts of cylindrical liquid scintillator detector cells over one, two, and three rows. Ignoring other considerations, the best detector design is the one with the most detecting volume. However, operational limitations guide a) the maximum acceptable size of each detector cell (due to PSD performance and maximum-acceptable per-channel data throughput rates, limited by pulse pile-up and the processing rate of the electronics components of the system) and b) the affordability of a system due to the number of total channels of data to be collected and processed. As a first estimate, it appears that a system comprised of two rows of detectors 5" Ø ? 3" would yield a working prototype system with excellent performance capabilities for assaying Pu-containing items and capable of handling high signal rates likely when measuring items with Pu and other actinides. However, it is still likely that gamma-ray shielding will be needed to reduce the total signal rate in the detectors. As a first step prior to working with these larger-sized detectors, it may be practical to perform scoping studies using small detectors, such as already-on-hand 3" Ø ? 3" detectors.

  5. Multiple channel optical data acquisition system

    DOE Patents [OSTI]

    Fasching, G.E.; Goff, D.R.

    1985-02-22

    A multiple channel optical data acquisition system is provided in which a plurality of remote sensors monitoring specific process variable are interrogated by means of a single optical fiber connecting the remote station/sensors to a base station. The remote station/sensors derive all power from light transmitted through the fiber from the base station. Each station/sensor is individually accessed by means of a light modulated address code sent over the fiber. The remote station/sensors use a single light emitting diode to both send and receive light signals to communicate with the base station and provide power for the remote station. The system described can power at least 100 remote station/sensors over an optical fiber one mile in length.

  6. Multiple hearth furnace for reducing iron oxide

    DOE Patents [OSTI]

    Brandon, Mark M. (Charlotte, NC); True, Bradford G. (Charlotte, NC)

    2012-03-13

    A multiple moving hearth furnace (10) having a furnace housing (11) with at least two moving hearths (20) positioned laterally within the furnace housing, the hearths moving in opposite directions and each moving hearth (20) capable of being charged with at least one layer of iron oxide and carbon bearing material at one end, and being capable of discharging reduced material at the other end. A heat insulating partition (92) is positioned between adjacent moving hearths of at least portions of the conversion zones (13), and is capable of communicating gases between the atmospheres of the conversion zones of adjacent moving hearths. A drying/preheat zone (12), a conversion zone (13), and optionally a cooling zone (15) are sequentially positioned along each moving hearth (30) in the furnace housing (11).

  7. Average gluon and quark jet multiplicities

    E-Print Network [OSTI]

    A. V. Kotikov

    2014-11-30

    We show the results in [1,2] for computing the QCD contributions to the scale evolution of average gluon and quark jet multiplicities. The new results came due a recent progress in timelike small-x resummation obtained in the MSbar factorization scheme. They depend on two nonperturbative parameters with clear and simple physical interpretations. A global fit of these two quantities to all available experimental data sets demonstrates by its goodness how our results solve a longstandig problem of QCD. Including all the available theoretical input within our approach, alphas(Mz)=0.1199 +- 0.0026 has been obtained in the MSbar scheme in an approximation equivalent to next-to-next-to-leading order enhanced by the resummations of ln x terms through the NNLL level and of ln Q2 terms by the renormalization group. This result is in excellent agreement with the present world average.

  8. New ideas about multiplication of tensorial distributions

    E-Print Network [OSTI]

    Skakala, Jozef

    2009-01-01

    There is a huge need in general relativity for a consistent and useful mathematical theory defining the multiplication of tensor distributions in a geometric (diffeomorphism invariant) way. Significant progress has been made through the concept of Colombeau algebras, and the construction of full Colombeau algebras on differential manifolds for arbitrary tensors. Despite the fact that this goal was achieved, it does not incorporate clearly enough the concept of covariant derivative and hence has a limited meaning. We take a different approach: we consider any type of preference for smooth distributions (on a smooth manifold) as nonintuitive, which means all our approach must be based fully on the Colombeau equivalence relation as the fundamental feature of the theory. After taking this approach we very naturally obtain a canonical and geometric theory defining tensorial operations with tensorial distributions, including covariant derivative. This also happens because we no longer need any explicit canonical ge...

