Powered by Deep Web Technologies
Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

2

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

3

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

4

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

5

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

6

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

7

T-593: Microsoft Internet Explorer unspecified code execution  

Broader source: Energy.gov [DOE]

Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

8

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

9

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

10

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

11

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

12

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

13

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM Multiple

14

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

15

U-137: HP Performance Manager Unspecified Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

16

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

17

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

18

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

19

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

20

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

22

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

23

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS MultipleWireshark

24

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment ofEnergy Multiple

25

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java Multiple

26

U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of8:

27

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacks |Multiple

28

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

29

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

30

V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers

31

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)ArbitraryprintersDepartment

32

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability  

Broader source: Energy.gov [DOE]

An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

33

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

34

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

35

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS Multiple

36

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java Runtime...

37

LADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises  

E-Print Network [OSTI]

and Van Dijk (1996) studied several stock market indexes by AR(1)-GJR(1, 1) models, Zhu and Ling (2011) fitted a MA(3)-GARCH(1, 1) model to the world oil prices, see also Tsay (2005) for more empiricalLADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

Ling, Shiqing

38

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code

39

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

40

V-125: Cisco Connected Grid Network Management System Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

42

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

43

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

44

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Broader source: Energy.gov (indexed) [DOE]

IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

45

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

46

T-611: Cisco IOS OCSP Revoked Certificate Security Issue | Department...  

Broader source: Energy.gov (indexed) [DOE]

Addthis Related Articles U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability V-080: Apple iOS Multiple Vulnerabilities U-196: Cisco AnyConnect VPN Client Two...

47

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

48

U-100: Google Chrome Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

49

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

50

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

51

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

52

V-001: Mozilla Security vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is accessible by other domain objects, which can be exploited to bypass the same origin policy and gain access to sensitive information. 2) An unspecified error within the...

53

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INLs Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendors system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendors) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

54

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Office of Environmental Management (EM)

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

55

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web...

56

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

57

Unspecified technologies | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTagusparkCalculator JumpUnited States:Delaware JumpNewfor

58

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

59

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

60

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

62

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

63

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

64

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabiliti...  

Broader source: Energy.gov (indexed) [DOE]

RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found...

65

V-070: Apache CouchDB Multiple Vulnerabilities | Department of...  

Broader source: Energy.gov (indexed) [DOE]

access files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. Only Microsoft Windows versions of Apache CouchDB are affected....

66

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary...

67

ISSO Information Alert Multiple Vulnerabilities in Adobe Flash  

E-Print Network [OSTI]

SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY MS-ISAC ADVISORY NUMBER: 2012-014 DATE(S) ISSUED: 3 to take complete control of affected systems. Adobe Flash Player is a widely distributed multimedia or URL and distributes that file or URL to unsuspecting users via e-mail or some other means. When

Dyer, Bill

68

U-104: Adobe Flash Player Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and...

69

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar PowerDepartmentOracle

70

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBMMultiple

71

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements

72

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple

73

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment ofof

74

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentof

75

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartment of

76

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartmentGoogle

77

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy VMwareMozilla

78

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:|

79

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2:

80

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems for

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| DepartmentU-162:

82

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment

83

V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department

84

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |

85

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a

86

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has

87

U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |

88

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:

89

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:9:

90

U-273: Multiple vulnerabilities have been reported in Wireshark |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of

91

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New12.'6/0.2Contract (UESC)Department ofDepartment

92

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

93

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

94

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

95

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

96

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

97

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

98

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

99

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...  

Broader source: Energy.gov (indexed) [DOE]

Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

100

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

102

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

103

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

104

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

105

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

106

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

107

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

108

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

109

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

110

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

111

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

112

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

administrative access. 3) An unspecified error within the configuration of the Tomcat Web Management component can be exploited to execute otherwise unauthorised user-supplied...

113

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to cross-administrative boundaries, which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. Seventeen social vulnerability indicators are categorized into four dimensions. This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. This study provides a foundation for sustainable strategic planning to deal with environmental change. Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

114

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

115

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

116

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

117

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

118

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

119

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

120

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

122

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

123

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

124

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

125

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

126

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

127

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

128

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

129

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

130

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

131

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

132

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

133

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

134

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

135

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

136

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

137

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

138

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

139

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

140

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

142

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

143

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

144

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

145

Multiple Critical Vulnerabilities in Blackboard due to persistent Cross Site Scripting and Authorization bugs  

E-Print Network [OSTI]

and Authorization bugs Tung Tran tunghack@gmail.com Alireza Saberi - saberi.alireza@gmail.com The current version

Sekar, R.

146

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: Apple QuickTime

147

T-597: WordPress Multiple Security Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7: WordPress

148

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:|7: Adobeof

149

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian update

150

U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|

151

U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of

152

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed Hat

153

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment of

154

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService onApple

155

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar,Department of

156

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

157

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

158

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

159

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

160

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity Implications for agricultural production, trade and poverty The issue of climate volatility Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

162

T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service  

Broader source: Energy.gov [DOE]

This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

163

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

164

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

165

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

166

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

167

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

168

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

169

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

170

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

171

Unspecified Journal Volume 00, Number 0, Pages 000000  

E-Print Network [OSTI]

0000 (copyright holder) 1 #12;2 W.S. CHEUNG, XUHUA LIU AND T.Y. TAM Theorem 1.1. ([9, p.50-51]) Let, BOUNDARY POINTS, AND JOINT NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM Abstract

Tam, Tin-Yau

172

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP...

173

V-218: HP Service Manager Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

174

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows,...

175

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

176

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

177

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

178

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

179

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

180

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-181: IBM WebSphere Application Server Information Disclosure...  

Energy Savers [EERE]

this vulnerability using unspecified attack vectors to inject script in a victim's web browser within the security context of the hosting Web site. Impact: Exposure of...

182

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

183

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

184

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

185

Correlates of vulnerability among arthropod species threatened by invasive ants  

E-Print Network [OSTI]

declines and extinctions of native species worldwide.and even extinctions, of native species through variousG (2004) How species respond to multiple extinction threats.

Krushelnycky, Paul D.; Gillespie, Rosemary G.

2010-01-01T23:59:59.000Z

186

T-625: Opera Frameset Handling Memory Corruption Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

187

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

188

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

189

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

190

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

191

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

192

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

193

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

194

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

195

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

196

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

197

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

198

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

199

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

200

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

202

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Universit de

203

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

204

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

205

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

206

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

207

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

208

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

209

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

210

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

211

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

212

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

213

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

214

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

215

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

216

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

217

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

218

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

219

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

220

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

222

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, HerbertE.

223

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

224

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

225

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

226

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple |Department of Energy

227

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthenticationEnergy

228

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of

229

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

230

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

Alger, T.W.

1994-09-06T23:59:59.000Z

231

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

232

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

233

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

234

A Multiple Procedure DDT  

E-Print Network [OSTI]

This Memo. Describes a version of DDT used as the command level of the A.I. Group PDP-6 Time Sharing System (ITS). Special features include capability to handle multiple jobs, ability to stop open read or write references ...

Knight, Thomas

1968-01-01T23:59:59.000Z

235

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

236

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

237

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

238

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

239

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

240

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

242

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

243

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

244

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

245

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

246

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

247

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

248

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

249

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

250

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Universit de

251

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

252

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

253

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

254

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

255

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

256

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

257

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

258

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

259

Environmental Tracers for Determining Water Resource Vulnerability to Climate Change  

SciTech Connect (OSTI)

Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

Singleton, M

2009-07-08T23:59:59.000Z

260

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Multiple stage multiple filter hydrate store  

DOE Patents [OSTI]

An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

Bjorkman, H.K. Jr.

1983-05-31T23:59:59.000Z

262

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

263

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

264

Polycrystal Plasticity -Multiple Slip"  

E-Print Network [OSTI]

Polycrystal Plasticity - Multiple Slip" 27-750 Texture, Microstructure & Anisotropy A.D. Rollett;2 Objective" The objective of this lecture is to show how plastic deformation in polycrystals requires of Los Alamos polycrystal plasticity, LApp; also the Viscoplastic Selfconsistent code, VPSC; also

Rollett, Anthony D.

265

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

266

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

267

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

268

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

269

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

270

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

271

The ASSESS (Analytic System and Software for Evaluating Safeguards and Security) Outsider module with multiple analyses  

SciTech Connect (OSTI)

The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) includes modules for analyzing vulnerabilities against outsider and insider adversaries. The ASSESS Outsider Analysis Module has been upgraded to allow for defining, analyzing, and displaying the results of multiple analyses. Once a set of threat definitions have been defined in one Outsider file, they can be readily copied to other Outsider files. This multiple analysis, or batch, mode of operation provides an efficient way of covering the standard DOE outsider threat spectrum. A new approach for coupling the probability of interruption, P(I), values and values calculated by the ASSESS Neutralization module has been implemented in Outsider and is described. An enhanced capability for printing results of these multiple analyses is also included in the upgraded Outside module. 7 refs., 7 figs., 1 tab.

