National Library of Energy BETA

Sample records for multiple vulnerabilities platform

  1. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  2. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, ...

  3. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  4. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  5. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  6. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  7. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are

  8. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  9. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  10. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  11. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  12. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  13. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  14. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  15. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  16. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  17. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  18. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  19. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  20. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  1. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  2. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  3. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  4. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  5. U-035: Adobe Flash Player Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Impact: Multiple vulnerabilities have been reported in Adobe ...

  6. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  7. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  8. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  9. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  10. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  11. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  12. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  13. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  14. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  15. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  16. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  17. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  18. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  19. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  20. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  1. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  2. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  3. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  4. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur.

  5. Robotic vehicle with multiple tracked mobility platforms

    DOE Patents [OSTI]

    Salton, Jonathan R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM); Garretson, Justin (Albuquerque, NM); Hayward, David R. (Wetmore, CO); Hobart, Clinton G. (Albuquerque, NM); Deuel, Jr., Jamieson K. (Albuquerque, NM)

    2012-07-24

    A robotic vehicle having two or more tracked mobility platforms that are mechanically linked together with a two-dimensional coupling, thereby forming a composite vehicle of increased mobility. The robotic vehicle is operative in hazardous environments and can be capable of semi-submersible operation. The robotic vehicle is capable of remote controlled operation via radio frequency and/or fiber optic communication link to a remote operator control unit. The tracks have a plurality of track-edge scallop cut-outs that allow the tracks to easily grab onto and roll across railroad tracks, especially when crossing the railroad tracks at an oblique angle.

  6. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  7. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  8. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  9. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  10. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  11. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  12. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  13. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  14. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  15. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  16. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  17. V-132: IBM Tivoli System Automation Application Manager Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security

  18. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  19. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  20. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl

  1. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  2. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 45: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1

  3. Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms

    SciTech Connect (OSTI)

    Williams, Samuel; Oliker, Leonid; Vuduc, Richard; Shalf, John; Yelick, Katherine; Demmel, James

    2008-10-16

    We are witnessing a dramatic change in computer architecture due to the multicore paradigm shift, as every electronic device from cell phones to supercomputers confronts parallelism of unprecedented scale. To fully unleash the potential of these systems, the HPC community must develop multicore specific-optimization methodologies for important scientific computations. In this work, we examine sparse matrix-vector multiply (SpMV) - one of the most heavily used kernels in scientific computing - across a broad spectrum of multicore designs. Our experimental platform includes the homogeneous AMD quad-core, AMD dual-core, and Intel quad-core designs, the heterogeneous STI Cell, as well as one of the first scientific studies of the highly multithreaded Sun Victoria Falls (a Niagara2 SMP). We present several optimization strategies especially effective for the multicore environment, and demonstrate significant performance improvements compared to existing state-of-the-art serial and parallel SpMV implementations. Additionally, we present key insights into the architectural trade-offs of leading multicore design strategies, in the context of demanding memory-bound numerical algorithms.

  4. Poly(dimethylsiloxane) microchip-based immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform

    SciTech Connect (OSTI)

    Shao, Guocheng; Wang, Jun; Li, Zhaohui; Saraf, Laxmikant V.; Wang, Wanjun; Lin, Yuehe

    2011-09-20

    In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing platform with integrated pneumatic micro valves is described. The microchip was fabricated with multiple layer soft lithography technology. By controlling the activation status of corresponding valves, reagent flows in the microchannel network can be well manipulated so that immuno-reactions only take place at designated reaction zones (DRZs). Four DRZs are included in the prototype microchip. Since these DRZs are all isolated from each other by micro valves, cross contamination is prevented. Using the inner surface of the all-PDMS microchannel as immunoassay substrate, on-chip sandwich format solid phase immunoassay was performed to demonstrate the feasibility of this immuno-sensing platform. Mouse IgG and fluorescein isothiocyanate (FITC) were used as the model analyte and the signal reporter respectively. Only 10 ul sample is needed for the assay and low detection limit of 5 ng/ml (?33 pM) was achieved though low-cost polyclonal antibodies were used in our experiment for feasibility study only. The encouraging results from mouse IgG immunoassay proved the feasibility of our microchip design. With slight modification of the assay protocol, the same chip design can be used for multi-target detection and can provide a simple, cost-effective and integrated microchip solution for multiplex immunoassay applications.

  5. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-179: IBM Java 7 Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  6. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  7. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  8. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  9. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  10. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  11. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis...

  12. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April ... Addthis Related Articles V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities ...

  13. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, ... T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities V-145: IBM ...

  14. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-122: IBM Tivoli Application...

  15. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  16. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  17. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  18. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  19. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  20. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Energy Savers [EERE]

    Server Cross-Site Scripting Vulnerability | Department of Energy 11: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A

  1. V-028: Splunk Multiple Cross-Site Scripting and Denial of Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    28: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 -...

  2. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  3. T-657: Drupal Prepopulate- Multiple vulnerabilities

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  4. U-191: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes. This Critical Patch Update contains 14 new security fixes across Java SE products.

  5. V-214: Mozilla Firefox Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors....

  6. U-100: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  7. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  8. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  9. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without

  10. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  11. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  12. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  13. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  14. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  15. Nanolipoprotein Particles (NLPs) as Versatile Vaccine Platforms for Co-delivery of Multiple Adjuvants with Subunit Antigens from Burkholderia spp. and F. tularensis - Annual Technical Report

    SciTech Connect (OSTI)

    Fischer, N. O.

    2015-04-16

    The goal of this proposal is to demonstrate that co-localization of protein subunit antigens and adjuvants on nanolipoprotein particles (NLPs) can increase the protective efficacy of recombinant subunit antigens from Burkholderia spp. and Francisella tularensis against an aerosol challenge. NLPs are are biocompatible, high-density lipoprotein mimetics that are amenable to the incorporation of multiple, chemically-disparate adjuvant and antigen molecules. We hypothesize that the ability to co-localize optimized adjuvant formulations with subunit antigens within a single particle will enhance the stimulation and activation of key immune effector cells, increasing the protective efficacy of subunit antigen-based vaccines. While Burkholderia spp. and F. tularensis subunit antigens are the focus of this proposal, we anticipate that this approach is applicable to a wide range of DOD-relevant biothreat agents. The F344 rat aerosol challenge model for F. tularensis has been successfully established at Battelle under this contract, and Year 3 efficacy studies performed at Battelle demonstrated that an NLP vaccine formulation was able to enhance survival of female F344 rats relative to naĂŻve animals. In addition, Year 3 focused on the incorporation of multiple Burkholderia antigens (both polysaccharides and proteins) onto adjuvanted NLPs, with immunological analysis poised to begin in the next quarter.

  16. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  17. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  18. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  1. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  2. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  3. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  4. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 -...

  5. Stabilized floating platforms

    DOE Patents [OSTI]

    Thomas, David G.

    1976-01-01

    The subject invention is directed to a floating platform for supporting nuclear reactors and the like at selected offshore sites. The platform is provided with a stabilizer mechanism which significantly reduces the effects of wave action upon the platform and which comprises a pair of relatively small floats attached by rigid booms to the platform at locations spaced therefrom for reducing wave pitch, acceleration, and the resonance period of the wave.

  6. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  7. ARM - CLASIC Measurement Platforms

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measurement Platforms Related Links CLASIC Home AAF Home ARM Data Discovery Browse Data Post-Campaign CLASIC/CHAPS Special Session at AGU Annual Meeting, December 15-19 CLASIC Workshop, March 26-27 Data Sets Deployment Resources Measurement Platforms PNNL WRF-CuP Forecast Cloud Physics Lidar MODIS Airborne Simulator Data Mesonet Monitoring ARM Data Plots Experiment Planning CLASIC Proposal Abstract Science Questions Science and Implementation Plan (pdf) Measurement Platforms (pdf) CLASIC-Land

  8. SEED Platform Collaborative

    Broader source: Energy.gov [DOE]

    DOE launched the SEED Platform Collaborative in an effort to assist organizations utilizing the Standard Energy Efficiency Data (SEED) Platformℱ to manage building data. The Collaborative, a...

  9. ARM - Measurements and Platforms

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for ISDAC (pdf, 525K) ISDAC Flight Planning Document (PDF, 216K) Collaborations Logistics Measurements & Platforms Contacts News News & Press Fact Sheets Images ARM flickr...

  10. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  11. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  12. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  13. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  14. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  15. Ladder attachment platform

    DOE Patents [OSTI]

    Swygert,; Richard, W [Springfield, SC

    2012-08-28

    A ladder attachment platform is provided that includes a base for attachment to a ladder that has first and second side rails and a plurality of rungs that extend between in a lateral direction. Also included is a user platform for having a user stand thereon that is carried by the base. The user platform may be positioned with respect to the ladder so that it is not located between a first plane that extends through the first side rail and is perpendicular to the lateral direction and a second plane that extends through the second side rail and is perpendicular to the lateral direction.

