National Library of Energy BETA

Sample records for multiple unspecified vulnerabilities

  1. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  2. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  3. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  4. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  5. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  6. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  7. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  8. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  9. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  10. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  11. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  12. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  13. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  14. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  15. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  16. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  17. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  18. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  19. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  20. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  1. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  2. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  3. U-035: Adobe Flash Player Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Impact: Multiple vulnerabilities have been reported in Adobe ...

  4. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  5. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  6. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  7. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  8. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  9. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  10. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  11. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  12. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  13. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  14. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  15. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  16. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  17. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  18. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  19. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  20. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  1. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  2. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  3. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  4. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  5. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur.

  6. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  7. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  8. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  9. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  10. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  11. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  12. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  13. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  14. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  15. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  16. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  17. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  18. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  19. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  20. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  1. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  2. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  3. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  4. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  5. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  6. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  7. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  8. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  9. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  10. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  11. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  12. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-179: IBM Java 7 Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  13. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  14. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  15. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis...

  16. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April ... Addthis Related Articles V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities ...

  17. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, ... T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities V-145: IBM ...

  18. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-122: IBM Tivoli Application...

  19. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  20. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  1. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  2. V-028: Splunk Multiple Cross-Site Scripting and Denial of Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    28: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 -...

  3. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, ...

  4. T-657: Drupal Prepopulate- Multiple vulnerabilities

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  5. U-191: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes. This Critical Patch Update contains 14 new security fixes across Java SE products.

  6. V-214: Mozilla Firefox Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors....

  7. U-100: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  8. V-132: IBM Tivoli System Automation Application Manager Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security

  9. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  10. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  11. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  12. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  13. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  14. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    Solar Thermal Process Heat Solar Water Heat Energy Storage Wind Yes Public Sector Energy Efficiency Aggregation Program State Grant Program Illinois Fed. Government Institutional...

  15. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are

  16. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  17. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  18. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  19. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 -...

  20. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  1. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl

  2. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  3. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  4. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  5. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  6. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  7. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  8. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  9. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to...

  10. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. T-597: WordPress Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to perform unauthorized actions in the context of the logged-in user, crash the affected application and therefore deny service to legitimate users, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials or launch other attacks.

  12. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  13. V-105: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    navigation handling. 3) An error in Web Audio can be exploited to cause memory corruption. 4) A use-after-free error exists in SVG animations. 5) An error in Indexed DB can...

  14. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  15. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  16. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 45: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1

  17. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... However, regional variation does not imply regional ... Federal, state, and local governments and the ... climate-resilient, assessment of vulnerabilities in ...

  18. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  19. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. ...

  20. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    ... products alike, and the introduction of Web applications into SCADA systems has created ... vulnerabilities Most likely attack vector Web Human-Machine Interface (HMI) ...

  1. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  2. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  3. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  4. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  7. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  8. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  9. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  10. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  11. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  12. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  13. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  14. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  15. Vulnerability Analysis of Energy Delivery Control Systems (September...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared ...

  16. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document ...

  17. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need ...

  18. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by ...

  19. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides ...

  20. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  1. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  2. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  3. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  4. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  5. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  6. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  7. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  8. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  9. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  10. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  11. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  12. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  13. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  14. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  15. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  16. Multiplicity Counting

    SciTech Connect (OSTI)

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  17. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  18. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  19. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  20. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  1. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  2. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  3. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  4. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  7. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  8. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  9. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  11. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  12. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  13. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  14. Vulnerability Analysis of Energy Delivery Control Systems - 2011...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy ... (DOEOE) National Supervisory Control and Data Acquisition (SCADA) Test Bed ...

  15. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  16. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  17. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  18. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  19. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  20. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  1. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  2. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  3. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  4. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  5. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  6. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  7. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  8. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  9. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  10. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  11. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon Top 10

  12. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible.

  13. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  14. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  15. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  16. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  17. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  18. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  19. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  20. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  1. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  2. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - ... Configuration and Execute Arbitrary Code T-622: Adobe Acrobat and Reader Unspecified ...

  3. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  4. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  5. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Energy Savers [EERE]

    Server Cross-Site Scripting Vulnerability | Department of Energy 11: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A

  8. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  9. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  10. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  11. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  12. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  13. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  14. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  15. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  16. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Energy Savers [EERE]

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  17. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  18. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials that could be used for a nuclear weapon or radiological dispersal device (RDD), or "dirty bomb". Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify,

  19. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  20. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  1. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without

  2. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  3. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    Applying current guidance and practices for common-cause failure (CCF) mitigation to digital instrumentation and control (I&C) systems has proven problematic, and the regulatory environment has been unpredictable. The potential for CCF vulnerability inhibits I&C modernization, thereby challenging the long-term sustainability of existing plants. For new plants and advanced reactor concepts, concern about CCF vulnerability in highly integrated digital I&C systems imposes a design burden that results in higher costs and increased complexity. The regulatory uncertainty in determining which mitigation strategies will be acceptable (e.g., what diversity is needed and how much is sufficient) drives designers to adopt complicated, costly solutions devised for existing plants. To address the conditions that constrain the transition to digital I&C technology by the US nuclear industry, crosscutting research is needed to resolve uncertainty, demonstrate necessary characteristics, and establish an objective basis for qualification of digital technology for nuclear power plant (NPP) I&C applications. To fulfill this research need, Oak Ridge National Laboratory is investigating mitigation of CCF vulnerability for nuclear-qualified applications. The outcome of this research is expected to contribute to a fundamentally sound, comprehensive basis to qualify digital technology for nuclear power applications. This report documents the development of a CCF taxonomy. The basis for the CCF taxonomy was generated by determining consistent terminology and establishing a classification approach. The terminology is based on definitions from standards, guides, and relevant nuclear power industry technical reports. The classification approach is derived from identified classification schemes focused on I&C systems and key characteristics, including failure modes. The CCF taxonomy provides the basis for a systematic organization of key systems aspects relevant to analyzing the potential for CCF vulnerability and the suitability of mitigation techniques. Development of an effective CCF taxonomy will help to provide a framework for establishing the objective analysis and assessment capabilities desired to facilitate rigorous identification of fault types and triggers that are the fundamental elements of CCF.

  4. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considered subject to demand concerns, supply concerns, or both demand and supply concerns.

  5. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  6. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  7. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  8. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  9. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  10. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  11. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  12. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  13. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  14. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  15. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  16. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  17. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  18. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  19. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  20. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  1. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  2. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  4. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  5. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  6. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  7. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  8. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  9. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  10. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  11. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  12. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  13. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  14. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  15. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W.

    2011-04-08

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  16. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  17. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  18. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W.

    1994-01-01

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  19. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, T.W.

    1994-09-06

    A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

  20. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

  1. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  2. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  3. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  4. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  5. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  6. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

    Broader source: Energy.gov [DOE]

    McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

  7. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  8. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resilience Solutions | Department of Energy Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser. This report examines the current and potential future impacts of climate change and extreme weather on the U.S. energy sector at the regional level. It provides illustrative

  9. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  10. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  11. Multiple shell fusion targets

    DOE Patents [OSTI]

    Lindl, J.D.; Bangerter, R.O.

    1975-10-31

    Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

  12. Photovoltaics: Separating Multiple Excitons

    SciTech Connect (OSTI)

    Nozik, A. J.

    2012-05-01

    Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

  13. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, Jr., Harry K.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  14. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  15. Comparison with Carrier Multiplication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complete Theory of Down-Conversion, and a Comparison with Carrier Multiplication 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 22 24 26 28 30 32 34 Measured Quantum Efficiency (QE) Efficiency [%] with Down-Conversion Single- Junction Threshold Solar Cell 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 Peak Efficiency [%] Splitting Multiplicity (M) C=max C=1000 C=100 C=1 C=10 Down Conversion Carrier Multiplication Ze'ev R. Abrams, Avi Niv, Majid Gharghi, Chris Gladden & Xiang Zhang Materials Science

  16. Multiple sort flow cytometer

    DOE Patents [OSTI]

    Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

    1996-01-01

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

  17. Multiple sort flow cytometer

    DOE Patents [OSTI]

    Engh, G. van den; Esposito, R.J.

    1996-01-09

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane. 8 figs.

  18. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  19. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  20. Multiple gap photovoltaic device

    DOE Patents [OSTI]

    Dalal, Vikram L.

    1981-01-01

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  1. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  2. Portable multiplicity counter

    DOE Patents [OSTI]

    Newell, Matthew R.; Jones, David Carl

    2009-09-01

    A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

  3. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect (OSTI)

    Singleton, M

    2009-07-08

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

  4. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  5. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  6. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  7. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  8. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  9. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  10. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  11. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  12. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  13. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, Norman J.; Zhang, Jian Z.

    1995-01-01

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibres to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands.

  14. Multiple-port valve

    DOE Patents [OSTI]

    Doody, Thomas J.

    1978-08-22

    A multiple-port valve assembly is designed to direct flow from a primary conduit into any one of a plurality of secondary conduits as well as to direct a reverse flow. The valve includes two mating hemispherical sockets that rotatably receive a spherical valve plug. The valve plug is attached to the primary conduit and includes diverging passageways from that conduit to a plurality of ports. Each of the ports is alignable wih one or more of a plurality of secondary conduits fitted into one of the hemispherical sockets. The other hemispherical socket includes a slot for the primary conduit such that the conduit's motion along that slot with rotation of the spherical plug about various axes will position the valve-plug ports in respect to the secondary conduits.

  15. Multiple layer insulation cover

    DOE Patents [OSTI]

    Farrell, James J.; Donohoe, Anthony J.

    1981-11-03

    A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

  16. MULTIPLE SPARK GAP SWITCH

    DOE Patents [OSTI]

    Schofield, A.E.

    1958-07-22

    A multiple spark gap switch of unique construction is described which will permit controlled, simultaneous discharge of several capacitors into a load. The switch construction includes a disc electrode with a plurality of protuberances of generally convex shape on one surface. A firing electrode is insulatingly supponted In each of the electrode protuberances and extends substantially to the apex thereof. Individual electrodes are disposed on an insulating plate parallel with the disc electrode to form a number of spark gaps with the protuberances. These electrodes are each connected to a separate charged capacitor and when a voltage ls applied simultaneously between the trigger electrodes and the dlsc electrode, each spark gap fires to connect its capacitor to the disc electrode and a subsequent load.

  17. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis Acknowledgements This report was produced by the U.S. Department of Energy's Office of Energy Policy and Systems Analysis (DOE-EPSA) under the direction of Craig Zamuda. Matt Antes, C.W. Gillespie, Anna Mosby, and Beth Zotter of Energetics Incorporated provided analysis, drafting support, and technical editing.

  18. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  19. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  20. Vulnerability and adaptation to severe weather events in the American southwest

    SciTech Connect (OSTI)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptation to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.

  1. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  2. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  3. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  4. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  5. Multiple stage railgun

    DOE Patents [OSTI]

    Hawke, Ronald S.; Scudder, Jonathan K.; Aaland, Kristian

    1982-01-01

    A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

  6. MULTIPLE SHAFT TOOL HEAD

    DOE Patents [OSTI]

    Colbert, H.P.

    1962-10-23

    An improved tool head arrangement is designed for the automatic expanding of a plurality of ferruled tubes simultaneously. A plurality of output shafts of a multiple spindle drill head are driven in unison by a hydraulic motor. A plurality of tube expanders are respectively coupled to the shafts through individual power train arrangements. The axial or thrust force required for the rolling operation is provided by a double acting hydraulic cylinder having a hollow through shaft with the shaft cooperating with an internally rotatable splined shaft slidably coupled to a coupling rigidly attached to the respectlve output shaft of the drill head, thereby transmitting rotary motion and axial thrust simultaneously to the tube expander. A hydraulic power unit supplies power to each of the double acting cylinders through respective two-position, four-way valves, under control of respective solenoids for each of the cylinders. The solenoids are in turn selectively controlled by a tool selection control unit which in turn is controlled by signals received from a programmed, coded tape from a tape reader. The number of expanders that are extended in a rolling operation, which may be up to 42 expanders, is determined by a predetermined program of operations depending upon the arrangement of the ferruled tubes to be expanded in the tube bundle. The tape reader also supplies dimensional information to a machine tool servo control unit for imparting selected, horizontal and/or vertical movement to the tool head assembly. (AEC)

  7. Sigmund and WInterbon Multiple Scattering

    Energy Science and Technology Software Center (OSTI)

    1985-03-01

    SWIMS calculates the angular dispersion of ion beams that undergo small-angle, incoherent multiple scattering by gaseous or solid media.

  8. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  9. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  10. Multiple Motivations Institutional Change Principle

    Broader source: Energy.gov [DOE]

    The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

  11. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  12. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  13. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  14. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  15. Groundwaters of Florence (Italy): Trace element distribution and vulnerability of the aquifers

    SciTech Connect (OSTI)

    Bencini, A.; Ercolanelli, R.; Sbaragli, A.