Snell, M.K.; Winblad, A.E. (Sandia National Labs., Albuquerque, NM (USA)); Bingham, B.; Key, B.; Walker, S. (Science and Engineering Associates, Inc., Albuquerque, NM (USA))

1990-01-01T23:59:59.000Z

272

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

273

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

274

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

275

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

can cause named to crash. May 31, 2011 T-632: Google Chrome OS before R12 0.12.433.38 Beta Update CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of...

276

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

can cause named to crash. May 31, 2011 T-632: Google Chrome OS before R12 0.12.433.38 Beta Update CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of...

277

Multiple capillary biochemical analyzer  

DOE Patents [OSTI]

A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

Dovichi, N.J.; Zhang, J.Z.

1995-08-08T23:59:59.000Z

278

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

279

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

280

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

282

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

283

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

284

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

285

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

286

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

287

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability  

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

288

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarn et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

289

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

290

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

291

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i sAccess

292

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum

293

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMBFirmware with Arbitrary

294

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters and

295

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy 7:

296

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

297

Sublethal OxygenGlucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygenglucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 2448 hr after sublethal oxygenglucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

298

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

299

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

300

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

302

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

303

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 29, 2013...

304

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

305

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approachrather than a single strategymay be required to achieve change. Research demonstrates that people and institutions adopt new...

306

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

, unidentified causes may have led to the fluctuation. A widely accepted approach for modeling multiple hypotheses is to employ a probabilistic revision process (Winterfeldt and Edwards 1986; Winkler and Hays 1975; Luce and Raiffa, 1957). Probability theory...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

307

V-047: IBM Lotus Foundation Multiple Cross Site Scripting | Department...  

Broader source: Energy.gov (indexed) [DOE]

the malicious data is being viewed. 2) An error exists within the bundled version of PHP. IMPACT: Two vulnerabilities have been reported in IBM Lotus Foundations Start, which...

308

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

309

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

310

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

311

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

312

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

313

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

314

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-01-01T23:59:59.000Z

315

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

316

Multiple reflection solar energy absorber  

SciTech Connect (OSTI)

A method of converting solar energy into heat energy thereby generating power is described comprising the steps: (a) focusing said solar energy by means of a primary concentrator, (b) concentrating said solar energy from said primary concentrator by means of a secondary concentrator located at the focal point of said primary concentrator, (c) slowing the flux of said solar energy from said secondary concentrator by means of a multiple reflection chamber attached to the rear aperture of the secondary concentrator, (d) circulating a working fluid by means of a working fluid delivery tube into said secondary concentrator and said multiple reflection chamber, (e) absorbing said solar energy into said working fluid by means of an ultra high concentration of said solar energy in said multiple reflection chamber, (f) insulating said working fluid by means of a surrounding thermal barrier, (g) exhausting the heat working fluid by means as of a nozzle joined to said multiple reflection chamber, (h) replacing said working fluid by means of a working fluid delivery tube, thereby completing a cycle for generating power.

Cooley, W.L.

1993-06-01T23:59:59.000Z

317

6, 81258154, 2006 Multiple scattering  

E-Print Network [OSTI]

ACPD 6, 81258154, 2006 Multiple scattering effects for Cloudsat A. Battaglia et al. Title Page A. Battaglia1 , M. O. Ajewole2 , and C. Simmer3 1 Meteorological Institute, University of Bonn, Bonn: 28 August 2006 Correspondence to: A. Battaglia (batta@uni-bonn.de) 8125 #12;ACPD 6, 81258154, 2006

Boyer, Edmond

318

The proliferation of functions: multiple systemsplayingmultiple roles in multiple super systems  

E-Print Network [OSTI]

playedbyanygivensystemarerepresentedbythe functionanalysisdiagram(Aurisicchio,Bracewell,&Armstrong,2013; Devoinoetal.,1997).Here,componentsofasystemareconnectedtoeach otherthroughtheeffectthatonehasontheother.Componentscanaffect multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

319

Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury  

SciTech Connect (OSTI)

The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

2010-01-01T23:59:59.000Z

320

CHARGED PARTICLE MULTIPLICITIES AT BRAHMS.  

SciTech Connect (OSTI)

This report presents the measurement of charged particle multiplicity densities dN/d{eta} in ultrarelativistic heavy ion collisions as function of {eta} and the centrality of the collisions. This distributions were extracted from data collected by the BRAHMS collaboration during the first RHK run with gold ions at {radical}s{sub NN} = 130A {center_dot} GeV. The analysis method is described and, results are compared to some model predictions.

DEBBE, R., FOR THE BRAHMS COLLABORATION

2001-07-30T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

FORESTRY 347 MULTIPLE RESOURCE SILVICULTURE  

E-Print Network [OSTI]

FORESTRY 347 MULTIPLE RESOURCE SILVICULTURE Autumn 2008 Instructor: John Goodburn Office: Rm. 409 Science Complex Telephone: 243-4295 Email: goodburn@forestry.umt.edu Office hours: Mon. 3:00 - 5:00 pm.m. Rm. 301 Forestry Bldg. Lab/Field Work Wed or Thur. 2:10 - 6:00 p.m. In Field or Rm. 106 (W) & 206(H

Vonessen, Nikolaus

322

Supporting Multiple Workloads, Batch Systems,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium OxideSuminDepositionSupplierSupporting Multiple

323

Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains  

E-Print Network [OSTI]

Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains beamforming for a multiple input single output (MISO) ad hoc network to increase the density of successful

Paris-Sud XI, Universit de

324

The GL 569 Multiple System  

E-Print Network [OSTI]

We report the results of high spectral and angular resolution infrared observations of the multiple system GL 569 A and B that were intended to measure the dynamical masses of the brown dwarf binary believed to comprise GL 569 B. Our analysis did not yield this result but, instead, revealed two surprises. First, at age ~100 Myr, the system is younger than had been reported earlier. Second, our spectroscopic and photometric results provide support for earlier indications that GL 569 B is actually a hierarchical brown dwarf triple rather than a binary. Our results suggest that the three components of GL 569 B have roughly equal mass, ~0.04 Msun.

M. Simon; C. Bender; L. Prato

2006-04-04T23:59:59.000Z

325

Multiple piece turbine rotor blade  

DOE Patents [OSTI]

A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

Jones, Russell B; Fedock, John A

2013-05-21T23:59:59.000Z

326

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

327

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

328

Multiple channel data acquisition system  

DOE Patents [OSTI]

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

1990-05-22T23:59:59.000Z

329

Multiple channel data acquisition system  

DOE Patents [OSTI]

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

Crawley, H. Bert (Ames, IA); Rosenberg, Eli I. (Ames, IA); Meyer, W. Thomas (Ames, IA); Gorbics, Mark S. (Ames, IA); Thomas, William D. (Boone, IA); McKay, Roy L. (Ames, IA); Homer, Jr., John F. (Ames, IA)

1990-05-22T23:59:59.000Z

330

Multiple systems or task complexity 1 Running head: Multiple systems or task complexity  

E-Print Network [OSTI]

Multiple systems or task complexity 1 Running head: Multiple systems or task complexity Procedural memory effects in categorization: evidence for multiple systems or task complexity? Safa R. Zaki and Dave College Williamstown, MA 10267 413-597-4594 Email: szaki@williams.edu #12;Multiple systems or task

Stoiciu, Mihai

331

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

332

Multiple-stage integrating accelerometer  

DOE Patents [OSTI]

An accelerometer assembly is provided for use in activating a switch in response to multiple acceleration pulses in series. The accelerometer includes a housing forming a chamber. An inertial mass or piston is slidably disposed in the chamber and spring biased toward a first or reset position. A damping system is also provided to damp piston movement in response to first and subsequent acceleration pulses. Additionally, a cam, including a Z-shaped slot, and cooperating follower pin slidably received therein are mounted to the piston and the housing. The middle or cross-over leg of the Z-shaped slot cooperates with the follower pin to block or limit piston movement and prevent switch activation in response to a lone acceleration pulse. The switch of the assembly is only activated after two or more separate acceleration pulses are sensed and the piston reaches the end of the chamber opposite the reset position.

Devaney, Howard F. (Cedar Crest, NM)

1986-01-01T23:59:59.000Z

333

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

334

Fermentation, Hydrogen, and Sulfur Metabolism in Multiple Uncultivated...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermentation, Hydrogen, and Sulfur Metabolism in Multiple Uncultivated Bacterial Phyla. Fermentation, Hydrogen, and Sulfur Metabolism in Multiple Uncultivated Bacterial Phyla....