  16. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to...

  17. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  18. T-597: WordPress Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to perform unauthorized actions in the context of the logged-in user, crash the affected application and therefore deny service to legitimate users, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials or launch other attacks.

  19. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  20. V-105: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    navigation handling. 3) An error in Web Audio can be exploited to cause memory corruption. 4) A use-after-free error exists in SVG animations. 5) An error in Indexed DB can...

  1. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  2. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  3. the Central Basin Platform,

    Office of Scientific and Technical Information (OSTI)

    p q - o o f - - 2 3 - % 8 Overview of the Structural Geology and Tectonics of the Central Basin Platform, Delaware Basin, and Midland Basin, West Texas and New Mexico T ...

  4. Biochemical Platform Analysis

    SciTech Connect (OSTI)

    2006-06-01

    The objective of this project is to perform analysis for the Biochemical Platform to support the on-going research in biochemical conversion of biomass that will be part of an integrated biorefinery.

  5. An Update on Unmanned Platforms at Oliktok Point

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Update on Unmanned Platforms at Oliktok Point For original submission and image(s), see ARM Research Highlights http://www.arm.gov/science/highlights/ Research Highlight In the Arctic, unmanned aircraft systems (UAS) and tethered balloon systems (TBS) can make crucial atmospheric measurements to provide a unique perspective on an environment particularly vulnerable to climate change. To enable research on processes important to climate change in the Arctic-those involving aerosol particles,

  6. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  7. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... However, regional variation does not imply regional ... Federal, state, and local governments and the ... climate-resilient, assessment of vulnerabilities in ...

  8. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  9. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. ...

  10. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    ... products alike, and the introduction of Web applications into SCADA systems has created ... vulnerabilities Most likely attack vector Web Human-Machine Interface (HMI) ...

  11. Manipulator mounted transfer platform

    DOE Patents [OSTI]

    Dobbins, James C.; Hoover, Mark A.; May, Kay W.; Ross, Maurice J.

    1990-01-01

    A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

  12. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  13. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  14. Mobility platform coupling device and method for coupling mobility platforms

    DOE Patents [OSTI]

    Shirey, David L.; Hayward, David R.; Buttz, James H.

    2002-01-01

    A coupling device for connecting a first mobility platform to a second mobility platform in tandem. An example mobility platform is a robot. The coupling device has a loose link mode for normal steering conditions and a locking position, tight link mode for navigation across difficult terrain and across obstacles, for traversing chasms, and for navigating with a reduced footprint in tight steering conditions.

  15. Common tester platform concept.

    SciTech Connect (OSTI)

    Hurst, Michael James

    2008-05-01

    This report summarizes the results of a case study on the doctrine of a common tester platform, a concept of a standardized platform that can be applicable across the broad spectrum of testing requirements throughout the various stages of a weapons program, as well as across the various weapons programs. The common tester concept strives to define an affordable, next-generation design that will meet testing requirements with the flexibility to grow and expand; supporting the initial development stages of a weapons program through to the final production and surveillance stages. This report discusses a concept investing key leveraging technologies and operational concepts combined with prototype tester-development experiences and practical lessons learned gleaned from past weapons programs.

  16. HPC - Platforms Penta Chart

    SciTech Connect (OSTI)

    Trujillo, Angelina Michelle

    2015-10-08

    Strategy, Planning, Acquiring- very large scale computing platforms come and go and planning for immensely scalable machines often precedes actual procurement by 3 years. Procurement can be another year or more. Integration- After Acquisition, machines must be integrated into the computing environments at LANL. Connection to scalable storage via large scale storage networking, assuring correct and secure operations. Management and Utilization – Ongoing operations, maintenance, and trouble shooting of the hardware and systems software at massive scale is required.

  17. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  18. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  19. North Sea platforms revamped

    SciTech Connect (OSTI)

    O'Hare, J.

    1999-12-01

    Many of the early North Sea platforms are reaching their end-of-field life. Most are still equipped with their original drilling package. In a few cases the package has either been removed or decommissioned. The early installations were designed for much simpler and less demanding wells than the horizontal, extended-reach or designer wells common today. Extended-reach wells now can be drilled realistically from ageing platforms, without incurring massive capital expenditure. This can be achieved using the existing drilling package to the limit of its capabilities and supplementing where necessary with relatively minor upgrades or the use of temporary equipment. Drilling even a few more wells from existing platforms not only prolongs field life, it enables any surplus processing capacity to be made available to develop near-field potential with extended-reach drilling (ERD) or by tying back subsea satellite wells, or for processing third-party fluids. The paper describes well design, surface equipment, mud pumps, shakers and solids control equipment, drill cuttings disposal systems, derrick and hoisting system, top drive and drillstring, downhole equipment, well planning, casing wear, logistics, rig preparations, and ERD vs. subsea tie-backs.

  20. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  1. Eclipse Parallel Tools Platform

    Energy Science and Technology Software Center (OSTI)

    2005-02-18

    Designing and developing parallel programs is an inherently complex task. Developers must choose from the many parallel architectures and programming paradigms that are available, and face a plethora of tools that are required to execute, debug, and analyze parallel programs i these environments. Few, if any, of these tools provide any degree of integration, or indeed any commonality in their user interfaces at all. This further complicates the parallel developer's task, hampering software engineering practices,more » and ultimately reducing productivity. One consequence of this complexity is that best practice in parallel application development has not advanced to the same degree as more traditional programming methodologies. The result is that there is currently no open-source, industry-strength platform that provides a highly integrated environment specifically designed for parallel application development. Eclipse is a universal tool-hosting platform that is designed to providing a robust, full-featured, commercial-quality, industry platform for the development of highly integrated tools. It provides a wide range of core services for tool integration that allow tool producers to concentrate on their tool technology rather than on platform specific issues. The Eclipse Integrated Development Environment is an open-source project that is supported by over 70 organizations, including IBM, Intel and HP. The Eclipse Parallel Tools Platform (PTP) plug-in extends the Eclipse framwork by providing support for a rich set of parallel programming languages and paradigms, and a core infrastructure for the integration of a wide variety of parallel tools. The first version of the PTP is a prototype that only provides minimal functionality for parallel tool integration of a wide variety of parallel tools. The first version of the PTP is a prototype that only provides minimal functionality for parallel tool integration, support for a small number of parallel architectures, and basis Fortran integration. Future versions will extend the functionality substantially, provide a number of core parallel tools, and provide support across a wide rang of parallel architectures and languages.« less

  2. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  5. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  6. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  7. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  8. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  9. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  10. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  11. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  12. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  13. Vulnerability Analysis of Energy Delivery Control Systems (September...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared ...

  14. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document ...

  15. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need ...

  16. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by ...

  17. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides ...

  18. Turbine blade platform seal

    DOE Patents [OSTI]

    Zagar, Thomas W.; Schiavo, Anthony L.

    2001-01-01

    A rotating blade group 90 for a turbo-machine having an improved device for sealing the gap 110 between the edges 112,114 of adjacent blade platforms 96,104. The gap 110 between adjacent blades 92,100 is sealed by a seal pin 20 its central portion 110 and by a seal plate 58,60 at each of the front 54 and rear 56 portions. The seal plates 58,60 are inserted into corresponding grooves 62,64 formed in the adjacent edges 112,114 of adjoining blades 92,100 and held in place by end plates 40,42. The end of the seal plates 58,60 may be chamfered 78,80 to improve the seal against the end plate 40,42. The seal pin 20 provides the required damping between the blades 92,100 and the seal plates 58,60 provide improved sealing effectiveness.

  19. Energy Tracking Software Platform

    SciTech Connect (OSTI)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  20. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  1. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  2. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  3. International Economic Platform for Renewable Energies IWR |...

    Open Energy Info (EERE)

    Platform for Renewable Energies IWR Jump to: navigation, search Name: International Economic Platform for Renewable Energies (IWR) Place: Mnster, Germany Zip: 48159 Sector:...

  4. China Low Carbon Platform | Open Energy Information

    Open Energy Info (EERE)

    Low Carbon Platform Jump to: navigation, search Name China Low Carbon Platform AgencyCompany Organization Institute of Development Studies, Climate Change and Development Centre,...

  5. Ultralow-Power Silicon Microphotonic Communications Platform

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ultralow-Power Silicon Microphotonic Communications Platform 1 R&D 100 Entry Ultralow-Power Silicon Microphotonic Communications Platform 2 R&D 100 Entry Submitting Organization ...

  6. Tidal Energy Test Platform | Open Energy Information

    Open Energy Info (EERE)

    Test Platform Jump to: navigation, search Basic Specifications Facility Name Tidal Energy Test Platform Overseeing Organization University of New Hampshire Hydrodynamics...

  7. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  8. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  9. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  10. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  11. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  12. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  13. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  14. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  15. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  16. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  17. Biomass Program 2007 Accomplishments - Biochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details accomplishments of the Biomass Program Biochemical Conversion Platform accomplishments in 2007.