    1993-11-01

    Geochemical and hydrogeological research has been carried out in Florence, to evaluate conductivity and main chemistry of groundwaters, the pattern of some possible pollutant chemical species (Fe, Mn, Cr, Cu, Pb, Zn, NO{sub 2}, NO{sub 3}), and the vulnerability of the aquifers. The plain is made up of Plio-Quaternary alluvial and lacustrine sediments for a maximum thickness of 600 m. Silts and clays, sometimes with lenses of sandy gravels, are dominant, while considerable deposits of sands, pebbles, and gravels occur along the course of the Arno river and its tributary streams, and represent the most important aquifer of the plain. Most waters show conductivity values around 1000-1200 {mu}S, and almost all of them have an alkaline-earth-bicarbonate chemical character. In western areas higher salt content of the groundwaters is evident. Heavy metal and NO{sub 2}, NO{sub 3} analyses point out that no important pollution phenomena affect the groundwaters; all mean values are below the maximum admissible concentration (MAC) for drinkable waters. Some anomalies of NO{sub 2}, NO{sub 3}, Fe, Mn, and Zn are present. The most plausible causes can be recognized in losses of the sewage system; use of nitrate compounds in agriculture; oxidation of well pipes. All the observations of Cr, Cu, and Pb are below the MAC; the median values of <3, 3.9, and 1.1 {mu}g/l, respectively, could be considered reference concentrations for groundwaters in calcareous lithotypes, under undisturbed natural conditions. Finally, a map of vulnerability shows that the areas near the Arno river are highly vulnerable, for the minimum thickness (or lacking) of sediments covering the aquifer. On the other hand, in the case of pollution, several factors not considered could significantly increase the self-purification capacity of the aquifer, such asdilution of groundwaters, bacteria oxidation of nitrogenous species, and sorption capacity of clay minerals and organic matter. 31 refs., 6 figs., 5 tabs.

  16. Vulnerability of Karangkates dams area by means of zero crossing analysis of data magnetic

    SciTech Connect (OSTI)

    Sunaryo, E-mail: sunaryo.geofis.ub@gmail.com; Susilo, Adi

    2015-04-24

    Study with entitled Vulnerability Karangkates Dam Area By Means of Zero Crossing Analysis of Data Magnetic has been done. The study was aimed to obtain information on the vulnerability of two parts area of Karangkates dams, i.e. Lahor dam which was inaugurated in 1977 and Sutami dam inaugurated in 1981. Three important things reasons for this study are: 1). The dam age was 36 years old for Lahor dam and 32 years old for Sutami dam, 2). Geologically, the location of the dams are closed together to the Pohgajih local shear fault, Selorejo local fault, and Selorejo limestone-andesite rocks contact plane, and 3). Karangkates dams is one of the important Hydro Power Plant PLTA with the generating power of about 400 million KWH per year from a total of about 29.373MW installed in Indonesia. Geographically, the magnetic data acquisition was conducted at coordinates (112.4149oE;-8.2028oS) to (112.4839oE;-8.0989oS) by using Proton Precession Magnetometer G-856. Magnetic Data acquisition was conducted in the radial direction from the dams with diameter of about 10 km and the distance between the measurements about 500m. The magnetic data acquisition obtained the distribution of total magnetic field value in the range of 45800 nT to 44450 nT. Residual anomalies obtained by doing some corrections, including diurnal correction, International Geomagnetic Reference Field (IGRF) correction, and reductions so carried out the distribution of the total magnetic field value in the range of -650 nT to 700 nT. Based on the residual anomalies, indicate the presence of 2 zones of closed closures dipole pairs at located in the west of the Sutami dam and the northwest of the Lahor dam from 5 total zones. Overlapping on the local geological map indicated the lineament of zero crossing patterns in the contour of residual anomaly contour with the Pohgajih shear fault where located at about 4 km to the west of the Sutami dam approximately and andesite-limestone rocks contact where located at about 6 km to the west of the Lahor dam approximately. These shown a possible of vulnerability on geohazards at the west zone of the Karangkates (Lahor-Sutami) dams area if there are triggers by the vibration (earthquake) on the Pohgajih shear fault, andesite-limestone contact plane, and instability rocks on two zones of closed closure dipole pairs area. Reality, on the location of the study shown some local landslide at the several locations and the main road that need considering for disaster mitigation.

  17. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  18. Multiple resonant railgun power supply

    DOE Patents [OSTI]

    Honig, E.M.; Nunnally, W.C.

    1985-06-19

    A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

  19. Multiple resonant railgun power supply

    DOE Patents [OSTI]

    Honig, Emanuel M. (Los Alamos, NM); Nunnally, William C. (Los Alamos, NM)

    1988-01-01

    A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

  20. Coexistence of multiple metastable polytypes in rhombohedral...

    Office of Scientific and Technical Information (OSTI)

    Coexistence of multiple metastable polytypes in rhombohedral bismuth Citation Details In-Document Search Title: Coexistence of multiple metastable polytypes in rhombohedral bismuth ...

  1. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but ...

  2. Multiple pass laser amplifier system

    DOE Patents [OSTI]

    Brueckner, Keith A.; Jorna, Siebe; Moncur, N. Kent

    1977-01-01

    A laser amplification method for increasing the energy extraction efficiency from laser amplifiers while reducing the energy flux that passes through a flux limited system which includes apparatus for decomposing a linearly polarized light beam into multiple components, passing the components through an amplifier in delayed time sequence and recombining the amplified components into an in phase linearly polarized beam.

  3. Multiple Exciton Generation Solar Cells

    SciTech Connect (OSTI)

    Luther, J. M.; Semonin, O. E.; Beard, M. C.; Gao, J.; Nozik, A. J.

    2012-01-01

    Heat loss is the major factor limiting traditional single junction solar cells to a theoretical efficiency of 32%. Multiple Exciton Generation (MEG) enables efficient use of the solar spectrum yielding a theoretical power conversion efficiency of 44% in solar cells under 1-sun conditions. Quantum-confined semiconductors have demonstrated the ability to generate multiple carriers but present-day materials deliver efficiencies far below the SQ limit of 32%. Semiconductor quantum dots of PbSe and PbS provide an active testbed for developing high-efficiency, inexpensive solar cells benefitting from quantum confinement effects. Here, we will present recent work of solar cells employing MEG to yield external quantum efficiencies exceeding 100%.

  4. Posters Radiation Singularities, Multiple Scattering

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Posters Radiation Singularities, Multiple Scattering and Diffusion in Multifractal Clouds P. Silas, G. Brösamlen, and S. Lovejoy Department of Physics McGill University Montreal, Quebec, Canada C. Naud and D. Schertzer Université Pierre and Marie Curie Paris, France B. Watson Department of Physics St. Lawrence University Canton, New York Diffusion on One-Dimensional Multifractals (P. Silas, S. Lovejoy, D. Schertzer) Many geophysical and atmospheric fields exhibit multifractal characteristics

  5. Multiple target laser ablation system

    DOE Patents [OSTI]

    Mashburn, Douglas N. (Knoxville, TN)

    1996-01-01

    A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film.

  6. Multiple target laser ablation system

    DOE Patents [OSTI]

    Mashburn, D.N.

    1996-01-09

    A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film. 3 figs.

  7. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

    SciTech Connect (OSTI)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-01

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

  8. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-01

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warmingmore » that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.« less

  9. Multiple piece turbine rotor blade

    DOE Patents [OSTI]

    Jones, Russell B; Fedock, John A

    2013-05-21

    A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

  10. Universality of Charged Multiplicity Distributions

    SciTech Connect (OSTI)

    Goulianos, K.; /Rockefeller U.

    1981-12-01

    The charged multiplicity distributions of the diffractive and non-diffractive components of hadronic interactions, as well as those of hadronic states produced in other reactions, are described well by a universal Gaussian function that depends only on the available mass for pionization, has a maximum at n{sub o} {approx_equal} 2M{sup 1/2}, where M is the available mass in GeV, and a peak to width ratio n{sub o}/D {approx_equal} 2.

  11. Recirculation in multiple wave conversions

    SciTech Connect (OSTI)

    Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

    2008-07-30

    A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

  12. Multiple channel programmable coincidence counter

    DOE Patents [OSTI]

    Arnone, Gaetano J.

    1990-01-01

    A programmable digital coincidence counter having multiple channels and featuring minimal dead time. Neutron detectors supply electrical pulses to a synchronizing circuit which in turn inputs derandomized pulses to an adding circuit. A random access memory circuit connected as a programmable length shift register receives and shifts the sum of the pulses, and outputs to a serializer. A counter is input by the adding circuit and downcounted by the seralizer, one pulse at a time. The decoded contents of the counter after each decrement is output to scalers.

  13. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  14. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  15. Multiple channel data acquisition system

    DOE Patents [OSTI]

    Crawley, H. Bert; Rosenberg, Eli I.; Meyer, W. Thomas; Gorbics, Mark S.; Thomas, William D.; McKay, Roy L.; Homer, Jr., John F.

    1990-05-22

    A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

  16. Multiple channel data acquisition system

    DOE Patents [OSTI]

    Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

    1990-05-22

    A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

  17. Multiple soil nutrient competition between plants, microbes,...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Multiple soil nutrient competition between plants, microbes, and mineral surfaces: model development, parameterization, and example applications in several...

  18. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  19. Detection of electromagnetic radiation using micromechanical multiple

    Office of Scientific and Technical Information (OSTI)

    quantum wells structures (Patent) | SciTech Connect Patent: Detection of electromagnetic radiation using micromechanical multiple quantum wells structures Citation Details In-Document Search Title: Detection of electromagnetic radiation using micromechanical multiple quantum wells structures An apparatus and method for detecting electromagnetic radiation employs a deflectable micromechanical apparatus incorporating multiple quantum wells structures. When photons strike the quantum-well

  20. Multiple-stage integrating accelerometer

    DOE Patents [OSTI]

    Devaney, Howard F. (Cedar Crest, NM)

    1986-01-01

    An accelerometer assembly is provided for use in activating a switch in response to multiple acceleration pulses in series. The accelerometer includes a housing forming a chamber. An inertial mass or piston is slidably disposed in the chamber and spring biased toward a first or reset position. A damping system is also provided to damp piston movement in response to first and subsequent acceleration pulses. Additionally, a cam, including a Z-shaped slot, and cooperating follower pin slidably received therein are mounted to the piston and the housing. The middle or cross-over leg of the Z-shaped slot cooperates with the follower pin to block or limit piston movement and prevent switch activation in response to a lone acceleration pulse. The switch of the assembly is only activated after two or more separate acceleration pulses are sensed and the piston reaches the end of the chamber opposite the reset position.

  1. Multiple-stage integrating accelerometer

    DOE Patents [OSTI]

    Devaney, H.F.

    1984-06-27

    An accelerometer assembly is provided for use in activating a switch in response to multiple acceleration pulses in series. The accelerometer includes a housing forming a chamber. An inertial mass or piston is slidably disposed in the chamber and spring biased toward a first or reset position. A damping system is also provided to damp piston movement in response to first and subsequent acceleration pulses. Additionally, a cam, including a Z-shaped slot, and cooperating follower pin slidably received therein are mounted to the piston and the housing. The middle or cross-over leg of the Z-shaped slot cooperates with the follower pin to block or limit piston movement and prevent switch activation in response to a lone acceleration pulse. The switch of the assembly is only activated after two or more separate acceleration pulses are sensed and the piston reaches the end of the chamber opposite the reset position.

  2. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect (OSTI)

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge-failure resilient network design problem (DRNDP). This problem entails the design of a directed multi-commodity flow network that is capable of fulfilling a specified percentage of demands in the event that any G arcs are destroyed, where G is a constant parameter. We present a formulation of DRNDP and solve it in a branch-column-cut framework. We present computational results.

  3. Multiple acousto-optic q-switch

    DOE Patents [OSTI]

    Deason, Vance A.

    1993-12-07

    An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

  4. Multiple acousto-optic q-switch

    DOE Patents [OSTI]

    Deason, Vance A.

    1993-01-01

    An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

  5. Multiscale Mathematics For Plasma Kinetics Spanning Multiple...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Multiscale Mathematics For Plasma Kinetics Spanning Multiple Collisionality Regimes Citation Details In-Document Search Title: Multiscale Mathematics For Plasma ...

  6. Multiple Motivations Institutional Change Principle | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple approaches are necessary for motivating people to change their behavior or to work more diligently on activities they are already practicing, such as recycling, ...

  7. Staged inoculation of multiple cyanobacterial photobioreactors

    DOE Patents [OSTI]

    Scott, Brendan; Meichel, George; Phillips-Kress, Jesse; Blanks, Jessica

    2015-09-01

    A method of rapid simultaneous inoculation of cyanobacteria to multiple commercial-scale closed photobioreactors for the production of a target molecule such as ethanol.

  8. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  9. Use of the HPI Model 2080 pulsed neutron detector at the LANSCE complex - vulnerabilities and counting statistics

    SciTech Connect (OSTI)

    Jones, K.W.; Browman, A.