335

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

336

Interested Parties - Multiple Loan Applications per Developer...  

Energy Savers [EERE]

Documents & Publications Interested Parties - Allowing Multiple Projects per Application for Section 1705 Loan Guarantees Interested Parties - K&L Group Interested Parties - Shipp...

337

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server  

Broader source: Energy.gov [DOE]

BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

338

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

339

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

340

Multiple criteria minimum spanning trees Pedro Cardoso  

E-Print Network [OSTI]

Multiple criteria minimum spanning trees Pedro Cardoso M´ario Jesus ´Alberto M´arquez Abstract The NP multiple criteria minimum spanning tree as several applications into the network design problems criteria minimum spanning trees. There are several geometric network design and application problems

Coello, Carlos A. Coello

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Dynamic Behavior of Multiple Inversions Senior Thesis  

E-Print Network [OSTI]

Dynamic Behavior of Multiple Inversions Ilya Baran Senior Thesis Boston University Academy Under functions. To iterate a function means to compose it with itself multiple times. Unless stated otherwise, we a circle centered at O with radius r is a point A 0 on the ray \\Gamma! OA such that OA r = r OA 0 (see

Popovic, Jovan

342

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol  

SciTech Connect (OSTI)

This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

NONE

1994-09-01T23:59:59.000Z

343

Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage Systems*  

E-Print Network [OSTI]

Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage massimo.poncino@polito.it Abstract-- Hybrid electrical energy storage (HEES) systems consist of multiple banks of heterogeneous electrical energy storage (EES) elements that are connected to each other through

Pedram, Massoud

344

A Multiple Network Approach to Corporate Governance  

E-Print Network [OSTI]

In this work, we consider Corporate Governance ties among companies from a multiple network perspective. Such a structurenaturally arises from the close interrelation between the Shareholding Network and the Board of Directors network. Inorder to capture the simultaneous effects on both networks on Corporate Governance, we propose to model the Corporate Governance multiple network structure via tensor analysis. In particular, we consider the TOPHITS model, based on the PARAFAC tensor decomposition, to show that tensor techniques can be successfully applied in this context. After providing some empirical results from the Italian financial market in the univariate case, we will show that a tensor-based multiple network approach can reveal important information.

Bonacina, Fausto; Moretto, Enrico; Stefani, Silvana; Torriero, Anna

2014-01-01T23:59:59.000Z

345

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

346

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

347

Integrating Multiple Alarms & Driver Situation Awareness  

E-Print Network [OSTI]

This study addresses this gap in CAS and intelligent alarm research by examining whether or not a single master alarm warning versus multiple warnings for the different collision warning systems conveys adequate information ...

Cummings, M. L.

2006-01-01T23:59:59.000Z

348

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

cells and vortices are the respective source of PV production and building blocks for the meso-?-scale vortices. Finally, this thesis discusses issues related to the multiple vortex nature of tropical cyclone formation. For instance, the tracking...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

349

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

350

Acoustic signal estimation using multiple blind observations  

E-Print Network [OSTI]

This thesis proposes two algorithms for recovering an acoustic signal from multiple blind measurements made by sensors (microphones) over an acoustic channel. Unlike other algorithms that use a posteriori probabilistic ...

Lee, Joonsung

2006-01-01T23:59:59.000Z

351

Galois representations with quaternion multiplication associated to ...  

E-Print Network [OSTI]

Aug 19, 2013 ... 1 ? ?, each of multiplicity d, and all eigenvalues of the characteristic polynomial of a geometric ... When d = 1, by appealing to the now established Serre's conjecture, one concludes ...... MR2368983 (2009a:11102). [ASD71].

A.O.L. Atkin; Wen-Ching Winnie Li; Tong Liu; Ling Long

2013-09-18T23:59:59.000Z

352

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

353

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

354

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

355

An improved model for multiple effect distillation  

E-Print Network [OSTI]

Increasing global demand for fresh water is driving research and development of advanced desalination technologies. As a result, a detailed model of multiple effect distillation (MED) is developed that is flexible, simple ...

Mistry, Karan H.

356

Cosmological Perturbations with Multiple Scalar Fields  

E-Print Network [OSTI]

In this brief note we present a set of equations describing the evolution of perturbed scalar fields in a cosmological spacetime with multiple scalar fields. We take into account of the simultaneously excited full metric perturbations in the context of the uniform-curvature gauge which is known to be the best choice. The equations presented in a compact form will be useful for handling the structure formation processes under the multiple episodes of inflation.

J. Hwang

1996-08-08T23:59:59.000Z

357

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

358

accurate multiple locus: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

severe economic losses in the main apple producing areas of East Asia. The causal Biggs, Alan R. 8 Accurate Matrix Multiplication with Multiple Floating-point Numbers...

359

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Energy Storage Solutions - Multiple Technologies Compared Project Profile: CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings,...

360

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

362

Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework  

SciTech Connect (OSTI)

In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

2012-07-01T23:59:59.000Z

363

The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study  

SciTech Connect (OSTI)

Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

2006-12-15T23:59:59.000Z

364

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

365

T-632: Google Chrome OS before R12 0.12.433.38 Beta Update  

Broader source: Energy.gov [DOE]

CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

366

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

367

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited.

None

2011-10-06T23:59:59.000Z

368

Laser isotope separation by multiple photon absorption  

DOE Patents [OSTI]

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO[sub 2] laser light may be used to highly enrich [sup 34]S in natural SF[sub 6] and [sup 11]B in natural BCl[sub 3]. 8 figs.

Robinson, C.P.; Rockwood, S.D.; Jensen, R.J.; Lyman, J.L.; Aldridge, J.P. III.

1987-04-07T23:59:59.000Z

369

Laser isotope separation by multiple photon absorption  

DOE Patents [OSTI]

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1987-01-01T23:59:59.000Z

370

Active neutron multiplicity counting of bulk uranium  

SciTech Connect (OSTI)

This paper describes a new nondestructive assay technique being developed to assay bulk uranium containing kilogram quantities of {sup 235}U. The new technique uses neutron multiplicity analysis of data collected with a coincidence counter outfitted with AmLi neutron sources. We have calculated the expected neutron multiplicity count rate and assay precision for this technique and will report on its expected performance as a function of detector design characteristics, {sup 235 }U sample mass, AmLi source strength, and source-to-sample coupling. 11 refs., 2 figs., 2 tabs.

Ensslin, N.; Krick, M.S.; Langner, D.G.; Miller, M.C.

1991-01-01T23:59:59.000Z

371

Vulnerability of Northwestern  

E-Print Network [OSTI]

, USDA Forest Service Warren Lab, provided funding, inspiration, and a steady review of our analysis with geospatial data on their forest stands. We are grateful to Wendell Wallace, Laura Drake, Andrea Hille, Ed-parametric method of statistical analysis called Classification and Regression Tree analysis (CART) on data about

372

Nuclear Fuel Cycle & Vulnerabilities  

SciTech Connect (OSTI)

The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

Boyer, Brian D. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

373

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

not explain why the multiplicity was predicted only by the NRTL and UNIQUAC activity coefficient models

Skogestad, Sigurd

374

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

375

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

376

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

377

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

378

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

379

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs David A. Venditti and David L Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate estimation and Hessian-based anisotropic grid adaptation. Airfoil test cases are presented to demonstrate

Peraire, Jaime

380

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

382

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

383

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents  

SciTech Connect (OSTI)

The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

Not Available

1993-11-01T23:59:59.000Z

384

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

385

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

386

Multiplicity features of adiabatic autothermal reactors  

SciTech Connect (OSTI)

In this paper singularity theory, large activation energy asymptotic, and numerical methods are used to present a comprehensive study of the steady-state multiplicity features of three classical adiabatic autothermal reactor models: tubular reactor with internal heat exchange, tubular reactor with external heat exchange, and the CSTR with external heat exchange. Specifically, the authors derive the exact uniqueness-multiplicity boundary, determine typical cross-sections of the bifurcation set, and classify the different types of bifurcation diagrams of conversion vs. residence time. Asymptotic (limiting) models are used to determine analytical expressions for the uniqueness boundary and the ignition and extinction points. The analytical results are used to present simple, explicit and accurate expressions defining the boundary of the region of autothermal operation in the physical parameter space.