  9. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  10. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  11. Spin-orbit interaction in multiple quantum wells

    SciTech Connect (OSTI)

    Hao, Ya-Fei

    2015-01-07

    In this paper, we investigate how the structure of multiple quantum wells affects spin-orbit interactions. To increase the interface-related Rashba spin splitting and the strength of the interface-related Rashba spin-orbit interaction, we designed three kinds of multiple quantum wells. We demonstrate that the structure of the multiple quantum wells strongly affected the interface-related Rashba spin-orbit interaction, increasing the interface-related Rashba spin splitting to up to 26% larger in multiple quantum wells than in a stepped quantum well. We also show that the cubic Dresselhaus spin-orbit interaction similarly influenced the spin relaxation time of multiple quantum wells and that of a stepped quantum well. The increase in the interface-related Rashba spin splitting originates from the relationship between interface-related Rashba spin splitting and electron probability density. Our results suggest that multiple quantum wells can be good candidates for spintronic devices.

  12. Multiple-Input Multiple-Output (MIMO) Linear Systems Extreme Inputs/Outputs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Smallwood, David O.

    2007-01-01

    A linear structure is excited at multiple points with a stationary normal random process. The response of the structure is measured at multiple outputs. If the autospectral densities of the inputs are specified, the phase relationships between the inputs are derived that will minimize or maximize the trace of the autospectral density matrix of the outputs. If the autospectral densities of the outputs are specified, the phase relationships between the outputs that will minimize or maximize the trace of the input autospectral density matrix are derived. It is shown that other phase relationships and ordinary coherence less than one willmore »result in a trace intermediate between these extremes. Least favorable response and some classes of critical response are special cases of the development. It is shown that the derivation for stationary random waveforms can also be applied to nonstationary random, transients, and deterministic waveforms.« less

  13. Subcritical Measurements Multiple HEU Metal Castings

    SciTech Connect (OSTI)

    Mihalczo, John T [ORNL] [ORNL; Archer, Daniel E [ORNL] [ORNL; Wright, Michael C [ORNL] [ORNL

    2008-01-01

    Experiments with the standard annular highly enriched uranium (HEU) metal castings at Y-12 were performed in which up to 5 castings ({approx}90kg) were assembled in a tightly packed array with minimal spacing between castings. The fission chain multiplication process was initiated by a time tagged {sup 253}Cf spontaneously fissioning neutron source or time and directionally tagged neutrons from a small portable DT neutron generator and the prompt neutron time behavior measured with plastic scintillation detectors sensitive the fast neutron (>1 MeV) and gamma ray without distinction. These experiments were performed to provide data to benchmark methods for the calculation of the prompt neutron time behavior. Previous measurements with a single casting have been reported. This paper presents the experimental results for multiple castings. The prompt time decay was obtained by time coincidence correlation measurements between the detectors and the time tagged neutron source emission (equivalent to randomly pulsed neutron measurements) and between pairs of plastic scintillation detectors (equivalent to a 2-detector Rossi-alpha measurement). These standard HEU storage castings at the Y-12 plant had 5.000-in-OD, 3.500-in-ID, masses between 17,636 and 17,996 g, impurity content of 992 ppm, density of 18.75 g/cm{sup 3} and average enrichment of 93.16 wt % {sup 235}U. The castings were in tight fitting 025-in.-thick, 8.0-in-high stainless steel (SS-304) cylindrical cans for contamination control which were 8.0 in high. One can had an inside diameter of 3.0 in so that the Cf source could be located on the axes of this casting. Four 1 x 1 x 6 in plastic scintillators with the long dimension perpendicular to axes of the castings and adjacent to the outer surface of the casting cans were used. The detectors were enclosed in 1/4.-in.-thick lead shields on four 1 x 6 surfaces and on the 1 x 1 surface. The small surface of the lead shield was adjacent to the steel table. The photograph of the assembly of 5 casting with the detectors is given in Figure 1. The DT generator can be seen in the back with the time tagged neutrons aligned symmetrically around a line drawn from the generator through target spot and the center of the casting in the annular can seen in the foreground.

  14. Structuring Materials on Multiple Length Scales for Energy Application...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Structuring Materials on Multiple Length Scales for Energy Applications October 25, 2012 at 3pm36-428 Adreas Stein Department of Chemistry, University of Minnesota astein...

  15. Project Profile: CSP Energy Storage Solutions - Multiple Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Profile: CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to...