  18. Biomass Program 2007 Accomplishments - Integrated Biorefinery Platform

    SciTech Connect (OSTI)

    none,

    2008-06-01

    This document details the accomplishments of the Biomass Program Integrated Biorefinery Platform in 2007.

  19. National Bioenergy Center Biochemical Platform Integration Project

    SciTech Connect (OSTI)

    Not Available

    2008-07-01

    April through June 2008 update on activities of the National Bioenergy Center's Biochemical Platform Integration Project.

  20. Biomass Program 2007 Accomplishments - Thermochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details the accomplishments of the Biomass Program Thermochemical Conversion Platform in 2007.

  1. Vulnerability and Mitigation Studies for Infrastructure

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Morris, J

    2007-08-02

    The summary of this presentation is that: (1) We do end-to-end systems analysis for infrastructure protection; (2) LLNL brings interdisciplinary subject matter expertise to infrastructure and explosive analysis; (3) LLNL brings high-fidelity modeling capabilities to infrastructure analysis for use on high performance platforms; and (4) LLNL analysis of infrastructure provides information that customers and stakeholders act on.

  2. INL Subsurface Wireless Sensor Platform

    SciTech Connect (OSTI)

    Dennis C. Kunerth; John M. Svoboda; James T. Johnson

    2005-10-01

    The Idaho National Laboratory is developing a versatile micro-power sensor interface platform for periodic subsurface sensing of environmental variables important to waste disposal sites such as volumetric moisture, water potential, and temperature. The key characteristics of the platform architecture are that the platform is passive until externally energized --no internal power source is required -- and that it communicates with a "reader" via short-range telemetry - no wires penetrate the subsurface. Other significant attributes include the potential for a long service life and a compact size that makes it well suited for retrofitting existing landfill structures. Functionally, the sensor package is "read" by a short-range induction coil that activates and powers the sensor platform as well as detects the sensor output via a radio frequency signal generated by the onboard programmable interface controller microchip. As a result, the platform has a functional subsurface communication range of approximately 10 to 12 ft. and can only accept sensors that require low power to operate.

  3. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  4. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  5. 2009 Feedstocks Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program‘s Feedstock platform review meeting, held on April 8–10, 2009, at the Grand Hyatt Washington, Washington, D.C.

  6. Standard Energy Efficiency Data Platform

    Broader source: Energy.gov [DOE]

    The Standard Energy Efficiency Data (SEED) Platformℱ is an open source software application that fills a major market need for data-driven energy efficiency program design and implementation. The SEED Platform enables streamlining of complex building data and allows users to share selected data with partners or make it publicly available.

  7. 2009 Analysis Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Analysis platform review meeting, held on February 18, 2009, at the Marriott Residence Inn, National Harbor, Maryland.

  8. 2009 Infrastructure Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass program‘s Infrastructure platform review meeting, held on February 19, 2009, at the Marriott Residence Inn, National Harbor, Maryland.

  9. Long range hopping mobility platform.

    SciTech Connect (OSTI)

    Spletzer, Barry Louis; Fischer, Gary John

    2003-03-01

    Sandia National Laboratories has developed a mesoscale hopping mobility platform (Hopper) to overcome the longstanding problems of mobility and power in small scale unmanned vehicles. The system provides mobility in situations such as negotiating tall obstacles and rough terrain that are prohibitive for other small ground base vehicles. The Defense Advanced Research Projects Administration (DARPA) provided the funding for the hopper project.

  10. Multiplicity Counting

    SciTech Connect (OSTI)

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  11. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  12. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  13. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  14. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  15. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  16. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  19. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  1. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  4. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  5. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  6. Vulnerability Analysis of Energy Delivery Control Systems - 2011...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy ... (DOEOE) National Supervisory Control and Data Acquisition (SCADA) Test Bed ...

  7. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  8. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  9. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  10. Regional Climate Change Adaptation Platform for Asia | Open Energy...

    Open Energy Info (EERE)

    Climate Change Adaptation Platform for Asia Jump to: navigation, search Logo: Regional Climate Change Adaptation Platform for Asia Name Regional Climate Change Adaptation Platform...

  11. MHK Technologies/Titan Platform | Open Energy Information

    Open Energy Info (EERE)

    construction and crane ships The platform along with the wind turbine and wave energy converters are assembled on shore with the platform legs raised The platform and...

  12. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  13. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  14. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  15. Turbine engine airfoil and platform assembly

    DOE Patents [OSTI]

    Campbell, Christian X.; James, Allister W.; Morrison, Jay A.

    2012-07-31

    A turbine airfoil (22A) is formed by a first process using a first material. A platform (30A) is formed by a second process using a second material that may be different from the first material. The platform (30A) is assembled around a shank (23A) of the airfoil. One or more pins (36A) extend from the platform into holes (28) in the shank (23A). The platform may be formed in two portions (32A, 34A) and placed around the shank, enclosing it. The two platform portions may be bonded to each other. Alternately, the platform (30B) may be cast around the shank (23B) using a metal alloy with better castability than that of the blade and shank, which may be specialized for thermal tolerance. The pins (36A-36D) or holes for them do not extend to an outer surface (31) of the platform, avoiding stress concentrations.

  16. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  17. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  18. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  19. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  20. Gas turbine bucket with impingement cooled platform

    DOE Patents [OSTI]

    Jones, Raphael Durand

    2002-01-01

    In a turbine bucket having an airfoil portion and a root portion, with a substantially planar platform at an interface between the airfoil portion and root portion, a platform cooling arrangement including at least one bore in the root portion and at least one impingement cooling tube seated in the bore, the tube extending beyond the bore with an outlet in close proximity to a targeted area on an underside of the platform.

  1. Bucket platform cooling scheme and related method

    DOE Patents [OSTI]

    Abuaf, Nesim; Barb, Kevin Joseph; Chopra, Sanjay; Kercher, David Max; Kellock, Iain Robertson; Lenahan, Dean Thomas; Nellian, Sankar; Starkweather, John Howard; Lupe, Douglas Arthur

    2002-01-01

    A turbine bucket includes an airfoil extending from a platform, having high and low pressure sides; a wheel mounting portion; a hollow shank portion located radially between the platform and the wheel mounting portion, the platform having an under surface. An impingement cooling plate is located in the hollow shank portion, spaced from the under surface, and the impingement plate is formed with a plurality of impingement cooling holes therein.

  2. 2011 Biomass Program Platform Peer Review: Feedstock

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... EXECUTIVE SUMMARY v BIOMASS PROGRAM: 2011 Feedstock Platform Review Report Standards Development * Recommend DOE ensure that sustainability research and metrics development ...

  3. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  4. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  5. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  6. A robust platform cooled by superconducting electronic refrigerators

    SciTech Connect (OSTI)

    Nguyen, H. Q.; Meschke, M.; Pekola, J. P.

    2015-01-05

    A biased tunnel junction between a superconductor and a normal metal can cool the latter electrode. Based on a recently developed cooler with high power and superior performance, we have integrated it with a dielectric silicon nitride membrane, and cooled phonons from 305?mK down to 200?mK. Without perforation and covered under a thin alumina layer, the membrane is rigorously transformed into a cooling platform that is robust and versatile for multiple practical purposes. We discussed our results and possibilities to further improve the device.

  7. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  8. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  9. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  10. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  11. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon Top 10

  12. Multiple piece turbine rotor blade

    DOE Patents [OSTI]

    Jones, Russell B; Fedock, John A

    2013-05-21

    A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

  13. Apparatus to position a microelectromechanical platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; Rodgers, Murray Steven

    2003-09-23

    The present invention comprises a microelectromechanical positioner to achieve substantially translational positioning of a platform without rotational motion, thereby maintaining a constant angular orientation of the platform during movement. A linkage mechanism of the positioner can comprise parallelogram linkages to constrain the rotational motion of the platform. Such linkages further can comprise flexural hinges or other turning joints at the linkage pivots to eliminate the need for rubbing surfaces. A plurality of the linkage mechanisms can be used to enable translational motion of the platform with two degrees of freedom. A variety of means can be used to actuate the positioner. Independent actuation of the anchor links of the linkage mechanisms with rotary electrostatic actuators can be used to provide controlled translational movement of the platform.

  14. ESF Mine Power Center Platforms

    SciTech Connect (OSTI)

    T.A. Misiak

    2000-02-10

    The purpose and objective of this analysis is to structurally evaluate the existing Exploratory Studies Facility (ESF) mine power center (MPC) support frames and to design service platforms that will attach to the MPC support frames. This analysis follows the Development Plan titled ''Produce Additional Design for Title 111 Evaluation Report'' (CRWMS M&O 1999a). This analysis satisfies design recommended in the ''Title III Evaluation Report for the Surface and Subsurface Power System'' (CRWMS M&O 1999b, Section 7.6) and concurred with in the ''System Safety Evaluation of Title 111 Evaluation Reports Recommended Work'' (Gwyn 1999, Section 10.1.1). This analysis does not constitute a level-3 deliverable, a level-4 milestone, or a supporting work product. This document is not being prepared in support of the Monitored Geologic Repository (MGR) Site Recommendation (SR), Environmental Impact Statement (EIS), or License Application (LA) and should not be cited as a reference in the MGR SR, EIS, or LA.