Lovo, M.; Balakotaiah, V. (Houston Univ., TX (United States). Dept. of Chemical Engineering)

1992-01-01T23:59:59.000Z

387

Intravalley Multiple Scattering of Quasiparticles in Graphene  

E-Print Network [OSTI]

We develop a theoretical description of intravalley scattering of quasiparticles in graphene from multiple short-range scatterers of size much greater than the carbon-carbon bond length. Our theory provides a method to rapidly calculate the Green's function in graphene for arbitrary configurations of scatterers. We demonstrate that non-collinear multiple scattering trajectories generate pseudospin rotations that alter quasiparticle interference, resulting in significant modifications to the shape, intensity, and pattern of the interference fringes in the local density of states (LDOS). We illustrate these effects via theoretical calculations of the LDOS for a variety of scattering configurations in single layer graphene. A clear understanding of impurity scattering in graphene is a step towards exploiting graphene's unique properties to build future devices.

J. Y. Vaishnav; Justin Q. Anderson; Jamie D. Walls

2011-05-28T23:59:59.000Z

388

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

389

Lamp method and apparatus using multiple reflections  

DOE Patents [OSTI]

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

MacLennan, D.A.; Turner, B.; Kipling, K.

1999-05-11T23:59:59.000Z

390

Lamp method and apparatus using multiple reflections  

DOE Patents [OSTI]

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

MacLennan, Donald A. (Butler, PA); Turner, Brian (Damascus, MD); Kipling, Kent (Gaithersburg, MD)

1999-01-01T23:59:59.000Z

391

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

392

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

393

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

394

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

395

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

396

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

397

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to...

398

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Broader source: Energy.gov (indexed) [DOE]

Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli...

399

Search for Short Lived Particles in High Multiplicity Environment  

E-Print Network [OSTI]

A method of statistical selection of short lived particles in high multiplicity nucleus-nucleus collisions is discussed.

Marek Gazdzicki; Waldemar Retyk; Jan Pluta

1999-04-14T23:59:59.000Z

400

Aalborg Universitet Hierarchical Control for Multiple DC Microgrids Clusters  

E-Print Network [OSTI]

Aalborg Universitet Hierarchical Control for Multiple DC Microgrids Clusters Shafiee, Qobad Control for Multiple DC Microgrids Clusters. I E E E Transactions on Energy Conversion. General rights, J. C. Vasquez, and J. M. Guerrero, "Hierarchical Control for Multiple DC-Microgrids Clusters," IEEE

Vasquez, Juan Carlos

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Statistical estimation of multiple faults in aircraft gas turbine engines  

E-Print Network [OSTI]

415 Statistical estimation of multiple faults in aircraft gas turbine engines S Sarkar, C Rao of multiple faults in aircraft gas-turbine engines, based on a statistical pattern recognition tool called commercial aircraft engine. Keywords: aircraft propulsion, gas turbine engines, multiple fault estimation

Ray, Asok

402

Entropic uncertainty relations for multiple measurements  

E-Print Network [OSTI]

We present the entropic uncertainty relations for multiple measurement settings in quantum mechanics. Those uncertainty relations are obtained for both cases with and without the presence of quantum memory. They take concise forms which can be proven in a unified method and easy to calculate. Our results recover the well known entropic uncertainty relations for two observables, which show the uncertainties about the outcomes of two incompatible measurements. Those uncertainty relations are applicable in both foundations of quantum theory and the security of many quantum cryptographic protocols.

Shang Liu; Liang-Zhu Mu; Heng Fan

2014-11-23T23:59:59.000Z

403

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

404

Analysis of Dynamic Multiplicity Fluctuations at PHOBOS  

E-Print Network [OSTI]

This paper presents the analysis of the dynamic fluctuations in the inclusive charged particle multiplicity measured by PHOBOS for Au+Au collisions at sqrt(s_NN)=200$GeV within the pseudo-rapidity range of -3analysis is presented, together with the discussion of their physics meaning. Then the procedure for the extraction of dynamic fluctuations is described. Some preliminary results are included to illustrate the correlation features of the fluctuation observable. New dynamic fluctuations results will be available in a later publication.

Zhengwei Chai; for the PHOBOS Collaboration

2005-09-20T23:59:59.000Z

405

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

406

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

407

Expression of multiple proteins in transgenic plants  

DOE Patents [OSTI]

A method is disclosed for the production of multiple proteins in transgenic plants. A DNA construct for introduction into plants includes a provision to express a fusion protein of two proteins of interest joined by a linking domain including plant ubiquitin. When the fusion protein is produced in the cells of a transgenic plant transformed with the DNA construction, native enzymes present in plant cells cleave the fusion protein to release both proteins of interest into the cells of the transgenic plant. Since the proteins are produced from the same fusion protein, the initial quantities of the proteins in the cells of the plant are approximately equal.

Vierstra, Richard D. (Madison, WI); Walker, Joseph M. (Madison, WI)

2002-01-01T23:59:59.000Z

408

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

409

Observation of laser multiple filamentation process and multiple electron beams acceleration in a laser wakefield accelerator  

SciTech Connect (OSTI)

The multiple filaments formation process in the laser wakefield accelerator (LWFA) was observed by imaging the transmitted laser beam after propagating in the plasma of different density. During propagation, the laser first self-focused into a single filament. After that, it began to defocus with energy spreading in the transverse direction. Two filaments then formed from it and began to propagate independently, moving away from each other. We have also demonstrated that the laser multiple filamentation would lead to the multiple electron beams acceleration in the LWFA via ionization-induced injection scheme. Besides, its influences on the accelerated electron beams were also analyzed both in the single-stage LWFA and cascaded LWFA.

Li, Wentao; Liu, Jiansheng; Wang, Wentao; Chen, Qiang; Zhang, Hui; Tian, Ye; Zhang, Zhijun; Qi, Rong; Wang, Cheng; Leng, Yuxin; Li, Ruxin; Xu, Zhizhan [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, P.O. Box 800-211, Shanghai 201800 (China)] [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, P.O. Box 800-211, Shanghai 201800 (China)

2013-11-15T23:59:59.000Z

410

Conjugate gradient algorithms using multiple recursions  

SciTech Connect (OSTI)

Much is already known about when a conjugate gradient method can be implemented with short recursions for the direction vectors. The work done in 1984 by Faber and Manteuffel gave necessary and sufficient conditions on the iteration matrix A, in order for a conjugate gradient method to be implemented with a single recursion of a certain form. However, this form does not take into account all possible recursions. This became evident when Jagels and Reichel used an algorithm of Gragg for unitary matrices to demonstrate that the class of matrices for which a practical conjugate gradient algorithm exists can be extended to include unitary and shifted unitary matrices. The implementation uses short double recursions for the direction vectors. This motivates the study of multiple recursion algorithms.

Barth, T.; Manteuffel, T.

1996-12-31T23:59:59.000Z

411

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

412

Multiplicity features of nonadiabatic, autothermal tubular reactors  

SciTech Connect (OSTI)

Singularity theory is combined with asymptotic analysis to determine the exact uniqueness-multiplicity boundary and ignition and extinction locus for the non-adiabatic, autothermal tubular reactor model. It is found that the steady-state behavior of the nonadiabatic reactor is described by the two limiting cases of adiabatic and strongly cooled models. The adiabatic case has been examined in a previous study. In this paper, the authors develop limiting models to describe the strongly cooled asymptotes. The authors also classify the different types of bifurcation diagrams of conversion vs. residence time using the results of singularity theory with a distinguished parameter. Analytical criteria are developed for predicting the conditions under which autothermal operation is feasible when heat losses are significant.

Lovo, M.; Balakotaiah, V. (Houston Univ., TX (United States). Dept. of Chemical Engineering)

1992-01-01T23:59:59.000Z

413

Multiple channel optical data acquisition system  

DOE Patents [OSTI]

A multiple channel optical data acquisition system is provided in which a plurality of remote sensors monitoring specific process variable are interrogated by means of a single optical fiber connecting the remote station/sensors to a base station. The remote station/sensors derive all power from light transmitted through the fiber from the base station. Each station/sensor is individually accessed by means of a light modulated address code sent over the fiber. The remote station/sensors use a single light emitting diode to both send and receive light signals to communicate with the base station and provide power for the remote station. The system described can power at least 100 remote station/sensors over an optical fiber one mile in length.

Fasching, G.E.; Goff, D.R.