    1997-01-01

    The BPI Model 2080 Pulsed Neutron Detector has been used for over seven years as an area radiation monitor and dose limiter at the LANSCE accelerator complex. Operating experience and changing environments over this time have revealed several vulnerabilities (susceptibility to electrical noise, paralysis in high dose rate fields, etc.). Identified vulnerabilities have been connected; these modifications include component replacement and circuit design changes. The data and experiments leading to these modifications will be presented and discussed. Calibration of the instrument is performed in mixed static gamma and neutron source fields. The statistical characteristics of the Geiger-Muller tubes coupled with significantly different sensitivity to gamma and neutron doses require that careful attention be paid to acceptable fluctuations in dose rate over time during calibration. The performance of the instrument has been modeled using simple Poisson statistics and the operating characteristics of the Geiger-Muller tubes. The results are in excellent agreement with measurements. The analysis and comparison with experimental data will be presented.

  10. PrimerDesign-M: A multiple-alignment based multiple-primer design...

    Office of Scientific and Technical Information (OSTI)

    for walking across variable genomes Prev Next Title: PrimerDesign-M: A multiple-alignment based multiple-primer design tool for walking across variable genomes You are ...

  11. PrimerDesign-M: A multiple-alignment based multiple-primer design...

    Office of Scientific and Technical Information (OSTI)

    for walking across variable genomes Prev Next Title: PrimerDesign-M: A multiple-alignment based multiple-primer design tool for walking across variable genomes Analyses of ...

  12. Neutron multiplication error in TRU waste measurements

    SciTech Connect (OSTI)

    Veilleux, John [Los Alamos National Laboratory; Stanfield, Sean B [CCP; Wachter, Joe [CCP; Ceo, Bob [CCP

    2009-01-01

    Total Measurement Uncertainty (TMU) in neutron assays of transuranic waste (TRU) are comprised of several components including counting statistics, matrix and source distribution, calibration inaccuracy, background effects, and neutron multiplication error. While a minor component for low plutonium masses, neutron multiplication error is often the major contributor to the TMU for items containing more than 140 g of weapons grade plutonium. Neutron multiplication arises when neutrons from spontaneous fission and other nuclear events induce fissions in other fissile isotopes in the waste, thereby multiplying the overall coincidence neutron response in passive neutron measurements. Since passive neutron counters cannot differentiate between spontaneous and induced fission neutrons, multiplication can lead to positive bias in the measurements. Although neutron multiplication can only result in a positive bias, it has, for the purpose of mathematical simplicity, generally been treated as an error that can lead to either a positive or negative result in the TMU. While the factors that contribute to neutron multiplication include the total mass of fissile nuclides, the presence of moderating material in the matrix, the concentration and geometry of the fissile sources, and other factors; measurement uncertainty is generally determined as a function of the fissile mass in most TMU software calculations because this is the only quantity determined by the passive neutron measurement. Neutron multiplication error has a particularly pernicious consequence for TRU waste analysis because the measured Fissile Gram Equivalent (FGE) plus twice the TMU error must be less than 200 for TRU waste packaged in 55-gal drums and less than 325 for boxed waste. For this reason, large errors due to neutron multiplication can lead to increased rejections of TRU waste containers. This report will attempt to better define the error term due to neutron multiplication and arrive at values that are more realistic and accurate. To do so, measurements of standards and waste drums were performed with High Efficiency Neutron Counters (HENC) located at Los Alamos National Laboratory (LANL). The data were analyzed for multiplication effects and new estimates of the multiplication error were computed. A concluding section will present alternatives for reducing the number of rejections of TRU waste containers due to neutron multiplication error.

  13. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  14. Modular multiplication operator and quantized baker's maps

    SciTech Connect (OSTI)

    Lakshminarayan, Arul [Max-Planck-Institut fuer Physik komplexer Systeme, Noethnitzer Strasse 38, D-01187 Dresden (Germany)

    2007-10-15

    The modular multiplication operator, a central subroutine in Shor's factoring algorithm, is shown to be a coherent superposition of two quantum baker's maps when the multiplier is 2. The classical limit of the maps being completely chaotic, it is shown that there exist perturbations that push the modular multiplication operator into regimes of generic quantum chaos with spectral fluctuations that are those of random matrices. For the initial state of relevance to Shor's algorithm we study fidelity decay due to phase and bit-flip errors in a single qubit and show exponential decay with shoulders at multiples or half-multiples of the order. A simple model is used to gain some understanding of this behavior.

  15. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google...

  16. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  17. Laser isotope separation by multiple photon absorption

    DOE Patents [OSTI]

    Robinson, C.P.; Rockwood, S.D.; Jensen, R.J.; Lyman, J.L.; Aldridge, J.P. III.

    1987-04-07

    Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO[sub 2] laser light may be used to highly enrich [sup 34]S in natural SF[sub 6] and [sup 11]B in natural BCl[sub 3]. 8 figs.

  18. Charged-particle multiplicity at LHC energies

    ScienceCinema (OSTI)

    None

    2011-10-06

    The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

  19. Hand-held multiple system gas chromatograph

    DOE Patents [OSTI]

    Yu, Conrad M.

    2001-01-01

    A multiple parallel hand-held gas chromatograph (GC) system which includes several independent GCs. Each independent GC has its own injector, separation column, detector and oven and the GCs are mounted in a light weight hand-held assembly. Each GC operates independently and simultaneously. Because of different coatings in different separation columns, different retention times for the same gas will be measured. Thus, for a GC system with multiple parallel GCs, the system can measure, in a short period, different retention times and provide a cross-reference in the determination of the measured gas and to become a two-dimensional system for direct field use.

  20. Laser isotope separation by multiple photon absorption

    DOE Patents [OSTI]

    Robinson, C. Paul; Rockwood, Stephen D.; Jensen, Reed J.; Lyman, John L.; Aldridge, III, Jack P.

    1987-01-01

    Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

  1. Laser isotope separation by multiple photon absorption

    DOE Patents [OSTI]

    Robinson, C. Paul; Rockwood, Stephen D.; Jensen, Reed J.; Lyman, John L.; Aldridge, III, Jack P.

    1977-01-01

    Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, in the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

  2. PSTD Simulations of Multiple Light Scattering in 3-D Macrocsopic...

    Office of Scientific and Technical Information (OSTI)

    PSTD Simulations of Multiple Light Scattering in 3-D Macrocsopic Random Media Citation Details In-Document Search Title: PSTD Simulations of Multiple Light Scattering in 3-D ...

  3. Permeation of Multiple Isotopes in the Transition Between Surface...

    Office of Environmental Management (EM)

    Permeation of Multiple Isotopes in the Transition Between Surface- and Diffusion-Limited Regimes Permeation of Multiple Isotopes in the Transition Between Surface- and...

  4. The differential algebra based multiple level fast multipole...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: The differential algebra based multiple level fast multipole algorithm ... Title: The differential algebra based multiple level fast multipole algorithm for 3D space ...

  5. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  6. Semiconductor laser with multiple lasing wavelengths

    DOE Patents [OSTI]

    Fischer, Arthur J.; Choquette, Kent D.; Chow, Weng W.

    2003-07-29

    A new class of multi-terminal vertical-cavity semiconductor laser components has been developed. These multi-terminal laser components can be switched, either electrically or optically, between distinct lasing wavelengths, or can be made to lase simultaneously at multiple wavelengths.

  7. Selectivity in multiple quantum nuclear magnetic resonance

    SciTech Connect (OSTI)

    Warren, W.S.

    1980-11-01

    The observation of multiple-quantum nuclear magnetic resonance transitions in isotropic or anisotropic liquids is shown to give readily interpretable information on molecular configurations, rates of motional processes, and intramolecular interactions. However, the observed intensity of high multiple-quantum transitions falls off dramatically as the number of coupled spins increases. The theory of multiple-quantum NMR is developed through the density matrix formalism, and exact intensities are derived for several cases (isotropic first-order systems and anisotropic systems with high symmetry) to shown that this intensity decrease is expected if standard multiple-quantum pulse sequences are used. New pulse sequences are developed which excite coherences and produce population inversions only between selected states, even though other transitions are simultaneously resonant. One type of selective excitation presented only allows molecules to absorb and emit photons in groups of n. Coherent averaging theory is extended to describe these selective sequences, and to design sequences which are selective to arbitrarily high order in the Magnus expansion. This theory and computer calculations both show that extremely good selectivity and large signal enhancements are possible.

  8. Electron circuits: semiconductor laser multiple use installation

    SciTech Connect (OSTI)

    Zhou, F.; Fan, J.; Weng, D.

    1983-04-01

    A light source for a multiple use installation using a same matter junction or different matter junction GaAlAs/GaAs semiconductor laser, which has the advantages of high interference resistance, long transmission distance (tens to hundreds of meters), good security, and low power consumption in addition, the controller of the light source has multiple usages of alarming, switching and counting is presented. The multiple use installation can be used in control of breaking warps and counting on roving waste machines, warping machines and silk weaving machines in the textile industry long distance speed measurement, alarming and counting in machinery, electricity and chemical industries and alarming and control of water levels in reservoirs, rivers and water towers, as well as blockade alarming and control of important divisions. This multiple use installation is composed of two parts a laser emitter and a receiving device. The former component is used to produce the laser after the receiver receives the laser, the installation completes operations of alarming, switching and counting.

  9. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

    SciTech Connect (OSTI)

    Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

    2015-08-31

    The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grasses (prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.

  10. T-632: Google Chrome OS before R12 0.12.433.38 Beta Update

    Broader source: Energy.gov [DOE]

    CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

  11. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  12. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  13. A Multiple Objective Decision Support Tool (MODS)

    Energy Science and Technology Software Center (OSTI)

    2003-12-14

    The Multiple Objective Decision Support (MODS) tool is an automated tool used to assist decision makers and policy analysts with multiple-objective decision problems. The classes of problems that this decision support tool addresses have both multiple objectives and multiple stakeholders. Decision problems, which have multiple objectives that in general cannot be maximized simultaneously, and multiple stakeholders, who have different perspectives about the relative importance of the objectives, require analytic approaches and tools that can providemore » flexible support to decision makers. This tool provides capabilities for the management, analysis, and graphical display for these types of decision problems drawn from diverse problem domains. The MODS tool is a unique integration of analysis algorithms, an information database, and a graphical user interface. This collection of algorithms, the combination of an information database with the analysis into a single tool, and the graphical user interface provides a technically advanced tool to decision makers and policy analysts. There are two main issues when addressing problems of this type: what set of attributes should be used to characterize the tokens in the domain of interest, and how should the values of these attributes and their weights be determined and combined to provide a relative ordering to the tokens. This tool addresses both of these issues. This decision support tool provides a flexible way to derive and use a chosen set of attributes. For example, the tool could be used to first perform a paired comparison of a large set of attributes and from this evaluation select those attributes that have the highest weights. The flexibility of the tool allows experimentation with various attribute sets and this capability, along with domain expertise, addresses the first issue. To address the second issue, several algorithms have been implemented. For example, two algorithms that have been implemented are the geometric mean and the product of the weighted attributes. These, and other algorithms, are described in detail in the following sections. The algorithms can be selected easily and various evaluations can be compared. The tool also provides flexible methods for assigning weights to the attributes. A range of values can be assigned to an attribute when there is uncertainty as to which specific value should be assigned.« less

  14. Multiple Scattering Measurements in the MICE Experiment

    SciTech Connect (OSTI)

    Carlisle, T.; Cobb, J.; Neuffer, D.; /Fermilab

    2012-05-01

    The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

  15. Combining Multiple Pairwise Structure-based Alignments

    Energy Science and Technology Software Center (OSTI)

    2014-11-12

    CombAlign is a new Python code that generates a gapped, one-to-many, multiple structure-based sequence alignment(MSSA) given a set of pairwise structure-based alignments. In order to better define regions of similarity among related protein structures, it is useful to detect the residue-residue correspondences among a set of pairwise structure alignments. Few codes exist for constructing a one-to-many, multiple sequence alignment derived from a set of structure alignments, and we perceived a need for creating a newmore » tool for combing pairwise structure alignments that would allow for insertion of gaps in the reference structure.« less

  16. ORISE: Multiple research appointments available through Agricultural

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Service Postdoctoral Research Program Multiple research appointments available through Agricultural Research Service Postdoctoral Research Program Selected candidates participate in USDA research for one to four years FOR IMMEDIATE RELEASE March 26, 2014 FY14-23 OAK RIDGE, Tenn.-ORAU and the U.S. Department of Agriculture are currently seeking recent doctoral degree recipients for various appointments in the Agricultural Research Service Postdoctoral Research Program. The ARS is the

  17. Benchmarking of multiple preequilibrium routines in GNASH

    SciTech Connect (OSTI)

    Chadwick, M.B.; Young, P.G.

    1994-08-01

    The authors compare two different models for multiple preequilibrium emission (MPE) in GNASH: the older exciton MPE model; and a new generalized MPE model which is parameter-free. They analyze the proton-induced reactions on zirconium and lead, which were the focus of a recent NEA intermediate-energy code intercomparison, using both the MPE models. They find that the new generalized MPE model better describes the measurements.

  18. Alternatives for Helium-3 in Multiplicity Counters

    SciTech Connect (OSTI)

    Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

    2013-04-01

    Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

  19. MCNP6 Fission Multiplicity with FMULT Card

    SciTech Connect (OSTI)

    Wilcox, Trevor; Fensin, Michael Lorne; Hendricks, John S.; James, Michael R.; McKinney, Gregg W.