  15. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible.

  16. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  17. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  18. Polymer-based platform for microfluidic systems

    DOE Patents [OSTI]

    Benett, William; Krulevitch, Peter; Maghribi, Mariam; Hamilton, Julie; Rose, Klint; Wang, Amy W.

    2009-10-13

    A method of forming a polymer-based microfluidic system platform using network building blocks selected from a set of interconnectable network building blocks, such as wire, pins, blocks, and interconnects. The selected building blocks are interconnectably assembled and fixedly positioned in precise positions in a mold cavity of a mold frame to construct a three-dimensional model construction of a microfluidic flow path network preferably having meso-scale dimensions. A hardenable liquid, such as poly (dimethylsiloxane) is then introduced into the mold cavity and hardened to form a platform structure as well as to mold the microfluidic flow path network having channels, reservoirs and ports. Pre-fabricated elbows, T's and other joints are used to interconnect various building block elements together. After hardening the liquid the building blocks are removed from the platform structure to make available the channels, cavities and ports within the platform structure. Microdevices may be embedded within the cast polymer-based platform, or bonded to the platform structure subsequent to molding, to create an integrated microfluidic system. In this manner, the new microfluidic platform is versatile and capable of quickly generating prototype systems, and could easily be adapted to a manufacturing setting.

  19. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  20. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  1. 2011 Biomass Program Platform Peer Review: Algae

    SciTech Connect (OSTI)

    Yang, Joyce

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Algae Platform Review meeting.

  2. Advanced Sensors, Control, Platforms, and Modeling

    Energy Savers [EERE]

    Advanced Sensors, Control, Platforms, and Modeling 1 for Manufacturing (Smart Manufacturing): 2 Technology Assessment 3 Contents 4 1. Introduction to the Technology/System ............................................................................................... 2 5 1.1 Overview ....................................................................................................................................... 2 6 1.2 Challenges and opportunities

  3. 2011 Biomass Program Platform Peer Review: Analysis

    SciTech Connect (OSTI)

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Analysis Platform Review meeting.

  4. 2011 Biomass Program Platform Peer Review. Sustainability

    SciTech Connect (OSTI)

    Eng, Alison Goss

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Sustainability Platform Review meeting.

  5. Cloud Based Applications and Platforms (Presentation)

    SciTech Connect (OSTI)

    Brodt-Giles, D.

    2014-05-15

    Presentation to the Cloud Computing East 2014 Conference, where we are highlighting our cloud computing strategy, describing the platforms on the cloud (including Smartgrid.gov), and defining our process for implementing cloud based applications.

  6. 2011 Biomass Program Platform Peer Review: Feedstock

    SciTech Connect (OSTI)

    McCann, Laura

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Feedstock Platform Review meeting.

  7. 2011 Biomass Program Platform Peer Review. Infrastructure

    SciTech Connect (OSTI)

    Lindauer, Alicia

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Infrastructure Platform Review meeting.

  8. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  9. Standard Energy Efficiency Database Platform - 2013 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Database Platform - 2013 BTO Peer Review Standard Energy Efficiency Database Platform - 2013 BTO Peer Review PDF icon commlbldgs09prindle040313.pdf More Documents & Publications ...

  10. LEDSGP/about/Latin America and Caribbean Regional Platform |...

    Open Energy Info (EERE)

    Latin America and Caribbean Regional Platform < LEDSGP | about(Redirected from Latin America and Caribbean Regional Platform) Redirect page Jump to: navigation, search REDIRECT...

  11. Methane and Methanotrophic Bacteria as a Biotechnological Platform...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Methane and Methanotrophic Bacteria as a Biotechnological Platform Methane and Methanotrophic Bacteria as a Biotechnological Platform Breakout Session 2-B: NewEmerging Pathways ...

  12. Study Compares Floating-Platform Options for Offshore Vertical...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compares Floating-Platform Options for Offshore Vertical-Axis Wind Turbines - Sandia Energy Energy Search ... compare floating platform options for each turbine in the design space. ...

  13. EM Quality Assurance Centralized Training Platform Project Plan...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Management Quality Assurance EM Quality Assurance Centralized Training Platform Project Plan for 2009-2010 EM Quality Assurance Centralized Training Platform Project...

  14. MHK Technologies/Mobil Stabilized Energy Conversion Platform...

    Open Energy Info (EERE)

    Mobil Stabilized Energy Conversion Platform < MHK Technologies Jump to: navigation, search << Return to the MHK database homepage Mobil Stabilized Energy Conversion Platform.jpg...

  15. LEDSGP/about/regional-platforms | Open Energy Information

    Open Energy Info (EERE)

    Guiding Structure Regional Platforms LEDS GP regional platforms lead regional peer learning, training, and collaboration; engage technical working groups, the LEDS GP...

  16. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  17. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  18. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  19. Functional design criteria for standard hydrogen monitoring system portable platform

    SciTech Connect (OSTI)

    Schneider, T.C.

    1997-01-17

    Functional design description for a Standard-E cabinet arrangement Standard Hydrogen Monitoring System Portable Platform.

  20. Centrifugal microfluidic platform for ultrasensitive detection of botulinum toxin

    SciTech Connect (OSTI)

    Koh, Chung -Yan; Schaff, Ulrich Y.; Piccini, Matthew E.; Stanker, Larry H.; Cheng, Luisa W.; Ravichandran, Easwaran; Singh, Bal -Ram; Sommer, Greg J.; Singh, Anup K.

    2014-12-18

    In this study, we present an innovative centrifugal microfluidic immunoassay platform (SpinDx) to address the urgent biodefense and public health need for ultrasensitive point-of-care/incident detection of botulinum toxin. The simple, sample-to-answer centrifugal microfluidic immunoassay approach is based on binding of toxins to antibody-laden capture particles followed by sedimentation of the particles through a density-media in a microfluidic disk and quantification by laser-induced fluorescence. A blind, head-to-head comparison study of SpinDx versus the gold-standard mouse bioassay demonstrates 100-fold improvement in sensitivity (limit of detection = 0.09 pg/mL), while achieving total sample-to-answer time of <30 min with 2-ÎŒL required volume of the unprocessed sample. We further demonstrate quantification of botulinum toxin in both exogeneous (human blood and serum spiked with toxins) and endogeneous (serum from mice intoxicated via oral, intranasal, and intravenous routes) samples. SpinDx can analyze, without any sample preparation, multiple sample types including whole blood, serum, and food. It is readily expandable to additional analytes as the assay reagents (i.e., the capture beads and detection antibodies) are disconnected from the disk architecture and the reader, facilitating rapid development of new assays. SpinDx can also serve as a general-purpose immunoassay platform applicable to diagnosis of other conditions and diseases.

  1. Centrifugal microfluidic platform for ultrasensitive detection of botulinum toxin

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Koh, Chung -Yan; Schaff, Ulrich Y.; Sandstone Diagnostics, Livermore, CA; Piccini, Matthew E.; Cepheid, Sunnyvale, CA; Stanker, Larry H.; Cheng, Luisa W.; Ravichandran, Easwaran; Singh, Bal -Ram; Sommer, Greg J.; et al

    2014-12-18

    In this study, we present an innovative centrifugal microfluidic immunoassay platform (SpinDx) to address the urgent biodefense and public health need for ultrasensitive point-of-care/incident detection of botulinum toxin. The simple, sample-to-answer centrifugal microfluidic immunoassay approach is based on binding of toxins to antibody-laden capture particles followed by sedimentation of the particles through a density-media in a microfluidic disk and quantification by laser-induced fluorescence. A blind, head-to-head comparison study of SpinDx versus the gold-standard mouse bioassay demonstrates 100-fold improvement in sensitivity (limit of detection = 0.09 pg/mL), while achieving total sample-to-answer time of <30 min with 2-ΌL required volume of themore » unprocessed sample. We further demonstrate quantification of botulinum toxin in both exogeneous (human blood and serum spiked with toxins) and endogeneous (serum from mice intoxicated via oral, intranasal, and intravenous routes) samples. SpinDx can analyze, without any sample preparation, multiple sample types including whole blood, serum, and food. It is readily expandable to additional analytes as the assay reagents (i.e., the capture beads and detection antibodies) are disconnected from the disk architecture and the reader, facilitating rapid development of new assays. SpinDx can also serve as a general-purpose immunoassay platform applicable to diagnosis of other conditions and diseases.« less

  2. Horizontally scaling dChache SRM with the Terracotta platform

    SciTech Connect (OSTI)

    Perelmutov, T.; Crawford, M.; Moibenko, A.; Oleynik, G.; /Fermilab

    2011-01-01

    The dCache disk caching file system has been chosen by a majority of LHC experiments Tier 1 centers for their data storage needs. It is also deployed at many Tier 2 centers. The Storage Resource Manager (SRM) is a standardized grid storage interface and a single point of remote entry into dCache, and hence is a critical component. SRM must scale to increasing transaction rates and remain resilient against changing usage patterns. The initial implementation of the SRM service in dCache suffered from an inability to support clustered deployment, and its performance was limited by the hardware of a single node. Using the Terracotta platform, we added the ability to horizontally scale the dCache SRM service to run on multiple nodes in a cluster configuration, coupled with network load balancing. This gives site administrators the ability to increase the performance and reliability of SRM service to face the ever-increasing requirements of LHC data handling. In this paper we will describe the previous limitations of the architecture SRM server and how the Terracotta platform allowed us to readily convert single node service into a highly scalable clustered application.