1985-02-22T23:59:59.000Z

414

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

415

The frequency of planets in multiple systems  

E-Print Network [OSTI]

The frequency of planets in binaries is an important issue in the field of extrasolar planet studies, because of its relevance in estimating of the global planet population of our Galaxy and the clues it can give to our understanding of planet formation and evolution. However, only preliminary estimates are available in the literature. We analyze and compare the frequency of planets in multiple systems to the frequency of planets orbiting single stars. We also try to highlight possible connections between the frequency of planets and the orbital parameters of the binaries (such as the periastron and mass ratio.) A literature search was performed for binaries and multiple systems among the stars of the sample with uniform planet detectability defined by Fischer & Valenti (2005), and 202 of the 850 stars of the sample turned out to be binaries, allowing a statistical comparison of the frequency of planets in binaries and single stars and a study of the run of the planet frequency as a function of the binary separation. We found that the global frequency of planets in the binaries of the sample is not statistically different from that of planets in single stars. Even conservatively taking the probable incompleteness of binary detection in our sample into account, we estimate that the frequency of planets in binaries can be no more than a factor of three lower than that of planets in single stars. There is no significant dependence of planet frequency on the binary separation, except for a lower value of frequency for close binaries. However, this is probably not as low as required to explain the presence of planets in close binaries only as the result of modifications of the binary orbit after the planet formation.

M. Bonavita; S. Desidera

2007-03-29T23:59:59.000Z

416

Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on  

E-Print Network [OSTI]

OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having with national security establish practical responses to climate change and extreme weather events

417

Position Description: Ph.D. Student in Vegetation Modeling and Climate Vulnerability Montana State University is seeking a Ph.D. student for a NASA Applied Sciences project on  

E-Print Network [OSTI]

Information. An overview of the project can be found at (http://www.montana.edu/lccvp/) Application Procedures Montana State University is seeking a Ph.D. student for a NASA Applied Sciences project on vulnerability of biological resources under climate and land use change. The project will use NASA resources to inform climate

Hansen, Andrew J.

418

Aupetit, S., Riff, J., Gallier, V., & Espi, S. (2012). Conceptual and methodological tools for analyzing situations of vulnerability on the road. Examples from a motorcycle riding study. European Conference on Cognitive Ergonomics (ECCE), 28-31 August, Ed  

E-Print Network [OSTI]

Conference on Cognitive Ergonomics (ECCE), 28-31 August, Edinburgh, Scotland. Conceptual and methodological are conventionally used in transport research, and which have limitations for ergonomics research. Keywords of vulnerability when one or more of the dimensions that are given importance in ergonomics is hindered or impaired

Paris-Sud XI, Université de

419

Storms exploding off the surface of the sun can wreak havoc on technologies like satellites, phones, GPS, and electrical power grids. As society's dependence on these technologies grows, so does our vulnerability to changes on the Sun and in space.  

E-Print Network [OSTI]

Storms exploding off the surface of the sun can wreak havoc on technologies like satellites, phones vulnerability to changes on the Sun and in space. For example, GPS is present in almost all aspects of our is expected to total $75 billion by 2013. Meanwhile, the Sun is approaching a heightened period of activity

420

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

422

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

423

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

424

Structuring Materials on Multiple Length Scales for Energy Application...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Structuring Materials on Multiple Length Scales for Energy Applications October 25, 2012 at 3pm36-428 Adreas Stein Department of Chemistry, University of Minnesota astein...

425

activates multiple metabolic: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for nearly all of the carbohydrate catabolized. The combination of energy utilization Bennett, Albert F. 3 Multiple-instance active learning CiteSeer Summary: We present a...

426

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

427

Energetics and Dynamics of Peptide Fragmentation from Multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of peptides containing the LDIFSDF motif. Citation: Laskin J.2004."Energetics and Dynamics of Peptide Fragmentation from Multiple-Collision Activation and Surface-Induced...

428

Multiple capillary biochemical analyzer with barrier member  

DOE Patents [OSTI]

A multiple capillary biochemical analyzer is disclosed for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal-to-noise ratio. 12 figs.

Dovichi, N.J.; Zhang, J.Z.

1996-10-22T23:59:59.000Z

429

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

430

Nanoparticles modified with multiple organic acids  

DOE Patents [OSTI]

Surface-modified nanoparticles of boehmite, and methods for preparing the same. Aluminum oxyhydroxide nanoparticles are surface modified by reaction with selected amounts of organic acids. In particular, the nanoparticle surface is modified by reactions with two or more different carboxylic acids, at least one of which is an organic carboxylic acid. The product is a surface modified boehmite nanoparticle that has an inorganic aluminum oxyhydroxide core, or part aluminum oxyhydroxide core and a surface-bonded organic shell. Organic carboxylic acids of this invention contain at least one carboxylic acid group and one carbon-hydrogen bond. One embodiment of this invention provides boehmite nanoparticles that have been surface modified with two or more acids one of which additional carries at least one reactive functional group. Another embodiment of this invention provides boehmite nanoparticles that have been surface modified with multiple acids one of which has molecular weight or average molecular weight greater than or equal to 500 Daltons. Yet, another embodiment of this invention provides boehmite nanoparticles that are surface modified with two or more acids one of which is hydrophobic in nature and has solubility in water of less than 15 by weight. The products of the methods of this invention have specific useful properties when used in mixture with liquids, as filler in solids, or as stand-alone entities.

Cook, Ronald Lee (Lakewood, CO); Luebben, Silvia DeVito (Golden, CO); Myers, Andrew William (Arvada, CO); Smith, Bryan Matthew (Boulder, CO); Elliott, Brian John (Superior, CO); Kreutzer, Cory (Brighton, CO); Wilson, Carolina (Arvada, CO); Meiser, Manfred (Aurora, CO)

2007-07-17T23:59:59.000Z

431

Knowledge Framework Implementation with Multiple Architectures - 13090  

SciTech Connect (OSTI)

Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami, FL 33174 (United States)] [Applied Research Center, Florida International University, Miami, FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)] [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

2013-07-01T23:59:59.000Z

432

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

433

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

434

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

435

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

436

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

437

Objectives for Multiple-Species Conservation EMILY NICHOLSON  

E-Print Network [OSTI]

of extinction for multiple species. Although the assessment of extinction risk for single species is common, few researchers have formu- lated an objective function that combines the extinction risks of multiple species. We functions based on extinction risk across many species and illustrated the differences between

Queensland, University of

438

SUPPORTING END-TO-END SECURITY ACROSS PROXIES WITH MULTIPLE-  

E-Print Network [OSTI]

SUPPORTING END-TO-END SECURITY ACROSS PROXIES WITH MULTIPLE- CHANNEL SSL Yong Song, Victor C Columbia, 2356 Main Mall, Vancouver, BC V6T 1Z4, Canada Abstract: Secure Socket Layer (SSL) has functional used by clients to communicate with servers. This paper introduces Multiple-Channel SSL (MC-SSL

439

Linearly Exchangable Permits for the Efficient Control of Multiple Pollutants  

E-Print Network [OSTI]

PWP-019 Linearly Exchangable Permits for the Efficient Control of Multiple Pollutants James B;Linear Exchangeable Permits for the Ecient Control of Multiple Pollutants James B. Bushnell University of pollutants. Often a new polluter is required to purchase an "o-set" from an existing polluter prepared

California at Berkeley. University of

440

The Energy Harvesting Multiple Access Channel with Energy Storage Losses  

E-Print Network [OSTI]

The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

Yener, Aylin

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Properties of Iterated Multiple Belief Revision Dongmo Zhang  

E-Print Network [OSTI]

in the community of belief revision[2][5][9][10][13][17]. The major concern in the research is the reducibilityProperties of Iterated Multiple Belief Revision Dongmo Zhang School of Computing and Information investigate the properties of iterated multiple belief revision. We examine several typical assumptions

Zhang, Dongmo

442

Multiple Blind Watermarking in the DRM-Context  

E-Print Network [OSTI]

Multiple Blind Watermarking in the DRM-Context #12;#12;Multiple Blind Watermarking in the DRM have helped me throughout my master thesis in one or the other way. I want to thank my supervisor Andreas Uhl who guided me through my master thesis and supported me much more than a supervisor has to. I

Uhl, Andreas

443

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

444

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

445

CURVES OF GENUS 2 WITH p 2 MULTIPLICATION  

E-Print Network [OSTI]

thesis, which looks at curves of genus 2 whose jacobians have p 2 multiplication, with the generalisedCURVES OF GENUS 2 WITH p 2 MULTIPLICATION PETER R. BENDING Abstract We give a universal family, and let f be a newform on \\Gamma 1 (N) whose field of Fourier coefficients is F (F is a totally real field

446

Transdichotomous algorithms without multiplication some upper and lower bounds  

E-Print Network [OSTI]

Trans­dichotomous algorithms without multiplication ­ some upper and lower bounds Andrej Brodnik 1 that on a RAM with addition, subtraction, bitwise Boolean operations and shifts, but no multiplication; 1g w of w­bit bit strings (or numbers between 0 and 2 w \\Gamma 1). An increasingly popular

Brodnik, Andrej "Andy"

447

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

448

Control of Multiple Robotic Sentry Vehicles  

SciTech Connect (OSTI)