    2012-06-18

    With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

  20. Lamp method and apparatus using multiple reflections

    DOE Patents [OSTI]

    MacLennan, Donald A.; Turner, Brian; Kipling, Kent

    1999-01-01

    A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

  1. Lamp method and apparatus using multiple reflections

    DOE Patents [OSTI]

    MacLennan, D.A.; Turner, B.; Kipling, K.

    1999-05-11

    A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

  2. Multiple-reflection optical gas cell

    DOE Patents [OSTI]

    Matthews, Thomas G.

    1983-01-01

    A multiple-reflection optical cell for Raman or fluorescence gas analysis consists of two spherical mirrors positioned transverse to a multiple-pass laser cell in a confronting plane-parallel alignment. The two mirrors are of equal diameter but possess different radii of curvature. The spacing between the mirrors is uniform and less than half of the radius of curvature of either mirror. The mirror of greater curvature possesses a small circular portal in its center which is the effective point source for conventional F1 double lens collection optics of a monochromator-detection system. Gas to be analyzed is flowed into the cell and irradiated by a multiply-reflected composite laser beam centered between the mirrors of the cell. Raman or fluorescence radiation originating from a large volume within the cell is (1) collected via multiple reflections with the cell mirrors, (2) partially collimated and (3) directed through the cell portal in a geometric array compatible with F1 collection optics.

  3. Radial velocities of southern visual multiple stars

    SciTech Connect (OSTI)

    Tokovinin, Andrei; Pribulla, Theodor; Fischer, Debra E-mail: pribulla@ta3.sk

    2015-01-01

    High-resolution spectra of visual multiple stars were taken in 2008–2009 to detect or confirm spectroscopic subsystems and to determine their orbits. Radial velocities of 93 late-type stars belonging to visual multiple systems were measured by numerical cross-correlation. We provide the individual velocities, the width, and the amplitude of the Gaussians that approximate the correlations. The new information on the multiple systems resulting from these data is discussed. We discovered double-lined binaries in HD 41742B, HD 56593C, and HD 122613AB, confirmed several other known subsystems, and constrained the existence of subsystems in some visual binaries where both components turned out to have similar velocities. The orbits of double-lined subsystems with periods of 148 and 13 days are computed for HD 104471 Aa,Ab and HD 210349 Aa,Ab, respectively. We estimate individual magnitudes and masses of the components in these triple systems and update the outer orbit of HD 104471 AB.

  4. MPACT Fast Neutron Multiplicity System Prototype Development

    SciTech Connect (OSTI)

    D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

    2013-09-01

    This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

  5. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  6. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

    2015-08-31

    The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grassesmore » (prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.« less

  7. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  8. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... SCADA Images Since 1999, Sandia has conducted numerous assessments of SCADA and process control systems in hydroelectric dams; water treatment systems; electric power transmission, ...

  9. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... consequences, and impacts in many areas of electric power, including PMUs, DERs, cloud computing, smart meters, programmable-logic controllers, and communications, among others. ...

  10. Multiple frequency method for operating electrochemical sensors

    DOE Patents [OSTI]

    Martin, Louis P.

    2012-05-15

    A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

  11. Expression of multiple proteins in transgenic plants

    DOE Patents [OSTI]

    Vierstra, Richard D.; Walker, Joseph M.

    2002-01-01

    A method is disclosed for the production of multiple proteins in transgenic plants. A DNA construct for introduction into plants includes a provision to express a fusion protein of two proteins of interest joined by a linking domain including plant ubiquitin. When the fusion protein is produced in the cells of a transgenic plant transformed with the DNA construction, native enzymes present in plant cells cleave the fusion protein to release both proteins of interest into the cells of the transgenic plant. Since the proteins are produced from the same fusion protein, the initial quantities of the proteins in the cells of the plant are approximately equal.

  12. Multiple volume compressor for hot gas engine

    DOE Patents [OSTI]

    Stotts, Robert E.

    1986-01-01

    A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

  13. Observation of laser multiple filamentation process and multiple electron beams acceleration in a laser wakefield accelerator

    SciTech Connect (OSTI)

    Li, Wentao; Liu, Jiansheng; Wang, Wentao; Chen, Qiang; Zhang, Hui; Tian, Ye; Zhang, Zhijun; Qi, Rong; Wang, Cheng; Leng, Yuxin; Li, Ruxin; Xu, Zhizhan

    2013-11-15

    The multiple filaments formation process in the laser wakefield accelerator (LWFA) was observed by imaging the transmitted laser beam after propagating in the plasma of different density. During propagation, the laser first self-focused into a single filament. After that, it began to defocus with energy spreading in the transverse direction. Two filaments then formed from it and began to propagate independently, moving away from each other. We have also demonstrated that the laser multiple filamentation would lead to the multiple electron beams acceleration in the LWFA via ionization-induced injection scheme. Besides, its influences on the accelerated electron beams were also analyzed both in the single-stage LWFA and cascaded LWFA.

  14. Multiple output timing and trigger generator

    SciTech Connect (OSTI)

    Wheat, Robert M.; Dale, Gregory E

    2009-01-01

    In support of the development of a multiple stage pulse modulator at the Los Alamos National Laboratory, we have developed a first generation, multiple output timing and trigger generator. Exploiting Commercial Off The Shelf (COTS) Micro Controller Units (MCU's), the timing and trigger generator provides 32 independent outputs with a timing resolution of about 500 ns. The timing and trigger generator system is comprised of two MCU boards and a single PC. One of the MCU boards performs the functions of the timing and signal generation (the timing controller) while the second MCU board accepts commands from the PC and provides the timing instructions to the timing controller. The PC provides the user interface for adjusting the on and off timing for each of the output signals. This system provides 32 output or timing signals which can be pre-programmed to be in an on or off state for each of 64 time steps. The width or duration of each of the 64 time steps is programmable from 2 {micro}s to 2.5 ms with a minimum time resolution of 500 ns. The repetition rate of the programmed pulse train is only limited by the time duration of the programmed event. This paper describes the design and function of the timing and trigger generator system and software including test results and measurements.

  15. Flaw Tolerance for Multiple Fatique Cracks

    SciTech Connect (OSTI)

    Gosselin, Stephen R.; Simonen, Fredric A.; Carter, R. G.

    2005-07-01

    This paper documents important details of the technical bases for changes to Appendix L. Calculations identified aspect ratios for equivalent single cracks (ESC) between the extremes of a 6:1 ratio and a full circumferential crack that can be used in Appendix L flaw tolerance assessments to account for the initiation, growth, and linking of multiple fatigue cracks. Probabilistic fracture mechanics (PFM) calculations determined ESC aspect ratios that result in the same through-wall crack probability as multiple small cracks (0.02 inch depth) that initiate and coalesce. The computations considered two materials (stainless and low alloy steels), three pipe diameters, five cyclic membrane-to-gradient stress ratios and a wide range of primary loads. Subsequent deterministic calculations identified the ESC aspect ratio for the hypothetical reference flaw depth assumptions in Appendix L. This paper also describes computations that compare the Appendix L flaw tolerance allowable operating period for the ESC models with results obtained when the a single default 6:1 aspect ratio reference flaw.

  16. Multiple-use marketing of lignite

    SciTech Connect (OSTI)

    Knudson, C.L.

    1993-09-01

    Marketing of lignite faces difficulties due to moisture and sulfur contents, as well as the sodium content, of the ash. The purpose of this study is to determine the economic viability of multiple-use marketing of lignite as a method to increase the use of North Dakota lignite by recapturing lost niche markets. Multiple-use marketing means using lignite and sulfur-capturing additives to clean agricultural wastewater followed by either direct steam and power generation or briquetting to produce a higher-Btu compliance fuel. Cooperative ownership of the resulting business by a coal company and an agriculture processing company helps ensure that lignite remains the coal of choice, especially when the ``good`` attributes of lignites are maximized, while the agricultural company obtains cleaner wastewater and a long-term supply of coal at a set price. The economic viabilities of the following scenarios were investigated: (1) Agriprocessing wastewater treatment using lignite and an additive followed by (2) the production of compliance fuel for resale or on-site cogeneration of steam and electricity. Laboratory tests were performed utilizing potato-processing plant wastewater with lignite and lime sludge.

  17. 3-D simulations of multiple beam klystrons

    SciTech Connect (OSTI)

    Smithe, David N.; Bettenhausen, Mike; Ludeking, Larry; Caryotakis, G.; Sprehn, Daryl; Scheitrum, Glenn [Mission Research Corporation, 8560 Cinderbed Rd., Suite 700, Newington, Virginia 22122 (United States); Stanford Linear Accelerator Center, 2575 Sand Hill Rd., Menlo Park, California 94025 (United States)

    1999-05-07

    The MAGIC3D simulation code is being used to assess the multi-dimensional physics issues relating to the design and operation of multiple beam klystrons. Investigations, to date, include a detailed study of the mode structure of the cavities in the 19-beam hexagonally packed geometry and a study of the velocity spread caused by the cavity mode's field profile. Some attempts to minimize this effect are investigated. Additional simulations have provided quantification of the beam loading Q in a dual input cavity, and optimization of a dual output cavity. An important goal of the simulations is an accurate picture of beam transport along the length of the MBK. We have quantified the magnitude and spatial variation of the beam-line space charge interactions within a cavity gap. Present simulations have demonstrated the transport of the beam through three cavities (the present limits of our simulation size) without difficulty; additional length simulations are expected. We have also examined unbalanced beam-line scenarios, e.g., one beam-line suppressed, and find little disturbance to the transport in individual cavity tests, with results for multiple cavity transport expected.

  18. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  19. Multiple sort flow cytometer (Patent) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of ... lasers; excitation; respective; fluorescence; identified; dyes; bonded; specific; ...

  20. V-215: NetworkMiner Directory Traversal and Insecure Library...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis Related Articles U-198: IBM Lotus Expeditor Multiple Vulnerabilities U-146: Adobe ReaderAcrobat Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple...

  1. Multiple hearth furnace for reducing iron oxide

    DOE Patents [OSTI]

    Brandon, Mark M. (Charlotte, NC); True, Bradford G. (Charlotte, NC)

    2012-03-13

    A multiple moving hearth furnace (10) having a furnace housing (11) with at least two moving hearths (20) positioned laterally within the furnace housing, the hearths moving in opposite directions and each moving hearth (20) capable of being charged with at least one layer of iron oxide and carbon bearing material at one end, and being capable of discharging reduced material at the other end. A heat insulating partition (92) is positioned between adjacent moving hearths of at least portions of the conversion zones (13), and is capable of communicating gases between the atmospheres of the conversion zones of adjacent moving hearths. A drying/preheat zone (12), a conversion zone (13), and optionally a cooling zone (15) are sequentially positioned along each moving hearth (30) in the furnace housing (11).

  2. Multiple channel optical data acquisition system

    DOE Patents [OSTI]

    Fasching, G.E.; Goff, D.R.

    1985-02-22

    A multiple channel optical data acquisition system is provided in which a plurality of remote sensors monitoring specific process variable are interrogated by means of a single optical fiber connecting the remote station/sensors to a base station. The remote station/sensors derive all power from light transmitted through the fiber from the base station. Each station/sensor is individually accessed by means of a light modulated address code sent over the fiber. The remote station/sensors use a single light emitting diode to both send and receive light signals to communicate with the base station and provide power for the remote station. The system described can power at least 100 remote station/sensors over an optical fiber one mile in length.

  3. MPACT Fast Neutron Multiplicity System Design Concepts

    SciTech Connect (OSTI)

    D. L. Chichester; S. A. Pozzi; J. L. Dolan; M. T. Kinlaw; A. C. Kaplan; M. Flaska; A. Enqvist; J. T. Johnsom; S. M. Watson

    2012-10-01

    This report documents work performed by Idaho National Laboratory and the University of Michigan in fiscal year (FY) 2012 to examine design parameters related to the use of fast-neutron multiplicity counting for assaying plutonium for materials protection, accountancy, and control purposes. This project seeks to develop a new type of neutron-measurement-based plutonium assay instrument suited for assaying advanced fuel cycle materials. Some current-concept advanced fuels contain high concentrations of plutonium; some of these concept fuels also contain other fissionable actinides besides plutonium. Because of these attributes the neutron emission rates of these new fuels may be much higher, and more difficult to interpret, than measurements made of plutonium-only materials. Fast neutron multiplicity analysis is one approach for assaying these advanced nuclear fuels. Studies have been performed to assess the conceptual performance capabilities of a fast-neutron multiplicity counter for assaying plutonium. Comparisons have been made to evaluate the potential improvements and benefits of fast-neutron multiplicity analyses versus traditional thermal-neutron counting systems. Fast-neutron instrumentation, using for example an array of liquid scintillators such as EJ-309, have the potential to either a) significantly reduce assay measurement times versus traditional approaches, for comparable measurement precision values, b) significantly improve assay precision values, for measurement durations comparable to current-generation technology, or c) moderating improve both measurement precision and measurement durations versus current-generation technology. Using the MCNPX-PoliMi Monte Carlo simulation code, studies have been performed to assess the doubles-detection efficiency for a variety of counter layouts of cylindrical liquid scintillator detector cells over one, two, and three rows. Ignoring other considerations, the best detector design is the one with the most detecting volume. However, operational limitations guide a) the maximum acceptable size of each detector cell (due to PSD performance and maximum-acceptable per-channel data throughput rates, limited by pulse pile-up and the processing rate of the electronics components of the system) and b) the affordability of a system due to the number of total channels of data to be collected and processed. As a first estimate, it appears that a system comprised of two rows of detectors 5" Ø ? 3" would yield a working prototype system with excellent performance capabilities for assaying Pu-containing items and capable of handling high signal rates likely when measuring items with Pu and other actinides. However, it is still likely that gamma-ray shielding will be needed to reduce the total signal rate in the detectors. As a first step prior to working with these larger-sized detectors, it may be practical to perform scoping studies using small detectors, such as already-on-hand 3" Ø ? 3" detectors.