  3. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  4. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  5. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  6. Ultralow-Power Silicon Microphotonic Communications Platform

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ultralow-Power Silicon Microphotonic Communications Platform 1 R&D 100 Entry Ultralow-Power Silicon Microphotonic Communications Platform 2 R&D 100 Entry Submitting Organization Sandia National Laboratories P. O. Box 5800 Albuquerque New Mexico 87185-1082 USA Michael R. Watts Phone: (505) 284-9616 Fax: (505) 284-7690 mwatts@sandia.gov AFFIRMATION: I affirm that all information submitted as a part of, or supplemental to, this entry is a fair and accurate representation of this product.

  7. Traffic information computing platform for big data

    SciTech Connect (OSTI)

    Duan, Zongtao Li, Ying Zheng, Xibin Liu, Yan Dai, Jiting Kang, Jun

    2014-10-06

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  8. Dynamic analysis of tension-leg platforms

    SciTech Connect (OSTI)

    Morgan, J.R.

    1983-01-01

    The dynamic response of tension-leg platforms subjected to wave loading was investigated using a deterministic dynamic analysis. The model employed in this study is based on coupled nonlinear stiffness coefficients and closed form inertia and drag forcing functions derived using Morison's equation. The forcing functions include relative motion behavior between the fluid particles and the structure. These forcing functions are integrated manually thereby avoiding the need for expensive numerical integration. A set of coupled nonlinear differential equations was integrated sequentially in the time domain using the Newmark beta-method. A computer program was developed to simulate the time history response of the platform motion.

  9. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  10. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  11. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  12. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  13. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  14. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  15. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  16. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  17. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  18. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Energy Savers [EERE]

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  19. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  20. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials that could be used for a nuclear weapon or radiological dispersal device (RDD), or "dirty bomb". Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify,

  1. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  2. 2009 Biochemical Conversion Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Biochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado.

  3. 2009 Thermochemical Conversion Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Thermochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado.

  4. 2009 Integrated Biorefinery Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program‘s Integrated Biorefinery (IBR) platform review meeting, held on February 18–19, 2009, at the Westin National Harbor, National Harbor, Maryland.

  5. 2009 Biochemical Conversion Platform Review Report

    Broader source: Energy.gov [DOE]

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Biochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado.

  6. Turbine blade and non-integral platform with pin attachment

    DOE Patents [OSTI]

    Campbell, Christian X; Eng, Darryl; Marra, John J

    2015-01-27

    Platforms (36, 38) span between turbine blades (23, 24, 25) on a disk (32). Each platform may be individually mounted to the disk by a pin attachment (42). Each platform (36) may have a rotationally rearward edge portion (50) that underlies a forward portion (45) of the adjacent platform (38). This limits centrifugal bending of the rearward portion of the platform, and provides coolant sealing. The rotationally forward edge (44A, 44B) of the platform overlies a seal element (51) on the pressure side (28) of the forwardly adjacent blade, and does not underlie a shelf on that blade. The pin attachment allows radial mounting of each platform onto the disk via tilting (60) of the platform during mounting to provide mounting clearance for the rotationally rearward edge portion (50). This facilitates quick platform replacement without blade removal.

  7. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  8. CALIOPE and TAISIR airborne experiment platform

    SciTech Connect (OSTI)

    Chocol, C.J.

    1994-07-01

    Between 1950 and 1970, scientific ballooning achieved many new objectives and made a substantial contribution to understanding near-earth and space environments. In 1986, the Lawrence Livermore National Laboratory (LLNL) began development of ballooning technology capable of addressing issues associated with precision tracking of ballistic missiles. In 1993, the Radar Ocean Imaging Project identified the need for a low altitude (1 km) airborne platform for its Radar system. These two technologies and experience base have been merged with the acquisition of government surplus Aerostats by Lawrence Livermore National Laboratory. The CALIOPE and TAISIR Programs can benefit directly from this technology by using the Aerostat as an experiment platform for measurements of the spill facility at NTS.

  9. SERS diagnostic platforms, methods and systems microarrays, biosensors and biochips

    DOE Patents [OSTI]

    Vo-Dinh, Tuan

    2007-09-11

    A Raman integrated sensor system for the detection of targets including biotargets includes at least one sampling platform, at least one receptor probe disposed on the sampling platform, and an integrated circuit detector system communicably connected to the receptor. The sampling platform is preferably a Raman active surface-enhanced scattering (SERS) platform, wherein the Raman sensor is a SERS sensor. The receptors can include at least one protein receptor and at least one nucleic acid receptor.

  10. 2009 Thermochemical Conversion Platform Review Report | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Thermochemical Conversion Platform Review Report 2009 Thermochemical Conversion Platform Review Report This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Thermochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado. PDF icon obp_thermochem_conversion_platform_review_2009.pdf More Documents &

  11. onVCP - Virtual Community Platform | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    onVCP - Virtual Community Platform onVCP - Virtual Community Platform Uniting government, non-governmental, and private-sector partners through the capability rich online Virtual Community Platform (onVCP) tool leads to a forward-thinking confluence where a community of professionals can actively collaborate and share documents in a secure venue. The Virtual Community Platform (VCP) is a web-based virtual online collaboration tool built on Microsoft's powerful SharePointÂź and Unified

  12. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    Applying current guidance and practices for common-cause failure (CCF) mitigation to digital instrumentation and control (I&C) systems has proven problematic, and the regulatory environment has been unpredictable. The potential for CCF vulnerability inhibits I&C modernization, thereby challenging the long-term sustainability of existing plants. For new plants and advanced reactor concepts, concern about CCF vulnerability in highly integrated digital I&C systems imposes a design burden that results in higher costs and increased complexity. The regulatory uncertainty in determining which mitigation strategies will be acceptable (e.g., what diversity is needed and how much is sufficient) drives designers to adopt complicated, costly solutions devised for existing plants. To address the conditions that constrain the transition to digital I&C technology by the US nuclear industry, crosscutting research is needed to resolve uncertainty, demonstrate necessary characteristics, and establish an objective basis for qualification of digital technology for nuclear power plant (NPP) I&C applications. To fulfill this research need, Oak Ridge National Laboratory is investigating mitigation of CCF vulnerability for nuclear-qualified applications. The outcome of this research is expected to contribute to a fundamentally sound, comprehensive basis to qualify digital technology for nuclear power applications. This report documents the development of a CCF taxonomy. The basis for the CCF taxonomy was generated by determining consistent terminology and establishing a classification approach. The terminology is based on definitions from standards, guides, and relevant nuclear power industry technical reports. The classification approach is derived from identified classification schemes focused on I&C systems and key characteristics, including failure modes. The CCF taxonomy provides the basis for a systematic organization of key systems aspects relevant to analyzing the potential for CCF vulnerability and the suitability of mitigation techniques. Development of an effective CCF taxonomy will help to provide a framework for establishing the objective analysis and assessment capabilities desired to facilitate rigorous identification of fault types and triggers that are the fundamental elements of CCF.

  13. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considered subject to demand concerns, supply concerns, or both demand and supply concerns.

  14. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  15. OCILOW-Wheeled Platform Controls Executable Set

    SciTech Connect (OSTI)

    2005-11-30

    The OCILOW Controls Executable Set is the complete set of machine executable instructions to control the motion of wheeled platforms that incorporate Off-Centered In-Line Omni-directional Wheels (OCILOW). The controls utilize command signals for the desired motion of the platform (X, Y and Theta) and calculate and control the steering and rolling motion required of each OCILOW wheels to achieve the desired translational and rotational platform motion. The controls utilize signals from the wheel steering and rolling resolvers, and from three load cells located at each wheels, to coordinate the motion of all wheels, while respecting their non-holonomic constraints (i.e., keeping internal stresses and slippage due to possible errors, uneven floors, bumps, misalignment, etc. bounded). The OCILOW Controls Executable Set, which is copyrighted here, is an embodiment of the generic OCILOW algorithms (patented separately) developed specifically for controls of the Proof-of-Principle-Transporter (POP-T) system that has been developed to demonstrate the overall OCILOW controls feasibility and capabilities.