As part of a project for the Defense Advanced Research Projects Agency, Sandia National Laboratories is developing and testing the feasibility of using of a cooperative team of robotic sentry vehicles to guard a perimeter and to perform surround and diversion tasks. This paper describes on-going activities in the development of these robotic sentry vehicles. To date, we have developed a robotic perimeter detection system which consists of eight ''Roving All Terrain Lunar Explorer Rover'' (RATLER{trademark}) vehicles, a laptop-based base-station, and several Miniature Intrusion Detection Sensors (MIDS). A radio frequency receiver on each of the RATLER vehicles alerts the sentry vehicles of alarms from the hidden MIDS. When an alarm is received, each vehicle decides whether it should investigate the alarm based on the proximity of itself and the other vehicles to the alarm. As one vehicle attends an alarm, the other vehicles adjust their position around the perimeter to better prepare for another alarm. We have also demonstrated the ability to drive multiple vehicles in formation via tele-operation or by waypoint GPS navigation. This is currently being extended to include mission planning capabilities. At the base-station, the operator can draw on an aerial map the goal regions to be surrounded and the repulsive regions to be avoided. A potential field path planner automatically generates a path from the vehicles' current position to the goal regions while avoiding the repulsive regions and the other vehicles. This path is previewed to the operator before the regions are downloaded to the vehicles. The same potential field path planner resides on the vehicle, except additional repulsive forces from on-board proximity sensors guide the vehicle away from unplanned obstacles.

Feddema, J.; Klarer, P.; Lewis, C.

1999-04-01T23:59:59.000Z

449

Multiple anatomy optimization of accumulated dose  

SciTech Connect (OSTI)

Purpose: To investigate the potential advantages of multiple anatomy optimization (MAO) for lung cancer radiation therapy compared to the internal target volume (ITV) approach. Methods: MAO aims to optimize a single fluence to be delivered under free-breathing conditions such that the accumulated dose meets the plan objectives, where accumulated dose is defined as the sum of deformably mapped doses computed on each phase of a single four dimensional computed tomography (4DCT) dataset. Phantom and patient simulation studies were carried out to investigate potential advantages of MAO compared to ITV planning. Through simulated delivery of the ITV- and MAO-plans, target dose variations were also investigated. Results: By optimizing the accumulated dose, MAO shows the potential to ensure dose to the moving target meets plan objectives while simultaneously reducing dose to organs at risk (OARs) compared with ITV planning. While consistently superior to the ITV approach, MAO resulted in equivalent OAR dosimetry at planning objective dose levels to within 2% volume in 14/30 plans and to within 3% volume in 19/30 plans for each lung V20, esophagus V25, and heart V30. Despite large variations in per-fraction respiratory phase weights in simulated deliveries at high dose rates (e.g., treating 4/10 phases during single fraction beams) the cumulative clinical target volume (CTV) dose after 30 fractions and per-fraction dose were constant independent of planning technique. In one case considered, however, per-phase CTV dose varied from 74% to 117% of prescription implying the level of ITV-dose heterogeneity may not be appropriate with conventional, free-breathing delivery. Conclusions: MAO incorporates 4DCT information in an optimized dose distribution and can achieve a superior plan in terms of accumulated dose to the moving target and OAR sparing compared to ITV-plans. An appropriate level of dose heterogeneity in MAO plans must be further investigated.

Watkins, W. Tyler, E-mail: watkinswt@virginia.edu; Siebers, Jeffrey V. [Department of Radiation Oncology, University of Virginia, Charlottesville, Virginia 22908 and Department of Radiation Oncology, Virginia Commonwealth University, Richmond, Virginia 23298 (United States); Moore, Joseph A. [Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins University, Baltimore, Maryland 21231 and Department of Radiation Oncology, Virginia Commonwealth University, Richmond, Virginia 23298 (United States); Gordon, James [Henry Ford Health System, Detroit, Michigan 48202 and Department of Radiation Oncology, Virginia Commonwealth University, Richmond, Virginia 23298 (United States); Hugo, Geoffrey D. [Department of Radiation Oncology, Virginia Commonwealth University, Richmond, Virginia 23298 (United States)

2014-11-01T23:59:59.000Z

450

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents [OSTI]

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

451

Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report  

SciTech Connect (OSTI)

This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

NONE

1994-09-01T23:59:59.000Z

452

High Multiplicity Searches at the LHC Using Jet Masses  

SciTech Connect (OSTI)

This article introduces a new class of searches for physics beyond the Standard Model that improves the sensitivity to signals with high jet multiplicity. The proposed searches gain access to high multiplicity signals by reclustering events into large-radius, or 'fat', jets and by requiring that each event has multiple massive jets. This technique is applied to supersymmetric scenarios in which gluinos are pair-produced and then subsequently decay to final states with either moderate quantities of missing energy or final states without missing energy. In each of these scenarios, the use of jet mass improves the estimated reach in gluino mass by 20% to 50% over current LHC searches.

Hook, Anson; /SLAC /Stanford U., Appl. Phys. Dept.; Izaguirre, Eder; /SLAC /Stanford U., Phys. Dept.; Lisanti, Mariangela; /Princeton U.; Wacker, Jay G.; /SLAC /Stanford U., ITP

2012-04-24T23:59:59.000Z

453

Numerical Results on Low Mass Star and Brown Dwarf Multiplicity  

E-Print Network [OSTI]

We have undertaken a series of hydrodynamic + N-body simulations in order to explore the properties of young stars. Our results suggest that the IMF may be sensitive to environment in its substellar region, with more brown dwarfs being formed where clusters are denser or more compact. We find that multiple stars are a natural outcome of collapsing turbulent flows, with a high incidence of N > 2 multiples. We find a positive correlation of multiplicity with primary mass but a companion frequency that decreases with age. Binary brown dwarfs are rarely formed, in conflict with observations. Brown dwarfs as companions are predominantly found orbiting binaries or triples at large separations.

Eduardo Delgado-Donate; Cathie Clarke

2004-12-17T23:59:59.000Z

454

A Single-Product Inventory Model for Multiple Demand Classes  

E-Print Network [OSTI]

We consider a single-product inventory system that serves multiple demand classes, which differ in their shortage costs or service level requirements. We assume a critical-level control policy, and show the equivalence ...

Arslan, Hasan

2005-05-27T23:59:59.000Z

455

A simulation environment for multiple project resource optimization  

E-Print Network [OSTI]

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

456

Governance Through Trading and Intervention: A Theory of Multiple Blockholders  

E-Print Network [OSTI]

Traditional theories argue that governance is strongest under a single large blockholder, as she has high incentives to undertake value-enhancing interventions. However, most firms are held by multiple small blockholders. ...

Edmans, Alex

457

Integrating automobile multiple intelligent warning systems : performance and policy implications  

E-Print Network [OSTI]

Intelligent driver warning systems can be found in many high-end vehicles on the road today, which will likely rapidly increase as they become standard equipment. However, introducing multiple warning systems into vehicles ...

Ho, Angela Wei Ling

2006-01-01T23:59:59.000Z

458

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network [OSTI]

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

459

Stochastic Steepest-Descent Optimization of Multiple-Objective ...  

E-Print Network [OSTI]

among flows without bookkeeping of past service received by each flow. ... The notion of optimal balance between multiple performance objectives is .... In sensor net- works, the .... action space is usually parameterized by a finite number.

2010-03-17T23:59:59.000Z

460

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network [OSTI]

Objective: To explore how a single master alarm system affects drivers responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

462

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network [OSTI]

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

463

Coupled Dynamic Analysis of Multiple Unit Floating Offshore Wind Turbine  

E-Print Network [OSTI]

In the present study, a numerical simulation tool has been developed for the rotor-floater-tether coupled dynamic analysis of Multiple Unit Floating Offshore Wind Turbine (MUFOWT) in the time domain including aero-blade-tower dynamics and control...

Bae, Yoon Hyeok

2013-04-23T23:59:59.000Z

464

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network [OSTI]

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

465

On the polar cap cascade pair multiplicity of young pulsars  

E-Print Network [OSTI]

We study the efficiency of pair production in polar caps of young pulsars under a variety of conditions to estimate the maximum possible multiplicity of pair plasma in pulsar magnetospheres. We develop a semi-analytic model for calculation of cascade multiplicity which allows efficient exploration of the parameter space and corroborate it with direct numerical simulations. Pair creation processes are considered separately from particle acceleration in order to assess different factors affecting cascade efficiency, with acceleration of primary particles described by recent self-consistent non-stationary model of pair cascades. We argue that the most efficient cascades operate in the curvature radiation/synchrotron regime, the maximum multiplicity of pair plasma in pulsar magnetospheres is ~few x 10^5. The multiplicity of pair plasma in magnetospheres of young energetic pulsars weakly depends on the strength of the magnetic field and the radius of curvature of magnetic field lines and has a stronger dependence ...