  4. Multiple predictor smoothing methods for sensitivity analysis.

    SciTech Connect (OSTI)

    Helton, Jon Craig; Storlie, Curtis B.

    2006-08-01

    The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

  5. Total lymphoid irradiation for multiple sclerosis

    SciTech Connect (OSTI)

    Devereux, C.K.; Vidaver, R.; Hafstein, M.P.; Zito, G.; Troiano, R.; Dowling, P.C.; Cook, S.D.

    1988-01-01

    Although chemical immunosuppression has been shown to benefit patients with chronic progressive multiple sclerosis (MS), it appears that chemotherapy has an appreciable oncogenic potential in patients with multiple sclerosis. Accordingly, we developed a modified total lymphoid irradiation (TLI) regimen designed to reduce toxicity and applied it to a randomized double blind trial of TLI or sham irradiation in MS. Standard TLI regimens were modified to reduce dose to 1,980 rad, lowering the superior mantle margin to midway between the thyroid cartilage and angle of the mandible (to avert xerostomia) and the lower margin of the mantle field to the inferior margin of L1 (to reduce gastrointestinal toxicity by dividing abdominal radiation between mantle and inverted Y), limiting spinal cord dose to 1,000 rad by custom-made spine blocks in the mantle and upper 2 cm of inverted Y fields, and also protecting the left kidney even if part of the spleen were shielded. Clinical efficacy was documented by the less frequent functional scale deterioration of 20 TLI treated patients with chronic progressive MS compared to to 20 sham-irradiated progressive MS patients after 12 months (16% versus 55%, p less than 0.03), 18 months (28% versus 63%, p less than 0.03), and 24 months (44% versus 74%, N.S.). Therapeutic benefit during 3 years follow-up was related to the reduction in lymphocyte count 3 months post-irradiation (p less than 0.02). Toxicity was generally mild and transient, with no instance of xerostomia, pericarditis, herpes zoster, or need to terminate treatment in TLI patients. However, menopause was induced in 2 patients and staphylococcal pneumonia in one.

  6. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spillmore » Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.« less

  7. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  8. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  9. Subcritical Measurements Multiple HEU Metal Castings

    SciTech Connect (OSTI)

    Mihalczo, John T [ORNL] [ORNL; Archer, Daniel E [ORNL] [ORNL; Wright, Michael C [ORNL] [ORNL

    2008-01-01

    Experiments with the standard annular highly enriched uranium (HEU) metal castings at Y-12 were performed in which up to 5 castings ({approx}90kg) were assembled in a tightly packed array with minimal spacing between castings. The fission chain multiplication process was initiated by a time tagged {sup 253}Cf spontaneously fissioning neutron source or time and directionally tagged neutrons from a small portable DT neutron generator and the prompt neutron time behavior measured with plastic scintillation detectors sensitive the fast neutron (>1 MeV) and gamma ray without distinction. These experiments were performed to provide data to benchmark methods for the calculation of the prompt neutron time behavior. Previous measurements with a single casting have been reported. This paper presents the experimental results for multiple castings. The prompt time decay was obtained by time coincidence correlation measurements between the detectors and the time tagged neutron source emission (equivalent to randomly pulsed neutron measurements) and between pairs of plastic scintillation detectors (equivalent to a 2-detector Rossi-alpha measurement). These standard HEU storage castings at the Y-12 plant had 5.000-in-OD, 3.500-in-ID, masses between 17,636 and 17,996 g, impurity content of 992 ppm, density of 18.75 g/cm{sup 3} and average enrichment of 93.16 wt % {sup 235}U. The castings were in tight fitting 025-in.-thick, 8.0-in-high stainless steel (SS-304) cylindrical cans for contamination control which were 8.0 in high. One can had an inside diameter of 3.0 in so that the Cf source could be located on the axes of this casting. Four 1 x 1 x 6 in plastic scintillators with the long dimension perpendicular to axes of the castings and adjacent to the outer surface of the casting cans were used. The detectors were enclosed in 1/4.-in.-thick lead shields on four 1 x 6 surfaces and on the 1 x 1 surface. The small surface of the lead shield was adjacent to the steel table. The photograph of the assembly of 5 casting with the detectors is given in Figure 1. The DT generator can be seen in the back with the time tagged neutrons aligned symmetrically around a line drawn from the generator through target spot and the center of the casting in the annular can seen in the foreground.

  10. Multiple-Input Multiple-Output (MIMO) Linear Systems Extreme Inputs/Outputs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Smallwood, David O.

    2007-01-01

    A linear structure is excited at multiple points with a stationary normal random process. The response of the structure is measured at multiple outputs. If the autospectral densities of the inputs are specified, the phase relationships between the inputs are derived that will minimize or maximize the trace of the autospectral density matrix of the outputs. If the autospectral densities of the outputs are specified, the phase relationships between the outputs that will minimize or maximize the trace of the input autospectral density matrix are derived. It is shown that other phase relationships and ordinary coherence less than one willmore » result in a trace intermediate between these extremes. Least favorable response and some classes of critical response are special cases of the development. It is shown that the derivation for stationary random waveforms can also be applied to nonstationary random, transients, and deterministic waveforms.« less

  11. From binaries to multiples. II. Hierarchical multiplicity of F and G dwarfs

    SciTech Connect (OSTI)

    Tokovinin, Andrei

    2014-04-01

    Statistics of hierarchical multiplicity among solar-type dwarfs are studied using the distance-limited sample of 4847 targets presented in the accompanying Paper I. Known facts about binaries (multiplicity fraction 0.46, lognormal period distribution with median period 100 yr and logarithmic dispersion 2.4, and nearly uniform mass-ratio distribution independent of the period) are confirmed with a high statistical significance. The fraction of hierarchies with three or more components is 0.13 ± 0.01, and the fractions of targets with n = 1, 2, 3, ... components are 54:33:8:4:1. Subsystems in the secondary components are almost as frequent as in the primary components, but in half of such cases both inner pairs are present. The high frequency of those 2+2 hierarchies (4%) suggests that both inner pairs were formed by a common process. The statistics of hierarchies can be reproduced by simulations, assuming that the field is a mixture coming from binary-rich and binary-poor environments. Periods of the outer and inner binaries are selected recursively from the same lognormal distribution, subject to the stability constraint and accounting for the correlation between inner subsystems. The simulator can be used to evaluate the frequency of multiple systems with specified parameters. However, it does not reproduce the observed excess of inner periods shorter than 10 days, caused by tidal evolution.

  12. Multiple capillary biochemical analyzer with barrier member

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1996-10-22

    A multiple capillary biochemical analyzer is disclosed for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal-to-noise ratio. 12 figs.

  13. Multiple shock initiation of LX-17

    SciTech Connect (OSTI)

    Tarver, C.M.; Cook, T.M.; Urtiew, P.A.; Tao, W.C.

    1993-07-01

    The response of the insensitive TATB-based high explosive LX-17 to multiple shock impacts is studied experimentally in a four inch gas gun using embedded manganin gauges and numerically using the ignition and growth reactive flow model of shock initiation and detonation. Pressure histories are reported for LX-17 cylinders which are subjected to sustained shock pulses followed by secondary compressions from shocks reflected from metal discs attached to the backs of the explosive targets. These measured and calculated pressure histories show that the threshold for hot spot growth in LX-17 is 7 GPa, that LX-17 can be dead pressed at slightly lower pressures, and that the reaction rates behind reflected shocks increase greatly as the impedance of the metal increases. A study of the response of LX-17 to the collision of two reacting, diverging shocks forming a Mach stem wave inside the LX-17 charge demonstrated that this interaction can result in a high pressure region of sufficient size and strength to cause detonation under certain conditions.

  14. Multiple capillary biochemical analyzer with barrier member

    DOE Patents [OSTI]

    Dovichi, Norman J.; Zhang, Jian Z.

    1996-01-01

    A multiple capillary biochemical analyzer for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal to noise ratio.

  15. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2013-07-01

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  16. Permeation absorption sampler with multiple detection

    DOE Patents [OSTI]

    Zaromb, Solomon

    1990-01-01

    A system for detecting analytes in air or aqueous systems includes a permeation absorption preconcentrator sampler for the analytes and analyte detectors. The preconcentrator has an inner fluid-permeable container into which a charge of analyte-sorbing liquid is intermittently injected, and a fluid-impermeable outer container. The sample is passed through the outer container and around the inner container for trapping and preconcentrating the analyte in the sorbing liquid. The analyte can be detected photometrically by injecting with the sorbing material a reagent which reacts with the analyte to produce a characteristic color or fluorescence which is detected by illuminating the contents of the inner container with a light source and measuring the absorbed or emitted light, or by producing a characteristic chemiluminescence which can be detected by a suitable light sensor. The analyte can also be detected amperometrically. Multiple inner containers may be provided into which a plurality of sorbing liquids are respectively introduced for simultaneously detecting different analytes. Baffles may be provided in the outer container. A calibration technique is disclosed.

  17. Nanoparticles modified with multiple organic acids

    DOE Patents [OSTI]

    Cook, Ronald Lee; Luebben, Silvia DeVito; Myers, Andrew William; Smith, Bryan Matthew; Elliott, Brian John; Kreutzer, Cory; Wilson, Carolina; Meiser, Manfred

    2007-07-17

    Surface-modified nanoparticles of boehmite, and methods for preparing the same. Aluminum oxyhydroxide nanoparticles are surface modified by reaction with selected amounts of organic acids. In particular, the nanoparticle surface is modified by reactions with two or more different carboxylic acids, at least one of which is an organic carboxylic acid. The product is a surface modified boehmite nanoparticle that has an inorganic aluminum oxyhydroxide core, or part aluminum oxyhydroxide core and a surface-bonded organic shell. Organic carboxylic acids of this invention contain at least one carboxylic acid group and one carbon-hydrogen bond. One embodiment of this invention provides boehmite nanoparticles that have been surface modified with two or more acids one of which additional carries at least one reactive functional group. Another embodiment of this invention provides boehmite nanoparticles that have been surface modified with multiple acids one of which has molecular weight or average molecular weight greater than or equal to 500 Daltons. Yet, another embodiment of this invention provides boehmite nanoparticles that are surface modified with two or more acids one of which is hydrophobic in nature and has solubility in water of less than 15 by weight. The products of the methods of this invention have specific useful properties when used in mixture with liquids, as filler in solids, or as stand-alone entities.

  18. Multiple connection for an undersea cable system

    SciTech Connect (OSTI)

    Guazzo, L.; Trezeguet, J.P.

    1984-05-08

    A multiple connection is claimed for connecting a plurality of armored cables to the housing of electrical apparatus in an undersea system having a cable interconnection point where a plurality of cables serving different destinations are brought together. Each of these cables comprise a core surrounded by armor and are terminated by a length of bared core extending beyond a severed end of the armor. The housing has a hollow cable-fixing part through which the bared cable cores pass, characterized in that said connection comprises: a steel binding ring through which the armored portion of each of said cables, is threaded, said ring serving to bind said armored portions of cable together; a steel tube threaded over said bared cores of said cables, having one end abutting against severed end portions of the armor of said cables and having its other end fixed mechanically to said hollow cable-fixing part of the electrical apparatus housing; and auxiliary armor wound around the portions of armored cable bound together by said ring and around the adjacent portion of said steel tube.

  19. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerabilities may lead to a crash of the player application or, in some cases, ... in this document could result in a crash of the Cisco WebEx ARF Player or WRF ...

  20. Spin-orbit interaction in multiple quantum wells

    SciTech Connect (OSTI)

    Hao, Ya-Fei

    2015-01-07

    In this paper, we investigate how the structure of multiple quantum wells affects spin-orbit interactions. To increase the interface-related Rashba spin splitting and the strength of the interface-related Rashba spin-orbit interaction, we designed three kinds of multiple quantum wells. We demonstrate that the structure of the multiple quantum wells strongly affected the interface-related Rashba spin-orbit interaction, increasing the interface-related Rashba spin splitting to up to 26% larger in multiple quantum wells than in a stepped quantum well. We also show that the cubic Dresselhaus spin-orbit interaction similarly influenced the spin relaxation time of multiple quantum wells and that of a stepped quantum well. The increase in the interface-related Rashba spin splitting originates from the relationship between interface-related Rashba spin splitting and electron probability density. Our results suggest that multiple quantum wells can be good candidates for spintronic devices.