  16. Year 2 Report: Protein Function Prediction Platform

    SciTech Connect (OSTI)

    Zhou, C E

    2012-04-27

    Upon completion of our second year of development in a 3-year development cycle, we have completed a prototype protein structure-function annotation and function prediction system: Protein Function Prediction (PFP) platform (v.0.5). We have met our milestones for Years 1 and 2 and are positioned to continue development in completion of our original statement of work, or a reasonable modification thereof, in service to DTRA Programs involved in diagnostics and medical countermeasures research and development. The PFP platform is a multi-scale computational modeling system for protein structure-function annotation and function prediction. As of this writing, PFP is the only existing fully automated, high-throughput, multi-scale modeling, whole-proteome annotation platform, and represents a significant advance in the field of genome annotation (Fig. 1). PFP modules perform protein functional annotations at the sequence, systems biology, protein structure, and atomistic levels of biological complexity (Fig. 2). Because these approaches provide orthogonal means of characterizing proteins and suggesting protein function, PFP processing maximizes the protein functional information that can currently be gained by computational means. Comprehensive annotation of pathogen genomes is essential for bio-defense applications in pathogen characterization, threat assessment, and medical countermeasure design and development in that it can short-cut the time and effort required to select and characterize protein biomarkers.

  17. OCILOW-Wheeled Platform Controls Executable Set

    Energy Science and Technology Software Center (OSTI)

    2005-11-30

    The OCILOW Controls Executable Set is the complete set of machine executable instructions to control the motion of wheeled platforms that incorporate Off-Centered In-Line Omni-directional Wheels (OCILOW). The controls utilize command signals for the desired motion of the platform (X, Y and Theta) and calculate and control the steering and rolling motion required of each OCILOW wheels to achieve the desired translational and rotational platform motion. The controls utilize signals from the wheel steering andmore » rolling resolvers, and from three load cells located at each wheels, to coordinate the motion of all wheels, while respecting their non-holonomic constraints (i.e., keeping internal stresses and slippage due to possible errors, uneven floors, bumps, misalignment, etc. bounded). The OCILOW Controls Executable Set, which is copyrighted here, is an embodiment of the generic OCILOW algorithms (patented separately) developed specifically for controls of the Proof-of-Principle-Transporter (POP-T) system that has been developed to demonstrate the overall OCILOW controls feasibility and capabilities.« less

  18. LEDSGP/about/Latin America and Caribbean Regional Platform/LAC...

    Open Energy Info (EERE)

    aboutLatin America and Caribbean Regional PlatformLAC Regional Platform Workshop < LEDSGP | about | Latin America and Caribbean Regional Platform Jump to: navigation,...

  19. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  20. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  1. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  2. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  3. Building a Community-Focused Data Platform

    SciTech Connect (OSTI)

    Turk, Matthew J.; Warren, Michael S.; Skillman, Samuel W.

    2014-06-10

    The National Data Service (NDS) presents a broad-reaching vision of integrating discovery, publishing, and sharing of data. Metcalfe's Law states that the value of a network increases with the number of connections in the network, not the number of nodes. The NDS must develop and steward connections not only between data, as is in its vision statement, but between individuals as well. We propose that this be accomplished by explicitly developing it as a platform on which data exploration can be constructed by individual researchers.

  4. Analytical laboratory and mobile sampling platform

    SciTech Connect (OSTI)

    Stetzenbach, K.; Smiecinski, A.

    1996-04-30

    This is the final report for the Analytical Laboratory and Mobile Sampling Platform project. This report contains only major findings and conclusions resulting from this project. Detailed reports of all activities performed for this project were provided to the Project Office every quarter since the beginning of the project. This report contains water chemistry data for samples collected in the Nevada section of Death Valley National Park (Triangle Area Springs), Nevada Test Site springs, Pahranagat Valley springs, Nevada Test Site wells, Spring Mountain springs and Crater Flat and Amargosa Valley wells.

  5. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2013-07-01

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  6. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  7. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  8. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  9. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  10. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  11. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  12. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  13. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  14. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  15. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  16. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  17. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  18. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  19. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  20. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  1. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  2. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  3. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  4. Building the Agile Biomanufacturing Platform Workshop

    Broader source: Energy.gov [DOE]

    A consortium of nine national labs is excited to announce the Agile Biomanufacturing Industry Listening Workshop on March 15, 2016 in Berkeley, CA. Lawrence Berkeley National Lab, Ames National Lab, Argonne National Lab, Idaho National Lab, Los Alamos National Lab, the National Renewable Energy Lab, Oak Ridge National Lab, Pacific Northwest National Lab, and Sandia National Labs seek to build an agile biomanufacturing platform for biological approaches to produce advanced biofuels, renewable chemicals, and materials that represent low greenhouse gas alternatives to molecules currently derived from petroleum. The labs envision a distributed Agile Biomanufacturing consortium that includes a Foundry to productionize the design-build-test-learn cycle for engineering biology while incorporating process integration, predictable scaling, and techno-economic analyses and life cycle assessments for bioprocess design. The DOE National Laboratories have built deep and unique capabilities that can be brought to bear to build powerful infrastructure and scientific engineering activities that will render design and implementation of new bio-based products scalable, predictable, and more cost-effective. An agile biomanufacturing platform will enable companies, national labs, and universities to develop biological processes efficiently and with reduced risk to create products with better performance than their predecessors.

  5. Mechanically latchable tiltable platform for forming micromirrors and micromirror arrays

    DOE Patents [OSTI]

    Garcia, Ernest J.; Polosky, Marc A.; Sleefe, Gerard E.

    2006-12-12

    A microelectromechanical (MEM) apparatus is disclosed which includes a platform that can be electrostatically tilted from being parallel to a substrate on which the platform to being tilted at an angle of 1 20 degrees with respect to the substrate. Once the platform has been tilted to a maximum angle of tilt, the platform can be locked in position using an electrostatically-operable latching mechanism which engages a tab protruding below the platform. The platform has a light-reflective upper surface which can be optionally coated to provide an enhanced reflectivity and form a micromirror. An array of such micromirrors can be formed on a common substrate for applications including optical switching (e.g. for fiber optic communications), optical information processing, image projection displays or non-volatile optical memories.

  6. VOLTTRON Lite: Integration Platform for the Transactional Network

    SciTech Connect (OSTI)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Liteℱ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  7. An Extensible Sensing and Control Platform for Building Energy Management

    Office of Scientific and Technical Information (OSTI)

    (Technical Report) | SciTech Connect Technical Report: An Extensible Sensing and Control Platform for Building Energy Management Citation Details In-Document Search Title: An Extensible Sensing and Control Platform for Building Energy Management The goal of this project is to develop Mortar.io, an open-source BAS platform designed to simplify data collection, archiving, event scheduling and coordination of cross-system interactions. Mortar.io is optimized for (1) robustness to network

  8. 2011 Biomass Program Platform Peer Review: Feedstock | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Feedstock 2011 Biomass Program Platform Peer Review: Feedstock This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Biomass Program's Feedstock Platform Review meeting, held on April 6-8, 2011, at the Doubletree Annapolis Court in Annapolis, Maryland. PDF icon 2011_feedstock_review.pdf More Documents & Publications 2011 Biomass Program Platform Peer

  9. 2011 Biomass Program Platform Peer Review: Infrastructure | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Infrastructure 2011 Biomass Program Platform Peer Review: Infrastructure This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Biomass Program's Infrastructure Platform Review meeting, held on February 3, 2011, in Washington, D.C. PDF icon 2011_infrastructure_review.pdf More Documents & Publications 2011 Biomass Program Platform Peer

  10. Vibration Model Validation for Linear Collider Detector Platforms

    SciTech Connect (OSTI)

    Bertsche, Kirk; Amann, J.W.; Markiewicz, T.W.; Oriunno, M.; Weidemann, A.; White, G.; /SLAC

    2012-05-16

    The ILC and CLIC reference designs incorporate reinforced-concrete platforms underneath the detectors so that the two detectors can each be moved onto and off of the beamline in a Push-Pull configuration. These platforms could potentially amplify ground vibrations, which would reduce luminosity. In this paper we compare vibration models to experimental data on reinforced concrete structures, estimate the impact on luminosity, and summarize implications for the design of a reinforced concrete platform for the ILC or CLIC detectors.