  16. Matrix multiplication operations with data pre-conditioning in...

    Office of Scientific and Technical Information (OSTI)

    operations with data pre-conditioning in a high performance computing architecture Citation Details In-Document Search Title: Matrix multiplication operations with...

  17. Matrix multiplication operations with data pre-conditioning in...

    Office of Scientific and Technical Information (OSTI)

    Matrix multiplication operations with data pre-conditioning in a high performance computing architecture Eichenberger, Alexandre E; Gschwind, Michael K; Gunnels, John A Mechanisms...

  18. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

  19. Multiplicities of Pfaffian Intersections, and the Lojasiewicz Inequality ...

    E-Print Network [OSTI]

    1910-00-40

    and the exponents in the Lojasiewicz inequalities for Pfaffian functions. For the intersections defined by sparse polynomials, the multiplicities outside the.

  20. Wireless Relay Communication System for Multiple Small Robots

    E-Print Network [OSTI]

    Baumgartner, Jeremy Gordon

    2015-01-01

    Stef DiPierro. Unmanned aerial vehicle (uav) communicationsof multiple unmanned aerial vehicles (UAVs). The resultsmultiple small unmanned aerial vehicles (UAVs) in order to

  1. A Combinatorial Auction with Multiple Winners for Universal Service

    E-Print Network [OSTI]

    Kelly, Frank

    . The auction incorporates synergies by permitting all combinatorial bids, is transparent to the bidders, allows was that of a simultaneous multiple­round auctio

  2. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2013-07-01

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  3. Multiple shock initiation of LX-17

    SciTech Connect (OSTI)

    Tarver, C.M.; Cook, T.M.; Urtiew, P.A.; Tao, W.C.

    1993-07-01

    The response of the insensitive TATB-based high explosive LX-17 to multiple shock impacts is studied experimentally in a four inch gas gun using embedded manganin gauges and numerically using the ignition and growth reactive flow model of shock initiation and detonation. Pressure histories are reported for LX-17 cylinders which are subjected to sustained shock pulses followed by secondary compressions from shocks reflected from metal discs attached to the backs of the explosive targets. These measured and calculated pressure histories show that the threshold for hot spot growth in LX-17 is 7 GPa, that LX-17 can be dead pressed at slightly lower pressures, and that the reaction rates behind reflected shocks increase greatly as the impedance of the metal increases. A study of the response of LX-17 to the collision of two reacting, diverging shocks forming a Mach stem wave inside the LX-17 charge demonstrated that this interaction can result in a high pressure region of sufficient size and strength to cause detonation under certain conditions.

  4. Nanoparticles modified with multiple organic acids

    DOE Patents [OSTI]

    Cook, Ronald Lee (Lakewood, CO); Luebben, Silvia DeVito (Golden, CO); Myers, Andrew William (Arvada, CO); Smith, Bryan Matthew (Boulder, CO); Elliott, Brian John (Superior, CO); Kreutzer, Cory (Brighton, CO); Wilson, Carolina (Arvada, CO); Meiser, Manfred (Aurora, CO)

    2007-07-17

    Surface-modified nanoparticles of boehmite, and methods for preparing the same. Aluminum oxyhydroxide nanoparticles are surface modified by reaction with selected amounts of organic acids. In particular, the nanoparticle surface is modified by reactions with two or more different carboxylic acids, at least one of which is an organic carboxylic acid. The product is a surface modified boehmite nanoparticle that has an inorganic aluminum oxyhydroxide core, or part aluminum oxyhydroxide core and a surface-bonded organic shell. Organic carboxylic acids of this invention contain at least one carboxylic acid group and one carbon-hydrogen bond. One embodiment of this invention provides boehmite nanoparticles that have been surface modified with two or more acids one of which additional carries at least one reactive functional group. Another embodiment of this invention provides boehmite nanoparticles that have been surface modified with multiple acids one of which has molecular weight or average molecular weight greater than or equal to 500 Daltons. Yet, another embodiment of this invention provides boehmite nanoparticles that are surface modified with two or more acids one of which is hydrophobic in nature and has solubility in water of less than 15 by weight. The products of the methods of this invention have specific useful properties when used in mixture with liquids, as filler in solids, or as stand-alone entities.

  5. Multiple connection for an undersea cable system

    SciTech Connect (OSTI)

    Guazzo, L.; Trezeguet, J.P.