  1. Organic light emitting device having multiple separate emissive layers

    DOE Patents [OSTI]

    Forrest, Stephen R. (Ann Arbor, MI)

    2012-03-27

    An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

  2. Control of Multiple Robotic Sentry Vehicles

    SciTech Connect (OSTI)

    Feddema, J.; Klarer, P.; Lewis, C.

    1999-04-01

    As part of a project for the Defense Advanced Research Projects Agency, Sandia National Laboratories is developing and testing the feasibility of using of a cooperative team of robotic sentry vehicles to guard a perimeter and to perform surround and diversion tasks. This paper describes on-going activities in the development of these robotic sentry vehicles. To date, we have developed a robotic perimeter detection system which consists of eight ''Roving All Terrain Lunar Explorer Rover'' (RATLER{trademark}) vehicles, a laptop-based base-station, and several Miniature Intrusion Detection Sensors (MIDS). A radio frequency receiver on each of the RATLER vehicles alerts the sentry vehicles of alarms from the hidden MIDS. When an alarm is received, each vehicle decides whether it should investigate the alarm based on the proximity of itself and the other vehicles to the alarm. As one vehicle attends an alarm, the other vehicles adjust their position around the perimeter to better prepare for another alarm. We have also demonstrated the ability to drive multiple vehicles in formation via tele-operation or by waypoint GPS navigation. This is currently being extended to include mission planning capabilities. At the base-station, the operator can draw on an aerial map the goal regions to be surrounded and the repulsive regions to be avoided. A potential field path planner automatically generates a path from the vehicles' current position to the goal regions while avoiding the repulsive regions and the other vehicles. This path is previewed to the operator before the regions are downloaded to the vehicles. The same potential field path planner resides on the vehicle, except additional repulsive forces from on-board proximity sensors guide the vehicle away from unplanned obstacles.

  3. Building multiple adsorption sites in porous polymer networks...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

  4. Intrinsic carrier multiplication efficiency in bulk Si crystals...

    Office of Scientific and Technical Information (OSTI)

    We estimated the carrier multiplication efficiency in the most common solar-cell material, ... of carriers quantitatively, which are crucial for the design of the solar cells. ...

  5. Efficient merging of data from multiple samples for determination...

    Office of Scientific and Technical Information (OSTI)

    Title: Efficient merging of data from multiple samples for determination of anomalous substructure Authors: Akey, David L. ; Terwilliger, Thomas C. ; Smith, Janet L. 1 ; LANL) ...

  6. Matrix multiplication operations with data pre-conditioning in...

    Office of Scientific and Technical Information (OSTI)

    Matrix multiplication operations with data pre-conditioning in a high performance computing architecture Eichenberger, Alexandre E; Gschwind, Michael K; Gunnels, John A Mechanisms...

  7. Multiple-Reheat Brayton Cycles for Nuclear Power Conversion with...

    Office of Scientific and Technical Information (OSTI)

    Brayton Cycles for Nuclear Power Conversion with Molten Coolants Citation Details In-Document Search Title: Multiple-Reheat Brayton Cycles for Nuclear Power Conversion with ...

  8. Matrix multiplication operations with data pre-conditioning in...

    Office of Scientific and Technical Information (OSTI)

    computing architecture Citation Details In-Document Search Title: Matrix multiplication operations with data pre-conditioning in a high performance computing architecture ...

  9. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function....

  10. Interested Parties - Allowing Multiple Projects per Application for Section

    Energy Savers [EERE]

    1603 Program Discussion Interested Parties - 1603 Program Discussion PDF icon weekswagle.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy Interested Parties - The Moffett Group 1705 Loan Guarantees | Department of Energy

    Allowing Multiple Projects per Application for Section 1705 Loan Guarantees Interested Parties - Allowing Multiple Projects per Application for Section 1705 Loan Guarantees PDF icon

  11. Multiple pass and multiple layer friction stir welding and material enhancement processes

    DOE Patents [OSTI]

    Feng, Zhili [Knoxville, TN; David, Stan A. [Knoxville, TN; Frederick, David Alan [Harriman, TN

    2010-07-27

    Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

  12. Stator for a rotating electrical machine having multiple control windings

    DOE Patents [OSTI]

    Shah, Manoj R.; Lewandowski, Chad R.

    2001-07-17

    A rotating electric machine is provided which includes multiple independent control windings for compensating for rotor imbalances and for levitating/centering the rotor. The multiple independent control windings are placed at different axial locations along the rotor to oppose forces created by imbalances at different axial locations along the rotor. The multiple control windings can also be used to levitate/center the rotor with a relatively small magnetic field per unit area since the rotor and/or the main power winding provides the bias field.

  13. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    "blue screen of death" after installation. April 12, 2013 V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities Multiple security vulnerabilities exist...

  14. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    "blue screen of death" after installation. April 12, 2013 V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities Multiple security vulnerabilities exist...

  15. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ESX and ESXi March 29, 2013 V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities Multiple security vulnerabilities exist in the Java Runtime...

  16. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ESX and ESXi March 29, 2013 V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities Multiple security vulnerabilities exist in the Java Runtime...

  17. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity...

  18. Matrix multiplication operations with data pre-conditioning in...

    Office of Scientific and Technical Information (OSTI)

    A vector load operation is performed to load a first vector operand of the matrix multiplication operation to a first target vector register. A load and splat operation is ...

  19. Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Milligan, M.

    2011-03-01

    In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

  20. Phenomenology of COMPASS data: Multiplicities and phenomenology - part II

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Anselmino, M.; Boglione, M.; Gonzalez H., J. O.; Melis, S.; Prokudin, A.

    2015-01-23

    In this study, we present some of the main features of the multidimensional COMPASS multiplicities, via our analysis using the simple Gaussian model. We briefly discuss these results in connection with azimuthal asymmetries.

  1. Ultrafast photodetectors allow direct observation of multiple electrons

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    generated by a single photon Ultrafast photodetectors Ultrafast photodetectors allow direct observation of multiple electrons generated by a single photon The new technique involves monitoring photocurrent transients in specially engineered photodetectors that provide very high temporal resolution of only 50 picoseconds. September 11, 2015 Andrew Fidler of Los Alamos National Laboratory examines an ultrafast photodetector used to measure quantum dot carrier multiplication in real time.

  2. High mass throughput particle generation using multiple nozzle spraying

    DOE Patents [OSTI]

    Pui, David Y.H.; Chen, Da-Ren

    2004-07-20

    Spraying apparatus and methods that employ multiple nozzle structures for producing multiple sprays of particles, e.g., nanoparticles, for various applications, e.g., pharmaceuticals, are provided. For example, an electrospray dispensing device may include a plurality of nozzle structures, wherein each nozzle structure is separated from adjacent nozzle structures by an internozzle distance. Sprays of particles are established from the nozzle structures by creating a nonuniform electrical field between the nozzle structures and an electrode electrically isolated therefrom.

  3. High mass throughput particle generation using multiple nozzle spraying

    DOE Patents [OSTI]

    Pui, David Y. H.; Chen, Da-Ren

    2009-03-03

    Spraying apparatus and methods that employ multiple nozzle structures for producing multiple sprays of particles, e.g., nanoparticles, for various applications, e.g., pharmaceuticals, are provided. For example, an electrospray dispensing device may include a plurality of nozzle structures, wherein each nozzle structure is separated from adjacent nozzle structures by an internozzle distance. Sprays of particles are established from the nozzle structures by creating a nonuniform electrical field between the nozzle structures and an electrode electrically isolated therefrom.

  4. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems Are Under Way, but Challenges Remain | Department of Energy CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant

  5. Efficient merging of data from multiple samples for determination of

    Office of Scientific and Technical Information (OSTI)

    anomalous substructure (Journal Article) | SciTech Connect Efficient merging of data from multiple samples for determination of anomalous substructure Citation Details In-Document Search Title: Efficient merging of data from multiple samples for determination of anomalous substructure Authors: Akey, David L. ; Terwilliger, Thomas C. ; Smith, Janet L. [1] ; LANL) [2] + Show Author Affiliations Michigan ( Publication Date: 2016-03-07 OSTI Identifier: 1241062 Resource Type: Journal Article

  6. Multiple Mechanisms of Uranium Immobilization by Cellulomonas sp. Strain

    Office of Scientific and Technical Information (OSTI)

    ES6 (Journal Article) | SciTech Connect Journal Article: Multiple Mechanisms of Uranium Immobilization by Cellulomonas sp. Strain ES6 Citation Details In-Document Search Title: Multiple Mechanisms of Uranium Immobilization by Cellulomonas sp. Strain ES6 Removal of hexavalent uranium (U(VI)) from aqueous solution was studied using a Gram-positive facultative anaerobe, Cellulomonas sp. strain ES6, under anaerobic, non-growth conditions in bicarbonate and PIPES buffers. Inorganic phosphate was

  7. Multiple scattering effects in fission neutron outputs (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Conference: Multiple scattering effects in fission neutron outputs Citation Details In-Document Search Title: Multiple scattering effects in fission neutron outputs Authors: Taddeucci, Terry N [1] + Show Author Affiliations Los Alamos National Laboratory Publication Date: 2011-02-24 OSTI Identifier: 1053153 Report Number(s): LA-UR-11-01326; LA-UR-11-1326 DOE Contract Number: AC52-06NA25396 Resource Type: Conference Resource Relation: Conference: Fission fprogram Review, ;

  8. Simulation Tools for Modeling Thermal Spallation Drilling on Multiple

    Office of Scientific and Technical Information (OSTI)

    Scales (Conference) | SciTech Connect Conference: Simulation Tools for Modeling Thermal Spallation Drilling on Multiple Scales Citation Details In-Document Search Title: Simulation Tools for Modeling Thermal Spallation Drilling on Multiple Scales Authors: Walsh, S C ; Lomov, I ; Kanarska, Y ; Roberts, J J Publication Date: 2012-05-02 OSTI Identifier: 1082416 Report Number(s): LLNL-CONF-555171 DOE Contract Number: W-7405-ENG-48 Resource Type: Conference Resource Relation: Conference:

  9. Simulation Tools for Modeling Thermal Spallation Drilling on Multiple

    Office of Scientific and Technical Information (OSTI)

    Scales (Conference) | SciTech Connect Simulation Tools for Modeling Thermal Spallation Drilling on Multiple Scales Citation Details In-Document Search Title: Simulation Tools for Modeling Thermal Spallation Drilling on Multiple Scales × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information

  10. Stratiform and Convective Precipitation Observed by Multiple Radars during

    Office of Scientific and Technical Information (OSTI)

    the DYNAMO/AMIE Experiment (Journal Article) | SciTech Connect Stratiform and Convective Precipitation Observed by Multiple Radars during the DYNAMO/AMIE Experiment Citation Details In-Document Search Title: Stratiform and Convective Precipitation Observed by Multiple Radars during the DYNAMO/AMIE Experiment The motivation for this research is to develop a precipitation classification and rain rate estimation method using cloud radar-only measurements for Atmospheric Radiation Measurement

  11. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus ALS Capabilities Reveal Multiple Functions of Ebola Virus Print Friday, 13 June 2014 10:25 A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function. Scientists typically expect that a protein has a singular structure (with some conformational variation), and that when an experimental structure is solved, it can used to understand the known biological function(s) of the

  12. Probing Radiation Damage in Plutonium Alloys with Multiple Measurement

    Office of Scientific and Technical Information (OSTI)

    Techniques (Conference) | SciTech Connect Conference: Probing Radiation Damage in Plutonium Alloys with Multiple Measurement Techniques Citation Details In-Document Search Title: Probing Radiation Damage in Plutonium Alloys with Multiple Measurement Techniques A material subjected to radiation damage will usually experience changes in its physical properties. Measuring these changes in the physical properties provides a basis to study radiation damage in a material which is important for a

  13. Coexistence of multiple metastable polytypes in rhombohedral bismuth

    Office of Scientific and Technical Information (OSTI)

    (Journal Article) | SciTech Connect Coexistence of multiple metastable polytypes in rhombohedral bismuth Citation Details In-Document Search Title: Coexistence of multiple metastable polytypes in rhombohedral bismuth Authors: Shu, Yu ; Hu, Wentao ; Liu, Zhongyuan ; Shen, Guoyin ; Xu, Bo ; Zhao, Zhisheng ; He, Julong ; Wang, Yanbin ; Tian, Yongjun ; Yu, Dongli Publication Date: 2016-02-17 OSTI Identifier: 1249226 Resource Type: Journal Article Resource Relation: Journal Name: Scientific

  14. Characterization of Tritium Breeding Ratio and Energy Multiplication Factor

    Office of Scientific and Technical Information (OSTI)

    of Lithium-based Ternary Alloys in IFE Blankets (Conference) | SciTech Connect Characterization of Tritium Breeding Ratio and Energy Multiplication Factor of Lithium-based Ternary Alloys in IFE Blankets Citation Details In-Document Search Title: Characterization of Tritium Breeding Ratio and Energy Multiplication Factor of Lithium-based Ternary Alloys in IFE Blankets Authors: Jolodosky, A ; Fratoni, M ; Meier, W ; Demuth, J ; Reyes, S Publication Date: 2015-06-09 OSTI Identifier: 1248300

  15. The differential algebra based multiple level fast multipole algorithm for

    Office of Scientific and Technical Information (OSTI)

    3D space charge field calculation and photoemission simulation (Journal Article) | SciTech Connect Journal Article: The differential algebra based multiple level fast multipole algorithm for 3D space charge field calculation and photoemission simulation Citation Details In-Document Search This content will become publicly available on September 28, 2016 Title: The differential algebra based multiple level fast multipole algorithm for 3D space charge field calculation and photoemission

  16. High mass throughput particle generation using multiple nozzle spraying

    DOE Patents [OSTI]

    Pui, David Y. H.; Chen, Da-Ren

    2015-06-09

    Spraying apparatus and methods that employ multiple nozzle structures for producing multiple sprays of particles, e.g., nanoparticles, for various applications, e.g., pharmaceuticals, are provided. For example, an electrospray dispensing device may include a plurality of nozzle structures, wherein each nozzle structure is separated from adjacent nozzle structures by an internozzle distance. Sprays of particles are established from the nozzle structures by creating a nonuniform electrical field between the nozzle structures and an electrode electrically isolated therefrom.