  11. Methane and Methanotrophic Bacteria as a Biotechnological Platform |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Methane and Methanotrophic Bacteria as a Biotechnological Platform Methane and Methanotrophic Bacteria as a Biotechnological Platform Breakout Session 2-B: New/Emerging Pathways Methane and Methanotrophic Bacteria as a Biotechnological Platform Dr. Lori Giver, Vice President of Biological Engineering, Calysta Energy, Inc. PDF icon giver_bioenergy_2015.pdf More Documents & Publications CX-100166 Categorical Exclusion Determination Biobased Chemicals Landscape in 2015:

  12. 2011 Biomass Program Platform Review Report: Algae | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Review Report: Algae 2011 Biomass Program Platform Review Report: Algae This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Biomass Program's Algae Platform Review meeting, held on April 7-8, 2011, at the Doubletree Hotel in Annapolis, Maryland. PDF icon 2011_algae_review.pdf More Documents & Publications 2011 Biomass Program Platform Peer Review:

  13. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  14. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  15. A Novel Antibody Engineering Platform to Improve Antibody Stability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Novel Antibody Engineering Platform to Improve Antibody Stability Argonne National Laboratory Contact ANL About This Technology Fig. 1: Ribbon diagram of a stabilized antibody...

  16. MHK Technologies/Platform generators | Open Energy Information

    Open Energy Info (EERE)

    homepage Platform generators.jpg Technology Profile Primary Organization Aqua Magnetics Inc Technology Resource Click here Wave Technology Type Click here Reciprocating...

  17. UNDP-Climate Finance Options Platform | Open Energy Information

    Open Energy Info (EERE)

    Renewable Energy Topics: Finance Website: www.climatefinanceoptions.orgcfo Cost: Free UNDP-Climate Finance Options Platform Screenshot References: UNDP-Climate Finance...

  18. PR-PR: Cross-Platform Laboratory Automation System

    SciTech Connect (OSTI)

    Linshiz, G; Stawski, N; Goyal, G; Bi, CH; Poust, S; Sharma, M; Mutalik, V; Keasling, JD; Hillson, NJ

    2014-08-01

    To enable protocol standardization, sharing, and efficient implementation across laboratory automation platforms, we have further developed the PR-PR open-source high-level biology-friendly robot programming language as a cross-platform laboratory automation system. Beyond liquid-handling robotics, PR-PR now supports microfluidic and microscopy platforms, as well as protocol translation into human languages, such as English. While the same set of basic PR-PR commands and features are available for each supported platform, the underlying optimization and translation modules vary from platform to platform. Here, we describe these further developments to PR-PR, and demonstrate the experimental implementation and validation of PR-PR protocols for combinatorial modified Golden Gate DNA assembly across liquid-handling robotic, microfluidic, and manual platforms. To further test PR-PR cross-platform performance, we then implement and assess PR-PR protocols for Kunkel DNA mutagenesis and hierarchical Gibson DNA assembly for microfluidic and manual platforms.

  19. Genomics-enabled sensor platform for rapid detection of viruses...

    Office of Scientific and Technical Information (OSTI)

    platforms for preclinical and field testing that utilize the assays developed in goal 1. We generated and characterized suitable primersmore for West Nile Virus RNA detection. ...

  20. Adapting On-Site Electrical Generation Platforms for Producer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a biomass gasifier and a reciprocating engine generator set into a combined platform, ... Draft White Paper, September 2007 Combined Heat and Power Market Potential for Opportunity ...

  1. Genomics-enabled sensor platform for rapid detection of viruses...

    Office of Scientific and Technical Information (OSTI)

    platforms for preclinical and field testing that utilize the assays developed in goal 1. We generated and characterized suitable primers more for West Nile Virus RNA detection. ...

  2. Assessment of an ORION-based experimental platform for measuring...

    Office of Scientific and Technical Information (OSTI)

    Assessment of an ORION-based experimental platform for measuring the opacity of ... Country of Publication: United States Language: English Subject: 70 PLASMA PHYSICS AND FUSION ...

  3. The Tariff Analysis Project: A Database and Analysis Platform...

    Open Energy Info (EERE)

    Tariff Analysis Project: A Database and Analysis Platform for Electricity Tariffs Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Tariff Analysis Project: A Database...

  4. EM Quality Assurance Centralized Training Platform Project Plan...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project plan for the development of a centralized quality assurance training platform to develop a consistent approach and methodology to training personnel. PDF icon EM Quality ...

  5. 2011 Biomass Program Platform Peer Review: Thermochemical Conversion...

    Broader source: Energy.gov (indexed) [DOE]

    Thermochemical Conversion Platform Review meeting, held on February 16...18, 2011, at the Crowne Plaza Hotel in Downtown Denver, Colorado." PDF icon 2011thermochemreview.pdf More ...

  6. An Extensible Sensing and Control Platform for Building Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to server side * Device Interfaces - FireFly Wireless Sensing Platform, BACnet, Android@Home, NEST thermostat, Web Services, ModBus, PUP, Zigbee, Zwave 6 Respawn Distributed ...

  7. Mortar.io - Open BAS Platform Electrical and Computer Engineering...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    side * Extensible Device Interfaces - FireFly Wireless Sensing Platform, BACnet, Android@Home, NEST thermostat, Web Services, ModBus, PUP, Zigbee, Zwave Mortar.io Architecture ...

  8. Design and Control of a Ship Motion Simulation Platform from...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Design and Control of a Ship Motion Simulation Platform from an Energy Efficiency Perspective Citation Details In-Document Search Title: Design and Control of a ...

  9. Transparent Gold as a Platform for Adsorbed ProteinSpectroelectrochem...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transparent Gold as a Platform for Adsorbed Protein Spectroelectrochemistry: Investigation of Cytochrome c and Azurin Authors: Ashur, I., Schulz, O., McIntosh, C. L., Pinkas, I.,...

  10. Standard Energy Efficiency Data (SEED) Platform - 2014 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contacts DOE Technology Manager: Elena Alschuler Presenter: Rich Brown, Lawrence Berkeley National Laboratory Learn More PDF icon Standard Energy Efficiency Data (SEED) Platform - ...

  11. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W.

    2011-04-08

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  12. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  13. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  14. U-156: Red Hat update for JBoss Enterprise Portal Platform | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 56: Red Hat update for JBoss Enterprise Portal Platform U-156: Red Hat update for JBoss Enterprise Portal Platform April 26, 2012 - 7:00am Addthis PROBLEM: Red Hat update for JBoss Enterprise Portal Platform PLATFORM: JBoss Enterprise Portal Platform 5.x ABSTRACT: Update for JBoss Enterprise Portal Platform Reference Links: Secunia Advisory SA48954 CVE-2011-4314 CVE-2012-0818 IMPACT ASSESSMENT: Medium Discussion: Red Hat has issued an update for JBoss Enterprise Portal Platform. This

  15. DOE Hybrid and Electric Vehicle Test Platform

    SciTech Connect (OSTI)

    Gao, Yimin

    2012-03-31

    Based on the contract NT-42790 to the Department of Energy, “Plug-in Hybrid Ethanol Research Platform”, Advanced Vehicle Research Center (AVRC) Virginia has successfully developed the phase I electric drive train research platform which has been named as Laboratory Rapid Application Testbed (LabRAT). In phase II, LabRAT is to be upgraded into plug-in hybrid research platform, which will be capable of testing power systems for electric vehicles, and plug-in hybrid electric vehicles running on conventional as well as alternative fuels. LabRAT is configured as a rolling testbed with plentiful space for installing various component configurations. Component connections are modularized for flexibility and are easily replaced for testing various mechanisms. LabRAT is designed and built as a full functional vehicle chassis with a steering system, brake system and four wheel suspension. The rear drive axle offers maximum flexibility with a quickly changeable gear ratio final drive to accommodate different motor speed requirements. The electric drive system includes an electric motor which is mechanically connected to the rear axle through an integrated speed/torque sensor. Initially, a 100 kW UQM motor and corresponding UQM motor controller is used which can be easily replaced with another motor/controller combination. A lithium iron phosphate (LiFePO4) battery pack is installed, which consists of 108 cells of 100 AH capacity, giving the total energy capacity of 32.5 kWh. Correspondingly, a fully functional battery management system (BMS) is installed to perform battery cell operation monitoring, cell voltage balancing, and reporting battery real time operating parameters to vehicle controller. An advanced vehicle controller ECU is installed for controlling the drive train. The vehicle controller ECU receives traction or braking torque command from driver through accelerator and brake pedal position sensors and battery operating signals from the BMS through CAN BUS, and then generates motor torque command (traction or braking) to the motor controller based on the control algorithm software embedded in the vehicle controller ECU. The vehicle controller ECU is a re-programmable electronic control unit. Any control algorithm software developed can be easily downloaded to vehicle controller ECU to test any newly developed control strategy. The flexibility of the control system significantly enhances the practical applicability of the LabRAT. A new test methodology has been developed for the LabRAT simulating any vehicles running on road with different weights from compact passenger car to light duty truck on an AC or eddy current dynamometers without much effort for modification of the system. LabRAT is equipped with a fully functional data acquisition system supplied by CyberMetrix. The measurement points along the drive train are DC electric power between battery pack and motor controller input, AC electric power between motor controller and electric motor, mechanical power between motor and rear axle. The data acquisition system is designed with more capability than current requirements in order to meet the requirements for phase II.

  16. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W.