    1984-05-08

    A multiple connection is claimed for connecting a plurality of armored cables to the housing of electrical apparatus in an undersea system having a cable interconnection point where a plurality of cables serving different destinations are brought together. Each of these cables comprise a core surrounded by armor and are terminated by a length of bared core extending beyond a severed end of the armor. The housing has a hollow cable-fixing part through which the bared cable cores pass, characterized in that said connection comprises: a steel binding ring through which the armored portion of each of said cables, is threaded, said ring serving to bind said armored portions of cable together; a steel tube threaded over said bared cores of said cables, having one end abutting against severed end portions of the armor of said cables and having its other end fixed mechanically to said hollow cable-fixing part of the electrical apparatus housing; and auxiliary armor wound around the portions of armored cable bound together by said ring and around the adjacent portion of said steel tube.

  6. Multiple capillary biochemical analyzer with barrier member

    DOE Patents [OSTI]

    Dovichi, Norman J. (Edmonton, CA); Zhang, Jian Z. (Edmonton, CA)

    1996-01-01

    A multiple capillary biochemical analyzer for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal to noise ratio.

  7. Multiple capillary biochemical analyzer with barrier member

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1996-10-22

    A multiple capillary biochemical analyzer is disclosed for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal-to-noise ratio. 12 figs.

  8. Multiple Membranes in M-theory

    E-Print Network [OSTI]

    Jonathan Bagger; Neil Lambert; Sunil Mukhi; Constantinos Papageorgakis

    2012-07-14

    We review developments in the theory of multiple, parallel membranes in M-theory. After discussing the inherent difficulties pertaining to a maximally supersymmetric lagrangian formulation with the appropriate field content and symmetries, we discuss how introducing the concept of 3-algebras allows for such a description. Different choices of 3-algebras lead to distinct classes of 2+1 dimensional theories with varying degrees of supersymmetry. We then describe how these are equivalent to a type of conventional superconformal Chern-Simons gauge theories at level k, coupled to bifundamental matter. Analysing the physical properties of these theories leads to the identification of a certain subclass of models with configurations of M2-branes in Z_k orbifolds of M-theory. In addition these models give rise to a whole new sector of the gauge/gravity duality in the form of an AdS_4/CFT_3 correspondence. We also discuss mass deformations, higher derivative corrections as well as the possibility of extracting information about M5-brane physics.

  9. Iterative Water-filling for Gaussian Vector Multiple Access Channels

    E-Print Network [OSTI]

    Li, Tiffany Jing

    Iterative Water-filling for Gaussian Vector Multiple Access Channels W. Yu, W. Rhee, S. Boyd, and J. Cioffi Zhenlei Shen Lehigh University March 29, 2005 Zhenlei Shen (Lehigh) Iterative Water-filling for Gaussian Vector Multiple Access ChannelsMarch 29, 2005 1 / 13 #12;1 Quick Review 2 Iterative Water

  10. Normal Basis Multiplication Algorithms for GF(2n ) (Full Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Normal Basis Multiplication Algorithms for GF(2n ) (Full Version) Haining Fan, Duo Liu and Yiqi. fan_haining@yahoo.com Abstract - In this paper, we propose a new normal basis multiplication algorithm for GF(2n ). This algorithm can be used to design not only fast software algorithms but also low

  11. Multiple Regression Introduction to Statistics Using R (Psychology 9041B)

    E-Print Network [OSTI]

    Gribble, Paul

    Multiple Regression Introduction to Statistics Using R (Psychology 9041B) Paul Gribble Winter, 2015 1 Correlation, Regression & Multiple Regression 1.1 Bivariate correlation The Pearson product*r*(N-2)) / (1-(r*r)) > pobs Fobs 1 #12;Intro Stats R 1 Correlation, Regression

  12. Math 261A -Spring 2012 M. Bremer Multiple Linear Regression

    E-Print Network [OSTI]

    Keinan, Alon

    Math 261A - Spring 2012 M. Bremer Multiple Linear Regression So far, we have seen the concept of simple linear regression where a single predictor variable X was used to model the response variable Y . In many applications, there is more than one factor that influences the response. Multiple regression

  13. Sequence Assembly Validation by Multiple Restriction Digest Fragment Coverage Analysis

    E-Print Network [OSTI]

    Rouchka, Eric

    Sequence Assembly Validation by Multiple Restriction Digest Fragment Coverage Analysis Eric C the possibility of analyzing multiple, independent restriction digests as a method for testing the fidelity of the fragment assembly is highly desirable. Comparison of predicted and experimental restriction digests has