Timokhin, A N

2015-01-01T23:59:59.000Z

466

Climate Determinism Revisited: Multiple Equilibria in a Complex Climate Model  

E-Print Network [OSTI]

Multiple equilibria in a coupled oceanatmospheresea ice general circulation model (GCM) of an aquaplanet with many degrees of freedom are studied. Three different stable states are found for exactly the same set of ...

Ferreira, David

467

TPA Code of Honor Guidelines Multiple Subject Credential Program  

E-Print Network [OSTI]

8/10 TPA Code of Honor Guidelines Multiple Subject Credential Program California State University, Fullerton The California TPA involves a series of take-home tasks that measure a teacher candidate's ability

de Lijser, Peter

468

CONSENSUS SEEKING, FORMATION KEEPING, AND TRAJECTORY TRACKING IN MULTIPLE VEHICLE  

E-Print Network [OSTI]

to mobile robots, unmanned air vehicles, autonomous underwater vehicles, satellites, aircraft, spacecraft controllers for fixed wing unmanned air vehicles and nonholonomic mobile robots with velocity and heading rateCONSENSUS SEEKING, FORMATION KEEPING, AND TRAJECTORY TRACKING IN MULTIPLE VEHICLE COOPERATIVE

Ren, Wei

469

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network [OSTI]

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

470

On Computing Multiple Solutions of Nonlinear PDEs Without Variational Structure  

E-Print Network [OSTI]

ON COMPUTING MULTIPLE SOLUTIONS OF NONLINEAR PDES WITHOUT VARIATIONAL STRUCTURE A Dissertation by CHANGCHUN WANG Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree... of DOCTOR OF PHILOSOPHY May 2012 Major Subject: Mathematics ON COMPUTING MULTIPLE SOLUTIONS OF NONLINEAR PDES WITHOUT VARIATIONAL STRUCTURE A Dissertation by CHANGCHUN WANG Submitted to the O ce of Graduate Studies of Texas A&M University in partial...

Wang, Changchun

2012-07-16T23:59:59.000Z

471

Collective modes in multiband superfluids and superconductors: Multiple dynamical classes  

SciTech Connect (OSTI)

One important way to characterize the states having a gauge symmetry spontaneously broken over multibands is to look at their collective excitation modes. We find that a three-band system has multiple Leggett modes with significantly different masses, which can be classified into different dynamical classes according to whether multiple interband Josephson currents add or cancel. This provides a way to dynamically characterize multiband superconductivity while the pairing symmetry is a static property.

Ota, Yukihiro [CCSE, Japan Atomic Energy Agency, Higashi-Ueno, Tokyo 110-0015 (Japan); CREST (JST), Honcho, Kawaguchi, Saitama 332-0012 (Japan); Machida, Masahiko [CCSE, Japan Atomic Energy Agency, Higashi-Ueno, Tokyo 110-0015 (Japan); CREST (JST), Honcho, Kawaguchi, Saitama 332-0012 (Japan) and JST, TRIP, Sanbancho, Tokyo 102-0075 (Japan); Koyama, Tomio [CREST (JST), Honcho, Kawaguchi, Saitama 332-0012 (Japan) and Institute for Materials Research, Tohoku University, Katahira, Sendai 980-8577 (Japan); Aoki, Hideo [JST, TRIP, Sanbancho, Tokyo 102-0075 (Japan); Department of Physics, University of Tokyo, Hongo, Tokyo 113-0033 (Japan)

2011-02-01T23:59:59.000Z

472

Design and Analysis of Flexible Biodiesel Processes with Multiple Feedstocks  

E-Print Network [OSTI]

DESIGN AND ANALYSIS OF FLEXIBLE BIODIESEL PROCESSES WITH MULTIPLE FEEDSTOCKS A Dissertation by GRACE AMARACHUKWU POKOO-AIKINS Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2010 Major Subject: Chemical Engineering DESIGN AND ANALYSIS OF FLEXIBLE BIODIESEL PROCESSES WITH MULTIPLE FEEDSTOCKS A Dissertation by GRACE AMARACHUKWU POKOO...

Pokoo-Aikins, Grace Amarachukwu

2011-10-21T23:59:59.000Z

473

High mass throughput particle generation using multiple nozzle spraying  

DOE Patents [OSTI]

Spraying apparatus and methods that employ multiple nozzle structures for producing multiple sprays of particles, e.g., nanoparticles, for various applications, e.g., pharmaceuticals, are provided. For example, an electrospray dispensing device may include a plurality of nozzle structures, wherein each nozzle structure is separated from adjacent nozzle structures by an internozzle distance. Sprays of particles are established from the nozzle structures by creating a nonuniform electrical field between the nozzle structures and an electrode electrically isolated therefrom.

Pui, David Y. H. (Plymouth, MN); Chen, Da-Ren (Creve Coeur, MO)

2009-03-03T23:59:59.000Z

474

Northeast Climate Science Center Webinar- Making Decision in Complex Landscapes: Headwater Stream Management Across Multiple Agencies Using Structured Decision Making  

Office of Energy Efficiency and Renewable Energy (EERE)

There is growing evidence that headwater stream ecosystems are vulnerable to changing climate and land use, but their conservation is challenged by the need to address the threats at a landscape...

475

FUEL CASK IMPACT LIMITER VULNERABILITIES  

SciTech Connect (OSTI)

Cylindrical fuel casks often have impact limiters surrounding just the ends of the cask shaft in a typical 'dumbbell' arrangement. The primary purpose of these impact limiters is to absorb energy to reduce loads on the cask structure during impacts associated with a severe accident. Impact limiters are also credited in many packages with protecting closure seals and maintaining lower peak temperatures during fire events. For this credit to be taken in safety analyses, the impact limiter attachment system must be shown to retain the impact limiter following Normal Conditions of Transport (NCT) and Hypothetical Accident Conditions (HAC) impacts. Large casks are often certified by analysis only because of the costs associated with testing. Therefore, some cask impact limiter attachment systems have not been tested in real impacts. A recent structural analysis of the T-3 Spent Fuel Containment Cask found problems with the design of the impact limiter attachment system. Assumptions in the original Safety Analysis for Packaging (SARP) concerning the loading in the attachment bolts were found to be inaccurate in certain drop orientations. This paper documents the lessons learned and their applicability to impact limiter attachment system designs.

Leduc, D; Jeffery England, J; Roy Rothermel, R

2009-02-09T23:59:59.000Z

476

Vulnerability Scanning Policy 1 Introduction  

E-Print Network [OSTI]

component of any computer security plan as it provides feedback on the effectiveness of security procedures

477

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

478

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network [OSTI]

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains Neural coding Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

479

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

480

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 20, 2012...

Note: This page contains sample records for the topic "multiple unspecified vulnerabilities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 20, 2012...

482

ARCHITECTURE AND DYNAMICS OF KEPLER'S CANDIDATE MULTIPLE TRANSITING PLANET SYSTEMS  

SciTech Connect (OSTI)

About one-third of the {approx}1200 transiting planet candidates detected in the first four months of Kepler data are members of multiple candidate systems. There are 115 target stars with two candidate transiting planets, 45 with three, 8 with four, and 1 each with five and six. We characterize the dynamical properties of these candidate multi-planet systems. The distribution of observed period ratios shows that the vast majority of candidate pairs are neither in nor near low-order mean-motion resonances. Nonetheless, there are small but statistically significant excesses of candidate pairs both in resonance and spaced slightly too far apart to be in resonance, particularly near the 2:1 resonance. We find that virtually all candidate systems are stable, as tested by numerical integrations that assume a nominal mass-radius relationship. Several considerations strongly suggest that the vast majority of these multi-candidate systems are true planetary systems. Using the observed multiplicity frequencies, we find that a single population of planetary systems that matches the higher multiplicities underpredicts the number of singly transiting systems. We provide constraints on the true multiplicity and mutual inclination distribution of the multi-candidate systems, revealing a population of systems with multiple super-Earth-size and Neptune-size planets with low to moderate mutual inclinations.