  17. Neutron multiplicity counting: Confidence intervals for reconstruction parameters

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Verbeke, Jerome M.

    2016-03-09

    From nuclear materials accountability to homeland security, the need for improved nuclear material detection, assay, and authentication has grown over the past decades. Starting in the 1940s, neutron multiplicity counting techniques have enabled quantitative evaluation of masses and multiplications of fissile materials. In this paper, we propose a new method to compute uncertainties on these parameters using a model-based sequential Bayesian processor, resulting in credible regions in the fissile material mass and multiplication space. These uncertainties will enable us to evaluate quantitatively proposed improvements to the theoretical fission chain model. Additionally, because the processor can calculate uncertainties in real time,more » it is a useful tool in applications such as portal monitoring: monitoring can stop as soon as a preset confidence of non-threat is reached.« less

  18. Evaporation of water with single and multiple impinging air jets

    SciTech Connect (OSTI)

    Trabold, T.A.; Obot, N.T. )

    1991-08-01

    An experimental investigation of impingement water evaporation under a single jet and arrays of circular jets was made. The parametric study included the effects of jet Reynolds number and standoff spacing for both single and multiple jets, as well as surface-to-nozzle diameter ratio and fractional nozzle open area for single and multiple jets, respectively. The nozzle exit temperature of the air jet, about the same as that of the laboratory, was 3-6C higher than that of the evaporating water. Predictive equations are provided for mass transfer coefficient in terms of the flow and geometric conditions.

  19. Extending vanLeer's Algorithm to Multiple Dimensions. (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Extending vanLeer's Algorithm to Multiple Dimensions. Citation Details In-Document Search Title: Extending vanLeer's Algorithm to Multiple Dimensions. Abstract not provided. Authors: Mosso, Stewart John ; Voth, Thomas Eugene ; Drake, Richard R. Publication Date: 2013-08-01 OSTI Identifier: 1115085 Report Number(s): SAND2013-7261C 477201 DOE Contract Number: AC04-94AL85000 Resource Type: Conference Resource Relation: Conference: MultiMat 2012 held September 2-6, 2013 in San

  20. Method for measuring multiple scattering corrections between liquid scintillators

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Verbeke, J. M.; Glenn, A. M.; Keefer, G. J.; Wurtz, R. E.

    2016-04-11

    In this study, a time-of-flight method is proposed to experimentally quantify the fractions of neutrons scattering between scintillators. An array of scintillators is characterized in terms of crosstalk with this method by measuring a californium source, for different neutron energy thresholds. The spectral information recorded by the scintillators can be used to estimate the fractions of neutrons multiple scattering. With the help of a correction to Feynman's point model theory to account for multiple scattering, these fractions can in turn improve the mass reconstruction of fissile materials under investigation.

  1. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect (OSTI)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  2. VariableR reclustering in multiple top quark events - Oral Presentatio...

    Office of Scientific and Technical Information (OSTI)

    VariableR reclustering in multiple top quark events - Oral Presentation Citation Details In-Document Search Title: VariableR reclustering in multiple top quark events - Oral...

  3. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  4. Northeast Climate Science Center Webinar- Making Decision in Complex Landscapes: Headwater Stream Management Across Multiple Agencies Using Structured Decision Making

    Broader source: Energy.gov [DOE]

    There is growing evidence that headwater stream ecosystems are vulnerable to changing climate and land use, but their conservation is challenged by the need to address the threats at a landscape...

  5. Method and system of integrating information from multiple sources

    DOE Patents [OSTI]

    Alford, Francine A.; Brinkerhoff, David L.

    2006-08-15

    A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

  6. Emulating Multiple Inheritance in Fortran 2003/2008

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Morris, Karla

    2015-01-01

    Although the high-performance computing (HPC) community increasingly embraces object-oriented programming (OOP), most HPC OOP projects employ the C++ programming language. Until recently, Fortran programmers interested in mining the benefits of OOP had to emulate OOP in Fortran 90/95. The advent of widespread compiler support for Fortran 2003 now facilitates explicitly constructing object-oriented class hierarchies via inheritance and leveraging related class behaviors such as dynamic polymorphism. Although C++ allows a class to inherit from multiple parent classes, Fortran and several other OOP languages restrict or prohibit explicit multiple inheritance relationships in order to circumvent several pitfalls associated with them. Nonetheless, whatmore » appears as an intrinsic feature in one language can be modeled as a user-constructed design pattern in another language. The present paper demonstrates how to apply the facade structural design pattern to support a multiple inheritance class relationship in Fortran 2003. The design unleashes the power of the associated class relationships for modeling complicated data structures yet avoids the ambiguities that plague some multiple inheritance scenarios.« less

  7. Breach, Leach, and Transport-Multiple Species GRID

    Energy Science and Technology Software Center (OSTI)

    2006-04-01

    BLTMS-GRID is a FORTRAN code developed to facilitate specifications of a finite-element grid for the Nuclear Regulatory Commission code called Breach, Leach, and Transport - Multiple Species (BLT-MS). BLTMS-GRID is an open-source code. It functions under a DOS window.

  8. Breach, Leach, and Transport-Multiple Species UNCERT

    Energy Science and Technology Software Center (OSTI)

    2006-04-01

    BLTPLOT_UNCERT is a FORTRAN code developed to facilitate plotting of 2-D concentration data for the Nuclear Regulatory Commission code called Breach, Leach, and Transport - Multiple Species (BLT-MS). BLTPLOT_UNCERT is open-source code. It functions under a DOS window.

  9. Tunnel junction multiple wavelength light-emitting diodes

    DOE Patents [OSTI]

    Olson, Jerry M.; Kurtz, Sarah R.

    1992-01-01

    A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect.

  10. Tunnel junction multiple wavelength light-emitting diodes

    DOE Patents [OSTI]

    Olson, J.M.; Kurtz, S.R.

    1992-11-24

    A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

  11. Multiple Whole Genome Alignments Without a Reference Organism

    SciTech Connect (OSTI)

    Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

    2009-01-16

    Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

  12. An extension of the multiple-trapping model

    SciTech Connect (OSTI)

    Shkilev, V. P.

    2012-07-15

    The hopping charge transport in disordered semiconductors is considered. Using the concept of the transport energy level, macroscopic equations are derived that extend a multiple-trapping model to the case of semiconductors with both energy and spatial disorders. It is shown that, although both types of disorder can cause dispersive transport, the frequency dependence of conductivity is determined exclusively by the spatial disorder.

  13. Climate Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    Department of Energy Christopher A. Smith Confirmed as Assistant Secretary for Fossil Energy Christopher A. Smith Confirmed as Assistant Secretary for Fossil Energy December 16, 2014 - 10:15pm Addthis News Media Contact 202 586 4940 Christopher A. Smith Confirmed as Assistant Secretary for Fossil Energy WASHINGTON - Christopher A. Smith was confirmed by the Senate on Tuesday, December 16th, 2014, as the Department of Energy's Assistant Secretary for Fossil Energy. "Chris Smith's depth

  14. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  15. FUEL CASK IMPACT LIMITER VULNERABILITIES

    SciTech Connect (OSTI)

    Leduc, D; Jeffery England, J; Roy Rothermel, R

    2009-02-09

    Cylindrical fuel casks often have impact limiters surrounding just the ends of the cask shaft in a typical 'dumbbell' arrangement. The primary purpose of these impact limiters is to absorb energy to reduce loads on the cask structure during impacts associated with a severe accident. Impact limiters are also credited in many packages with protecting closure seals and maintaining lower peak temperatures during fire events. For this credit to be taken in safety analyses, the impact limiter attachment system must be shown to retain the impact limiter following Normal Conditions of Transport (NCT) and Hypothetical Accident Conditions (HAC) impacts. Large casks are often certified by analysis only because of the costs associated with testing. Therefore, some cask impact limiter attachment systems have not been tested in real impacts. A recent structural analysis of the T-3 Spent Fuel Containment Cask found problems with the design of the impact limiter attachment system. Assumptions in the original Safety Analysis for Packaging (SARP) concerning the loading in the attachment bolts were found to be inaccurate in certain drop orientations. This paper documents the lessons learned and their applicability to impact limiter attachment system designs.

  16. Vulnerability to closing of Hormuz

    SciTech Connect (OSTI)

    Not Available

    1984-03-07

    Tankers carrying roughly 8-million barrels per day (mmb/d) of crude oil, or some 16% of the non-communist world's oil supply, pass through the Strait of Hormuz. Experts agree that just 3-mmb/d of that could be exported through alternate routes. If the war between Iran and Iraq should result in their completely halting each other's production, this relatively limited supply curtailment would reduce world oil production by over 3.4-mmb/d. Since the two have not caused such mutual disaster during four years of war, many observers believe there has been a deliberate avoidance of the jugular squeeze. Nevertheless, the two combatants appear capable not only of cutting off their oil production, but escalating fighting to the point where Gulf traffic would be impeded. Potential results from a prolonged Iran-Iraq crisis are viewed in three scenarios. Also included in this issue are brief summaries of: (1) Mexico's new energy plan, internationalism, and OPEC; (2) update on Argentina's energy resource developments; (3) Venezuela: belt tightening; (4) Western Hemisphere oil production declines; (5) (6) days of oil supply for Canada, USA, Japan, France, Italy, and UK; and (6) US Department of Defense fuel consumption. The Energy Detente fuel price/tax series and principal industrial fuel prices are included for March for countries of the Eastern Hemisphere.

  17. An efficient parallel algorithm for matrix-vector multiplication

    SciTech Connect (OSTI)

    Hendrickson, B.; Leland, R.; Plimpton, S.

    1993-03-01

    The multiplication of a vector by a matrix is the kernel computation of many algorithms in scientific computation. A fast parallel algorithm for this calculation is therefore necessary if one is to make full use of the new generation of parallel supercomputers. This paper presents a high performance, parallel matrix-vector multiplication algorithm that is particularly well suited to hypercube multiprocessors. For an n x n matrix on p processors, the communication cost of this algorithm is O(n/[radical]p + log(p)), independent of the matrix sparsity pattern. The performance of the algorithm is demonstrated by employing it as the kernel in the well-known NAS conjugate gradient benchmark, where a run time of 6.09 seconds was observed. This is the best published performance on this benchmark achieved to date using a massively parallel supercomputer.

  18. SWAMP+: multiple subsequence alignment using associative massive parallelism

    SciTech Connect (OSTI)

    Steinfadt, Shannon Irene [Los Alamos National Laboratory; Baker, Johnnie W [KENT STATE UNIV.

    2010-10-18

    A new parallel algorithm SWAMP+ incorporates the Smith-Waterman sequence alignment on an associative parallel model known as ASC. It is a highly sensitive parallel approach that expands traditional pairwise sequence alignment. This is the first parallel algorithm to provide multiple non-overlapping, non-intersecting subsequence alignments with the accuracy of Smith-Waterman. The efficient algorithm provides multiple alignments similar to BLAST while creating a better workflow for the end users. The parallel portions of the code run in O(m+n) time using m processors. When m = n, the algorithmic analysis becomes O(n) with a coefficient of two, yielding a linear speedup. Implementation of the algorithm on the SIMD ClearSpeed CSX620 confirms this theoretical linear speedup with real timings.

  19. Quantum Dot Solar Cells with Multiple Exciton Generation

    SciTech Connect (OSTI)

    Hanna, M. C.; Beard, M. C.; Johnson, J. C.; Murphy, J.; Ellingson, R. J.; Nozik, A. J.