  14. The Energy Harvesting Multiple Access Channel with Energy Storage Losses

    E-Print Network [OSTI]

    Yener, Aylin

    The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

  15. Optimal Multiple Assignments with (,)-Scheme for General Access Structures

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Optimal Multiple Assignments with (,)-Scheme for General Access Structures Qiang Li, Xiangxue Li to construct an optimal multiple assignment with threshold schemes for general access structure. In this paper the values of either 0 or 1. We also show that given a complete access structure, an optimal scheme may

  16. Multiple Roles for GIS in US Global Change Research

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    Multiple Roles for GIS in US Global Change Research: Annotated Bibliography Compiled by Ashton: Multiple Roles for GIS in US Global Change Research. The bibliography consists of an annotated collection of articles concerned with the application of GIS in global change research. These papers range from reviewed

  17. Spectral phase encoded time spread optical code division multiple

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    -CDMA, efficient and compact W-CDMA chip develop- ment allowed rapid market-driven transition from the conventionalSpectral phase encoded time spread optical code division multiple access technology for next and summarize the progress of the spectral phase encoded time spreading (SPECTS) optical code division multiple

  18. SEMANTIC DATA INTEGRATION IN A MULTIPLE REPRESENTATION ENVIRONMENT

    E-Print Network [OSTI]

    Köbben, Barend

    SEMANTIC DATA INTEGRATION IN A MULTIPLE REPRESENTATION ENVIRONMENT J.E. Stotera , R.L.G. Lemmensa in a multiple representation environment. Important principles of this environment are 1) the data sets of a new technology in the semantic data integration process of different data sets: machine ontology using

  19. Impact of Misalignment of Trading Agent Strategy across Multiple Markets

    E-Print Network [OSTI]

    McBurney, Peter

    examine the effect of a market pricing policy designed to attract high-valued traders in a multiple market market's policies. Keywords: market design, trading strategy, market selection strategy, multiple markets market due to analytical complexity. The CAT market design competition [9] is aimed at encouraging more

  20. Multiple ERK substrates execute single biological processes in Caenorhabditis elegans

    E-Print Network [OSTI]

    Multiple ERK substrates execute single biological processes in Caenorhabditis elegans germ, 2008) RAS-extracellular signal regulated kinase (ERK) signaling governs multiple aspects of cell fate. Understanding how perturbations to the ERK signaling pathway lead to developmental disorders and cancer hinges

  1. Montgomery Modular Multiplication on ARM-NEON Revisited

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Montgomery Modular Multiplication on ARM-NEON Revisited Hwajeong Seo1 , Zhe Liu2 , Johann Großsch-based cryptosystems. The increased prevalence of SIMD-type instructions in commodity processors (e.g. Intel SSE, ARM modular multiplication on ARM-NEON platforms. Detailed benchmarking results obtained on an ARM Cortex-A9

  2. Investigation of Automated Feature Extraction Using Multiple Data Sources

    E-Print Network [OSTI]

    Theiler, James

    multiple data sources and 3) fusion of results from multiple individual data sources. Keywords: supervised classification, data fusion, support vector machines, feature extraction, machine learning, multispectral 1 of data fusion is a hot-bed of activity. It is the aim of data fusion to integrate the data available from

  3. Multiplicative colored noise in linearized models of biochemical reaction networks

    E-Print Network [OSTI]

    Ingalls, Brian

    Multiplicative colored noise in linearized models of biochemical reaction networks Matthew Scott is often modeled by white noise, though results obtained in this fashion tend to overstate the effect to a model of bacterial chemotaxis with multiple explicit noise sources. The frequency response

  4. Automatic Error Elimination by Horizontal Code Transfer across Multiple Applications

    E-Print Network [OSTI]

    Polz, Martin

    Automatic Error Elimination by Horizontal Code Transfer across Multiple Applications Stelios CSAIL, Cambridge, MA, USA Abstract We present Code Phage (CP), a system for automatically transferring. To the best of our knowledge, CP is the first system to automatically transfer code across multiple

  5. Independent Control of Multiple Magnetic Microrobots in Three Dimensions

    E-Print Network [OSTI]