Lissauer, Jack J.; Jenkins, Jon M.; Borucki, William J.; Bryson, Stephen T.; Howell, Steve B. [NASA Ames Research Center, Moffett Field, CA 94035 (United States); Ragozzine, Darin; Holman, Matthew J.; Carter, Joshua A. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA 02138 (United States); Fabrycky, Daniel C.; Fortney, Jonathan J. [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Steffen, Jason H. [Fermilab Center for Particle Astrophysics, Batavia, IL 60510 (United States); Ford, Eric B. [211 Bryant Space Science Center, University of Florida, Gainesville, FL 32611 (United States); Shporer, Avi [Las Cumbres Observatory Global Telescope Network, Santa Barbara, CA 93117 (United States); Rowe, Jason F.; Quintana, Elisa V.; Caldwell, Douglas A. [SETI Institute/NASA Ames Research Center, Moffett Field, CA 94035 (United States); Batalha, Natalie M. [Department of Physics and Astronomy, San Jose State University, San Jose, CA 95192 (United States); Ciardi, David [Exoplanet Science Institute/Caltech, Pasadena, CA 91125 (United States); Dunham, Edward W. [Lowell Observatory, Flagstaff, AZ 86001 (United States); Gautier, Thomas N. III, E-mail: Jack.Lissauer@nasa.gov [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109 (United States); and others

2011-11-01T23:59:59.000Z

483

Diagnosing multiplicative error by lensing magnification of type Ia supernovae  

E-Print Network [OSTI]

Weak lensing causes spatially coherent fluctuations in flux of type Ia supernovae (SNe Ia). This lensing magnification allows for weak lensing measurement independent of cosmic shear. It is free of shape measurement errors associated with cosmic shear and can therefore be used to diagnose and calibrate multiplicative error. Although this lensing magnification is difficult to measure accurately in auto correlation, its cross correlation with cosmic shear and galaxy distribution in overlapping area can be measured to significantly higher accuracy. Therefore these cross correlations can put useful constraint on multiplicative error, and the obtained constraint is free of cosmic variance in weak lensing field. We present two methods implementing this idea and estimate their performances. We find that, with $\\sim 1$ million SNe Ia that can be achieved by the proposed D2k survey with the LSST telescope (Zhan et al. 2008), multiplicative error of $\\sim 0.5\\%$ for source galaxies at $z_s\\sim 1$ can be detected and la...

Zhang, Pengjie

2015-01-01T23:59:59.000Z

484

FB-line neutron multiplicity counter operation manual  

SciTech Connect (OSTI)

This manual describes the design features, performance, and operating characteristics for the FB-Line Neutron Multiplicity counter (FBLNMC). The FBLNMC counts neutron multiplicities to quantitatively assay plutonium in many forms, including impure scrap and waste. Monte Carlo neutronic calculations were used to design the high-efficiency (57%) detector that has 113 {sup 3}He tubes in a high-density polyethylene body. The new derandomizer circuit is included in the design to reduce deadtime. The FBLNMC can be applied to plutonium masses in the range from a few tens of grams to 5 kg; both conventional coincidence counting and multiplicity counting can be used as appropriate. This manual gives the performance data and preliminary calibration parameters for the FBLNMC.

Langner, D.G.; Sweet, M.R.; Salazar, S.D.; Kroncke, K.E.

1997-12-31T23:59:59.000Z

485

How to induce multiple delays in coupled chaotic oscillators?  

SciTech Connect (OSTI)

Lag synchronization is a basic phenomenon in mismatched coupled systems, delay coupled systems, and time-delayed systems. It is characterized by a lag configuration that identifies a unique time shift between all pairs of similar state variables of the coupled systems. In this report, an attempt is made how to induce multiple lag configurations in coupled systems when different pairs of state variables attain different time shift. A design of coupling is presented to realize this multiple lag synchronization. Numerical illustration is given using examples of the Rssler system and the slow-fast Hindmarsh-Rose neuron model. The multiple lag scenario is physically realized in an electronic circuit of two Sprott systems.

Bhowmick, Sourav K. [CSIR-Indian Institute of Chemical Biology, Jadavpur, Kolkata 700032 (India) [CSIR-Indian Institute of Chemical Biology, Jadavpur, Kolkata 700032 (India); Department of Electronics, Asutosh College, Kolkata 700026 (India); Ghosh, Dibakar [Physics and Applied Mathematics Unit, Indian Statistical Institute, Kolkata 700108 (India)] [Physics and Applied Mathematics Unit, Indian Statistical Institute, Kolkata 700108 (India); Roy, Prodyot K. [Department of Physics, Presidency University, Kolkata 700073 (India)] [Department of Physics, Presidency University, Kolkata 700073 (India); Kurths, Jrgen [Potsdam Institute for Climate Impact Research, 14473 Potsdam (Germany) [Potsdam Institute for Climate Impact Research, 14473 Potsdam (Germany); Institute for Physics, Humboldt University, 12489 Berlin (Germany); Dana, Syamal K. [CSIR-Indian Institute of Chemical Biology, Jadavpur, Kolkata 700032 (India)] [CSIR-Indian Institute of Chemical Biology, Jadavpur, Kolkata 700032 (India)

2013-12-15T23:59:59.000Z

486

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network [OSTI]

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

487

Fitting Parton Distribution Data with Multiplicative Normalization Uncertainties  

E-Print Network [OSTI]

We consider the generic problem of performing a global fit to many independent data sets each with a different overall multiplicative normalization uncertainty. We show that the methods in common use to treat multiplicative uncertainties lead to systematic biases. We develop a method which is unbiased, based on a self--consistent iterative procedure. We demonstrate the use of this method by applying it to the determination of parton distribution functions with the NNPDF methodology, which uses a Monte Carlo method for uncertainty estimation.

The NNPDF Collaboration; Richard D. Ball; Luigi Del Debbio; Stefano Forte; Alberto Guffanti; Jose I. Latorre; Juan Rojo; Maria Ubiali

2010-06-01T23:59:59.000Z

488

Graphical functions and single-valued multiple polylogarithms  

E-Print Network [OSTI]

Graphical functions are single-valued complex functions which arise from Feynman amplitudes. We study their properties and use their connection to multiple polylogarithms to calculate Feynman periods. For the zig-zag and two more families of phi^4 periods we give exact results modulo products. These periods are proved to be expressible as integer linear combinations of single-valued multiple polylogarithms evaluated at one. For the larger family of 'constructible' graphs we give an algorithm that allows one to calculate their periods by computer algebra. The theory of graphical functions is used to prove the zig-zag conjecture.

Oliver Schnetz

2014-11-11T23:59:59.000Z

489

Using Multiple Unmanned Systems for a Site Security Task  

SciTech Connect (OSTI)

Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

2009-04-01T23:59:59.000Z

490

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network [OSTI]

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

491

Comparing Single and Multiple Turbine Representations in a Wind Farm Simulation: Preprint  

SciTech Connect (OSTI)

This paper compares single turbine representation versus multiple turbine representation in a wind farm simulation.

Muljadi, E.; Parsons, B.

2006-03-01T23:59:59.000Z

492

Risk Forecasting with GARCH, Skewed t Distributions, and Multiple Timescales  

E-Print Network [OSTI]

Risk Forecasting with GARCH, Skewed t Distributions, and Multiple Timescales Alec N. Kercheval describe how the histori- cal data can first be GARCH filtered and then used to calibrate parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.2 Data and Stylized Facts . . . . . . . . . . . . . . . . . . . . . . . 16 3.3 GARCH Filter

493

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network [OSTI]

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

494

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

495

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network [OSTI]

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model...

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

496

TROPICAL MULTIPLICATION MAPS AND THE GIESEKER-PETRI THEOREM  

E-Print Network [OSTI]

TROPICAL MULTIPLICATION MAPS AND THE GIESEKER-PETRI THEOREM DAVID JENSEN AND SAM PAYNE Abstract. We. Supported in part by NSF grants DMS1068689 and CAREER DMS1149054. 1 #12;2 DAVID JENSEN AND SAM PAYNE v1 w1 by the addition or deletion of a bridge are canonically isomorphic, and these isomorphisms respect the images of the

Payne, Sam

497

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

498

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network [OSTI]

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

499

Multiplicity theorems modulo p for GL2(Qp) Stefano Morra  

E-Print Network [OSTI]

Multiplicity theorems modulo p for GL2(Qp) Stefano Morra Abstract Let F be a non-archimedean local field, an admissible irreducible GL2(F)-representation with complex coefficients. For a quadratic correspondence for GL2(Qp). We describe the restriction to Cartan subgroups of an irreducible p

Paris-Sud XI, Université de

500

Applying Quadrature Rules with Multiple Nodes to Solving Integral Equations  

SciTech Connect (OSTI)

There are many procedures for the numerical solution of Fredholm integral equations. The main idea in these procedures is accuracy of the solution. In this paper, we use Gaussian quadrature with multiple nodes to improve the solution of these integral equations. The application of this method is illustrated via some examples, the related tables are given at the end.

Hashemiparast, S. M. [Department of Mathematics, Islamic Azad University Karaj Branch, K. N. Toosi University of Technology, Tehran (Iran, Islamic Republic of); Avazpour, L. [Department of Mathematics, K. N. Toosi University of Technology, P.O. Box 16315-1618 (Iran, Islamic Republic of)

2008-09-01T23:59:59.000Z