    2005-11-01

    We have measured the quantum yield of the multiple exciton generation (MEG) process in quantum dots (QDs) of the lead-salt semiconductor family (PbSe, PbTe, and PbS) using fs pump-probe transient absorption measurements. Very high quantum yields (up to 300%) for charge carrier generation from MEG have been measured in all of the Pb-VI QDs. We have calculated the potential maximum performance of various MEG QD solar cells in the detailed balance limit. We examined a two-cell tandem PV device with singlet fission (SF), QD, and normal dye (N) absorbers in the nine possible series-connected combinations to compare the tandem combinations and identify the combinations with the highest theoretical efficiency. We also calculated the maximum efficiency of an idealized single-gap MEG QD solar cell with M multiplications and its performance under solar concentration.

  20. Multiple fuel supply system for an internal combustion engine

    DOE Patents [OSTI]

    Crothers, William T.

    1977-01-01

    A multiple fuel supply or an internal combustion engine wherein phase separation of components is deliberately induced. The resulting separation permits the use of a single fuel tank to supply components of either or both phases to the engine. Specifically, phase separation of a gasoline/methanol blend is induced by the addition of a minor amount of water sufficient to guarantee separation into an upper gasoline phase and a lower methanol/water phase. A single fuel tank holds the two-phase liquid with separate fuel pickups and separate level indicators for each phase. Either gasoline or methanol, or both, can be supplied to the engine as required by predetermined parameters. A fuel supply system for a phase-separated multiple fuel supply contained in a single fuel tank is described.

  1. Design and modeling of small scale multiple fracturing experiments

    SciTech Connect (OSTI)

    Cuderman, J F

    1981-12-01

    Recent experiments at the Nevada Test Site (NTS) have demonstrated the existence of three distinct fracture regimes. Depending on the pressure rise time in a borehole, one can obtain hydraulic, multiple, or explosive fracturing behavior. The use of propellants rather than explosives in tamped boreholes permits tailoring of the pressure risetime over a wide range since propellants having a wide range of burn rates are available. This technique of using the combustion gases from a full bore propellant charge to produce controlled borehole pressurization is termed High Energy Gas Fracturing (HEGF). Several series of HEGF, in 0.15 m and 0.2 m diameter boreholes at 12 m depths, have been completed in a tunnel complex at NTS where mineback permitted direct observation of fracturing obtained. Because such large experiments are costly and time consuming, smaller scale experiments are desirable, provided results from small experiments can be used to predict fracture behavior in larger boreholes. In order to design small scale gas fracture experiments, the available data from previous HEGF experiments were carefully reviewed, analytical elastic wave modeling was initiated, and semi-empirical modeling was conducted which combined predictions for statically pressurized boreholes with experimental data. The results of these efforts include (1) the definition of what constitutes small scale experiments for emplacement in a tunnel complex at the Nevada Test Site, (2) prediction of average crack radius, in ash fall tuff, as a function of borehole size and energy input per unit length, (3) definition of multiple-hydraulic and multiple-explosive fracture boundaries as a function of boreholes size and surface wave velocity, (4) semi-empirical criteria for estimating stress and acceleration, and (5) a proposal that multiple fracture orientations may be governed by in situ stresses.

  2. Stochastic dynamics of a delayed bistable system with multiplicative noise

    SciTech Connect (OSTI)

    Dung, Nguyen Tien E-mail: dungnt@fpt.edu.vn

    2014-05-15

    In this paper we investigate the properties of a delayed bistable system under the effect of multiplicative noise. We first prove the existence and uniqueness of the positive solution and show that its moments are uniformly bounded. Then, we study stochastic dynamics of the solution in long time, the lower and upper bounds for the paths and an estimate for the average value are provided.

  3. Multiple-channel, total-reflection optic with controllable divergence

    DOE Patents [OSTI]

    Gibson, David M.; Downing, Robert G.

    1997-01-01

    An apparatus and method for providing focused x-ray, gamma-ray, charged particle and neutral particle, including neutron, radiation beams with a controllable amount of divergence are disclosed. The apparatus features a novel use of a radiation blocking structure, which, when combined with multiple-channel total reflection optics, increases the versatility of the optics by providing user-controlled output-beam divergence.

  4. Multiple-channel, total-reflection optic with controllable divergence

    DOE Patents [OSTI]

    Gibson, D.M.; Downing, R.G.

    1997-02-18

    An apparatus and method for providing focused x-ray, gamma-ray, charged particle and neutral particle, including neutron, radiation beams with a controllable amount of divergence are disclosed. The apparatus features a novel use of a radiation blocking structure, which, when combined with multiple-channel total reflection optics, increases the versatility of the optics by providing user-controlled output-beam divergence. 11 figs.

  5. Phase transitions in quantum Hall multiple layer systems

    SciTech Connect (OSTI)

    Pusep, Yu A.; Fernandes dos Santos, L.; Smirnov, D.; Bakarov, A. K.; Toropov, A. I.

    2013-12-04

    Polarized photoluminescence from multiple well electron systems was studied in the regime of the integer quantum Hall effect. Two quantum Hall ferromagnetic ground states assigned to the uncorrelated miniband quantum Hall state and to the spontaneous interwell phase coherent dimer quantum Hall state were observed. The photoluminescence associated with these states exhibits features caused by finite-size skyrmions. The depolarization of the ferromagnetic ground state was observed in bilayer system.

  6. System and process for pulsed multiple reaction monitoring

    DOE Patents [OSTI]

    Belov, Mikhail E

    2013-05-17

    A new pulsed multiple reaction monitoring process and system are disclosed that uses a pulsed ion injection mode for use in conjunction with triple-quadrupole instruments. The pulsed injection mode approach reduces background ion noise at the detector, increases amplitude of the ion signal, and includes a unity duty cycle that provides a significant sensitivity increase for reliable quantitation of proteins/peptides present at attomole levels in highly complex biological mixtures.

  7. MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations

    Office of Legacy Management (LM)

    52. APR 9 1986 MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations International Minerals and Chemical Corporation P.O. Box 7047 Lakeland, Florida 33807 Dear Mr. Speir: The Department of Energy is evaluating the radiological condition of sites that were utilized by the Manhattan Engineer District and the Atomic Energy Commission (AEC) during the early years of nuclear energy development to determine whether they need remedial action and whether the Department has authority to

  8. ALTERNATIVES TO HELIUM-3 FOR NEUTRON MULTIPLICITY DETECTORS

    SciTech Connect (OSTI)

    Ely, James H.; Siciliano, Edward R.; Swinhoe, Martyn T.

    2012-02-07

    Collaboration between the Pacific Northwest National Laboratory (PNNL) and the Los Alamos National Laboratory (LANL) is underway to evaluate neutron detection technologies that might replace the high-pressure helium (3He) tubes currently used in neutron multiplicity counter for safeguards applications. The current stockpile of 3He is diminishing and alternatives are needed for a variety of neutron detection applications including multiplicity counters. The first phase of this investigation uses a series of Monte Carlo calculations to simulate the performance of an existing neutron multiplicity counter configuration by replacing the 3He tubes in a model for that counter with candidate alternative technologies. These alternative technologies are initially placed in approximately the same configuration as the 3He tubes to establish a reference level of performance against the 3He-based system. After these reference-level results are established, the configurations of the alternative models will be further modified for performance optimization. The 3He model for these simulations is the one used by LANL to develop and benchmark the Epithermal Neutron Multiplicity Counter (ENMC) detector, as documented by H.O. Menlove, et al. in the 2004 LANL report LA-14088. The alternative technologies being evaluated are the boron-tri-fluoride-filled proportional tubes, boron-lined tubes, and lithium coated materials previously tested as possible replacements in portal monitor screening applications, as documented by R.T. Kouzes, et al. in the 2010 PNNL report PNNL-72544 and NIM A 623 (2010) 1035–1045. The models and methods used for these comparative calculations will be described and preliminary results shown

  9. Properties of the extra stage cube under multiple faults

    SciTech Connect (OSTI)

    Adams, G.B., III; Siegel, H.J.

    1982-01-01

    The extra stage cube (ESC) interconnection network, a fault tolerant structure, has been proposed for use in large-scale parallel and distributed systems. It has all of the interconnecting capabilities of the multistage cube-type networks that have been proposed for many systems, and the ESC provides fault tolerance for any single failure. The paper examines the ability of the ESC to operate with multiple faults. 9 references.

  10. SSAA-16-008 - Multiple Awards.pdf

    National Nuclear Security Administration (NNSA)

    5-014 National Nuclear Security Administration Categorical Exclusion Determination Form Proposed Action Title: the Stewardship Science Academic Alliance (SSAA) Program or Field Office: APM Grant No.: Multiple Location(s) (City/County/State): Various locations Proposed Action Description: The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA) proposes to provide financial assistance to several University and Institutions for the Stewardship Science Academic Alliance

  11. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function. Scientists typically expect that a protein has a singular structure (with some conformational variation), and that when an experimental structure is solved, it can used to understand the known biological function(s) of the protein. Recently, researchers used beamline capabilities at the ALS to demonstrate that a

  12. Multiple Species of Bacteria Convert Elemental Mercury to Toxic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Methylmercury | U.S. DOE Office of Science (SC) Multiple Species of Bacteria Convert Elemental Mercury to Toxic Methylmercury Biological and Environmental Research (BER) BER Home About Research Facilities Science Highlights Searchable Archive of BER Highlights External link Benefits of BER Funding Opportunities Biological & Environmental Research Advisory Committee (BERAC) Community Resources Contact Information Biological and Environmental Research U.S. Department of Energy

  13. with multiple torsional modes and when there are

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    multiple torsional modes and when there are hydrogen bonds formed for some of the geometries. The presence of hydrogen bonds particularly compli- cates things by coupling some of the other vibrational motions to the torsional motions. In particular, many of the bending frequencies become quite strongly de- pendent on the torsional geometry. Truhlar has devel- oped a method that treats this difficulty by explicitly considering the contributions from each of the differ- ent torsional minima. The

  14. Breach, Leach and Transport-Multiple Species WIN

    Energy Science and Technology Software Center (OSTI)

    2005-12-01

    BLTMSIN-WIN is a Windows-based preprocessor for the Breach, Leach, and Transport - Multiple Species (BLT-MS) code developed by the Nuclear Regulatory Commission (NRC) for performance assessment analyses of low-level radioactive waste disposal facilities. It is based, in part, on the preprocessor that the NRC developed, BLTMSIN. The code is written in Fortran and compiled with the Lahey Fortran compiler.

  15. Identification of Severe Multiple Contingencies in Electric PowerSystems

    SciTech Connect (OSTI)

    Donde, Vaibhav; Lopez, Vanessa; Lesieutre, Bernard; Pinar, Ali; Yang, Chao; Meza, Juan

    2006-06-14

    In this work, we propose a computationally feasible approachtodetect severe multiple contingencies. We pose a contingency analysisproblem using a nonlinear optimization framework, which enables ustodetect the fewest possible transmission line outages resulting ina systemfailure of specified severity, and the most severe system failure causedby removing a specified number of transmission lines from service.Illustrations using a three bus system and the IEEE ~;30 bus system aimto exhibit the effectiveness of the proposed approach.

  16. System Configured For Applying Multiple Modifying Agents To A Substrate.

    DOE Patents [OSTI]

    Propp, W. Alan; Argyle, Mark D.; Janikowski, Stuart K.; Fox, Robert V.; Toth, William J.; Ginosar, Daniel M.; Allen, Charles A.; Miller, David L.

    2005-11-08

    The present invention is related to the modifying of substrates with multiple modifying agents in a single continuous system. At least two processing chambers are configured for modifying the substrate in a continuous feed system. The processing chambers can be substantially isolated from one another by interstitial seals. Additionally, the two processing chambers can be substantially isolated from the surrounding atmosphere by end seals. Optionally, expansion chambers can be used to separate the seals from the processing chambers.

  17. System configured for applying multiple modifying agents to a substrate

    DOE Patents [OSTI]

    Propp, W. Alan; Argyle, Mark D.; Janikowski, Stuart K.; Fox, Robert V.; Toth, William J.; Ginosar, Daniel M.; Allen, Charles A.; Miller, David L.

    2003-11-25

    The present invention is related to the modifying of substrates with multiple modifying agents in a single continuous system. At least two processing chambers are configured for modifying the substrate in a continuous feed system. The processing chambers can be substantially isolated from one another by interstitial seals. Additionally, the two processing chambers can be substantially isolated from the surrounding atmosphere by end seals. Optionally, expansion chambers can be used to separate the seals from the processing chambers.

  18. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function. Scientists typically expect that a protein has a singular structure (with some conformational variation), and that when an experimental structure is solved, it can used to understand the known biological function(s) of the protein. Recently, researchers used beamline capabilities at the ALS to demonstrate that a

  19. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function. Scientists typically expect that a protein has a singular structure (with some conformational variation), and that when an experimental structure is solved, it can used to understand the known biological function(s) of the protein. Recently, researchers used beamline capabilities at the ALS to demonstrate that a

  20. ALS Capabilities Reveal Multiple Functions of Ebola Virus

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its function. Scientists typically expect that a protein has a singular structure (with some conformational variation), and that when an experimental structure is solved, it can used to understand the known biological function(s) of the protein. Recently, researchers used beamline capabilities at the ALS to demonstrate that a