    Sitti, Metin

    Independent Control of Multiple Magnetic Microrobots in Three Dimensions Eric Diller, Joshua method to independently control multiple sub-mm microrobots in three dimen- sions (3D) using magnetic of geometrically or magnetically distinct microrobots which assume different magnetization directions in a rotating

  6. Multiple differential cryptanalysis of round-reduced PRINCE (Full version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiple differential cryptanalysis of round-reduced PRINCE (Full version) Anne Canteaut1 , Thomas, France Abstract. PRINCE is a lightweight block cipher proposed by Borghoff et al. at Asiacrypt 2012. Due attacks. Our attack uses multiple differen- tials and exploits some properties of PRINCE for recovering

  7. Control of Multiple Robotic Sentry Vehicles

    SciTech Connect (OSTI)

    Feddema, J.; Klarer, P.; Lewis, C.

    1999-04-01

    As part of a project for the Defense Advanced Research Projects Agency, Sandia National Laboratories is developing and testing the feasibility of using of a cooperative team of robotic sentry vehicles to guard a perimeter and to perform surround and diversion tasks. This paper describes on-going activities in the development of these robotic sentry vehicles. To date, we have developed a robotic perimeter detection system which consists of eight ''Roving All Terrain Lunar Explorer Rover'' (RATLER{trademark}) vehicles, a laptop-based base-station, and several Miniature Intrusion Detection Sensors (MIDS). A radio frequency receiver on each of the RATLER vehicles alerts the sentry vehicles of alarms from the hidden MIDS. When an alarm is received, each vehicle decides whether it should investigate the alarm based on the proximity of itself and the other vehicles to the alarm. As one vehicle attends an alarm, the other vehicles adjust their position around the perimeter to better prepare for another alarm. We have also demonstrated the ability to drive multiple vehicles in formation via tele-operation or by waypoint GPS navigation. This is currently being extended to include mission planning capabilities. At the base-station, the operator can draw on an aerial map the goal regions to be surrounded and the repulsive regions to be avoided. A potential field path planner automatically generates a path from the vehicles' current position to the goal regions while avoiding the repulsive regions and the other vehicles. This path is previewed to the operator before the regions are downloaded to the vehicles. The same potential field path planner resides on the vehicle, except additional repulsive forces from on-board proximity sensors guide the vehicle away from unplanned obstacles.

  8. The Multiple Zeta Value Data Mine

    E-Print Network [OSTI]

    J. Blümlein; D. J. Broadhurst; J. A. M. Vermaseren

    2009-11-14

    We provide a data mine of proven results for multiple zeta values (MZVs) of the form $\\zeta(s_1,s_2,...,s_k)=\\sum_{n_1>n_2>...>n_k>0}^\\infty \\{1/(n_1^{s_1} >... n_k^{s_k})\\}$ with weight $w=\\sum_{i=1}^k s_i$ and depth $k$ and for Euler sums of the form $\\sum_{n_1>n_2>...>n_k>0}^\\infty t\\{(\\epsilon_1^{n_1} >...\\epsilon_1 ^{n_k})/ (n_1^{s_1} ... n_k^{s_k}) \\}$ with signs $\\epsilon_i=\\pm1$. Notably, we achieve explicit proven reductions of all MZVs with weights $w\\le22$, and all Euler sums with weights $w\\le12$, to bases whose dimensions, bigraded by weight and depth, have sizes in precise agreement with the Broadhurst--Kreimer and Broadhurst conjectures. Moreover, we lend further support to these conjectures by studying even greater weights ($w\\le30$), using modular arithmetic. To obtain these results we derive a new type of relation for Euler sums, the Generalized Doubling Relations. We elucidate the "pushdown" mechanism, whereby the ornate enumeration of primitive MZVs, by weight and depth, is reconciled with the far simpler enumeration of primitive Euler sums. There is some evidence that this pushdown mechanism finds its origin in doubling relations. We hope that our data mine, obtained by exploiting the unique power of the computer algebra language {\\sc form}, will enable the study of many more such consequences of the double-shuffle algebra of MZVs, and their Euler cousins, which are already the subject of keen interest, to practitioners of quantum field theory, and to mathematicians alike.

  9. Karhunen-Loeve (PCA) based detection of multiple oscillations in multiple measurement signals from large-scale process plants

    E-Print Network [OSTI]

    Wickerhauser, M. Victor

    Karhunen-Lo´eve (PCA) based detection of multiple oscillations in multiple measurement signals from large-scale process plants P. F. Odgaard and M. V. Wickerhauser Abstract-- In the perspective of optimizing the control and operation of large scale process plants, it is important to detect and to locate

  10. Multiple pass and multiple layer friction stir welding and material enhancement processes

    DOE Patents [OSTI]

    Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

    2010-07-27

    Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

  11. High Multiplicity Searches at the LHC Using Jet Masses

    SciTech Connect (OSTI)

    Hook, Anson; /SLAC /Stanford U., Appl. Phys. Dept.; Izaguirre, Eder; /SLAC /Stanford U., Phys. Dept.; Lisanti, Mariangela; /Princeton U.; Wacker, Jay G.; /SLAC /Stanford U., ITP

    2012-04-24

    This article introduces a new class of searches for physics beyond the Standard Model that improves the sensitivity to signals with high jet multiplicity. The proposed searches gain access to high multiplicity signals by reclustering events into large-radius, or 'fat', jets and by requiring that each event has multiple massive jets. This technique is applied to supersymmetric scenarios in which gluinos are pair-produced and then subsequently decay to final states with either moderate quantities of missing energy or final states without missing energy. In each of these scenarios, the use of jet mass improves the estimated reach in gluino mass by 20% to 50% over current LHC searches.

  12. Studies of multiplicity in relativistic heavy-ion collisions

    E-Print Network [OSTI]

    B. B. Back

    2004-11-29

    In this talk I'll review the present status of charged particle multiplicity measurements from heavy-ion collisions. The characteristic features of multiplicity distributions obtained in Au+Au collisions will be discussed in terms of collision centrality and energy and compared to those of p+p collisions. Multiplicity measurements of d+Au collisions at 200 GeV nucleon-nucleon center-of-mass energy will also be discussed. The results will be compared to various theoretical models and simple scaling properties of the data will be identified.

  13. Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on

    E-Print Network [OSTI]

    OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having access to relevant weather and climate data is essential for developing appropriate planning, risk

  14. Orientation Estimation for Multiple Large Fractures by Scattering Energy

    E-Print Network [OSTI]

    Zhang, Yang

    2006-01-01

    We have done the numerical modeling of seismic response to multiple sets of vertical large fractures by using finite-difference method (FD), which can easily handle media with monoclinic anisotropy. We consider three types ...

  15. Multiplexed photography : single-exposure capture of multiple camera settings

    E-Print Network [OSTI]

    Green, Paul Elijah

    2009-01-01

    The space of camera settings is large and individual settings can vary dramatically from scene to scene. This thesis explores methods for capturing and manipulating multiple camera settings in a single exposure. Multiplexing ...

  16. LOCALIZATION OF MULTIPLE TYPES OF JET NOISE SOURCES Dimitri Papamoschou

    E-Print Network [OSTI]

    Papamoschou, Dimitri

    source location using cross-correlations of multiple microphone signals was established by Billingsley was extended by Lee et al.6 who conducted a parametric study of noise source distribution versus jet

  17. Optimal Multiple Description Transform Coding of Gaussian Vectors

    E-Print Network [OSTI]

    Goyal, Vivek K

    after the inception of information theory, techniques for source and chan- nel coding developed- ination of Shannon's result leads to the primary motivating factor for constructing joint source IEEE Includes minor corrections. Abstract Multiple description coding (MDC) is source coding

  18. Chaos anti-synchronization in multiple time delay power systems

    E-Print Network [OSTI]

    Elman Shahverdiev

    2015-09-20

    We elucidate conditions for chaos anti-synchronization between two uni-directionally coupled multiple time delay power systems. The results are of some importance to prevent power black-out in the entire power grid.

  19. Real-Time Networked Control with Multiple Clients 

    E-Print Network [OSTI]

    Lee, Minhyung

    2010-01-14

    In this thesis closed-loop control strategies over a communication network with multiple clients are developed. To accomplish this objective, a steel-ball magnetic-levitation system, a DC motor speed-control system, and ...

  20. Multiple scattering of classical waves: microscopy, mesoscopy, and diffusion 

    E-Print Network [OSTI]

    van Rossum, Mark; Nieuwenhuizen, Th.M

    1999-01-01

    A tutorial discussion of the propagation of waves in random media is presented. To a first approximation the transport of the multiple scattered waves is given by diffusion theory, but important corrections are presented. ...