    1994-01-01

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  17. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, T.W.

    1994-09-06

    A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

  18. The Mars Hopper: a radioisotope powered, impulse driven, long-range, long-lived mobile platform for exploration of Mars

    SciTech Connect (OSTI)

    Steven D. Howe; Robert C. O'Brien; William Taitano; Doug Crawford; Nathan Jerred; Spencer Cooley; John Crapeau; Steve Hansen; Andrew Klein; James Werner

    2011-02-01

    Planetary exploration mission requirements are becoming more demanding. Due to the increasing cost, the missions that provide mobile platforms that can acquire data at multiple locations are becoming more attractive. Wheeled vehicles such as the MER rovers have proven extremely capable but have very limited range and cannot traverse rugged terrain. Flying vehicles such as balloons and airplanes have been proposed but are problematic due to the very thin atmospheric pressure and the strong, dusty winds present on Mars. The Center for Space Nuclear Research has designed an instrumented platform that can acquire detailed data at hundreds of locations during its lifetime - a Mars Hopper. The Mars Hopper concept utilizes energy from radioisotopic decay in a manner different from any existing radioisotopic power sources—as a thermal capacitor. By accumulating the heat from radioisotopic decay for long periods, the power of the source can be dramatically increased for short periods. The platform will be able to "hop" from one location to the next every 5-7 days with a separation of 5-10 km per hop. Preliminary designs show a platform that weighs around 52 kgs unfueled which is the condition at deployment. Consequently, several platforms may be deployed on a single launch from Earth. With sufficient lifetime, the entire surface of Mars can be mapped in detail by a couple dozen platforms. In addition, Hoppers can collect samples from all over the planet, including gorges, mountains and crevasses, and deliver them to a central location for eventual pick-up by a Mars Sample Return mission. The status of the Mars Hopper development project at the CSNR is discussed.

  19. Tracking Provenance in ORNL's Flexible Research Platforms

    SciTech Connect (OSTI)

    Hensley, Zachary P; Sanyal, Jibonananda; New, Joshua Ryan

    2013-08-01

    Provenance is dened as information about the origin of objects, a concept that applies to both physical and digital objects and often overlaps both. The use of provenance in systems designed for research is an important but forgotten feature. Provenance allows for proper and exact tracking of information, its use, its lineage, its derivations and other metadata that are important for correctly adhering to the scien- tic method. In our project's prescribed use of provenance, researchers can determine detailed information about the use of sensor data in their experiments on ORNL's Flexible Research Platforms (FRPs). Our project's provenance system, Provenance Data Management System (ProvDMS), tracks information starting with the creation of information by an FRP sensor. The system determines station information, sensor information, and sensor channel information. The system allows researchers to derive generations of experiments from the sensor data and tracks their hierarchical flow. Key points can be seen in the history of the information as part of the information's workflow. The concept of provenance and its usage in science is relatively new and while used in other cases around the world, our project's provenance diers in a key area. To keep track of provenance, most systems must be designed or redesigned around the new provenance system. Our system is designed as a cohesive but sepa- rate entity and allows for researchers to continue using their own methods of analysis without being constrained in their ways in order to track the provenance. We have designed ProvDMS using a lightweight provenance library, Core Provenance Library (CPL) v.6 In addition to keeping track of sensor data experiments and its provenance, ProvDMS also provides a web-enabled visualization of the inheritance.

  20. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

  1. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  2. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  3. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  4. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  5. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  6. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

    Broader source: Energy.gov [DOE]

    McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

  7. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  8. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  9. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resilience Solutions | Department of Energy Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser. This report examines the current and potential future impacts of climate change and extreme weather on the U.S. energy sector at the regional level. It provides illustrative

  10. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  11. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  12. Multiple shell fusion targets

    DOE Patents [OSTI]

    Lindl, J.D.; Bangerter, R.O.

    1975-10-31

    Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

  13. Photovoltaics: Separating Multiple Excitons

    SciTech Connect (OSTI)

    Nozik, A. J.

    2012-05-01

    Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

  14. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, Jr., Harry K.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  15. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  16. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  17. 2011 Biomass Program Platform Peer Review: Biochemical Conversion

    SciTech Connect (OSTI)

    Pezzullo, Leslie

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Biochemical Conversion Platform Review meeting.

  18. Open Platform of Climate-Smart Planning Instruments | Open Energy...

    Open Energy Info (EERE)

    Website: prod-http-80-800498448.us-east-1.elb.amazonaws.comwimages55dOpen Language: English References: Open Platform of Climate-Smart Planning Instruments1 Overview...

  19. Platform-independent method for computer aided schematic drawings

    DOE Patents [OSTI]

    Vell, Jeffrey L.; Siganporia, Darius M.; Levy, Arthur J.

    2012-02-14

    A CAD/CAM method is disclosed for a computer system to capture and interchange schematic drawing and associated design information. The schematic drawing and design information are stored in an extensible, platform-independent format.

  20. Fluidics platform and method for sample preparation and analysis

    DOE Patents [OSTI]

    Benner, W. Henry; Dzenitis, John M.; Bennet, William J.; Baker, Brian R.

    2014-08-19

    Herein provided are fluidics platform and method for sample preparation and analysis. The fluidics platform is capable of analyzing DNA from blood samples using amplification assays such as polymerase-chain-reaction assays and loop-mediated-isothermal-amplification assays. The fluidics platform can also be used for other types of assays and analyzes. In some embodiments, a sample in a sealed tube can be inserted directly. The following isolation, detection, and analyzes can be performed without a user's intervention. The disclosed platform may also comprises a sample preparation system with a magnetic actuator, a heater, and an air-drying mechanism, and fluid manipulation processes for extraction, washing, elution, assay assembly, assay detection, and cleaning after reactions and between samples.

  1. Assessment of an ORION-based experimental platform for measuring...

    Office of Scientific and Technical Information (OSTI)

    plasma Citation Details In-Document Search Title: Assessment of an ORION-based experimental platform for measuring the opacity of high-temperature and high-density plasma ...

  2. 2011 Biomass Program Platform Peer Review: Biochemical Conversion...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Biomass Program's Biochemical Platform Review meeting, held on February 14-16, 2011, at the Crowne Plaza Hotel in Downtown Denver, Colorado. PDF icon 2011biochemreview.pdf ...

  3. 2011 Biomass Program Platform Peer Review. Thermochemical Conversion

    SciTech Connect (OSTI)

    Grabowski, Paul E.

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Thermochemical Conversion Platform Review meeting.

  4. Motivation for the Transaction-Based Reference Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Motivation for the Transaction-Based Reference Platform Or How I learned to Stop Worrying and Love Transactions George Hernandez Pacific Northwest National Lab July 23-24, 2015 ...

  5. 2011 Biomass Program Platform Peer Review. Integrated Biorefineries

    SciTech Connect (OSTI)

    Rossmeissl, Neil

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s IBR Platform Review meeting.

  6. xLPR v2.0: Framework Overview Landing platform and deterministic...

    Office of Scientific and Technical Information (OSTI)

    : Framework Overview Landing platform and deterministic model. Citation Details In-Document Search Title: xLPR v2.0: Framework Overview Landing platform and deterministic model. ...

  7. Platforms and Methods for In Situ Characterization of Li-ion...

    Office of Scientific and Technical Information (OSTI)

    Platforms and Methods for In Situ Characterization of Li-ion Battery Materials. Citation Details In-Document Search Title: Platforms and Methods for In Situ Characterization of...

  8. Advanced Platform for Development and Evaluation of Grid Interconnection

    Office of Scientific and Technical Information (OSTI)

    Systems Using Hardware-in-the-Loop (Poster) (Conference) | SciTech Connect Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop (Poster) Citation Details In-Document Search Title: Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop (Poster) This poster describes a Grid Interconnection System Evaluator (GISE) that leverages hardware-in-the-loop (HIL) simulation techniques to rapidly

  9. Advanced Platform for Development and Evaluation of Grid Interconnection

    Office of Scientific and Technical Information (OSTI)

    Systems Using Hardware-in-the-Loop: Part III - Grid Interconnection System Evaluator (Technical Report) | SciTech Connect Technical Report: Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop: Part III - Grid Interconnection System Evaluator Citation Details In-Document Search Title: Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop: Part III - Grid Interconnection System

  10. Advanced Platform for Development and Evaluation of Grid Interconnection

    Office of Scientific and Technical Information (OSTI)

    Systems Using Hardware-in-the-Loop: Part III -- Grid Interconnection System Evaluator: Preprint (Conference) | SciTech Connect Conference: Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop: Part III -- Grid Interconnection System Evaluator: Preprint Citation Details In-Document Search Title: Advanced Platform for Development and Evaluation of Grid Interconnection Systems Using Hardware-in-the-Loop: Part III -- Grid Interconnection

  11. Commercial-Grade, Scalable Support and Training Services Platform |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Commercial-Grade, Scalable Support and Training Services Platform Commercial-Grade, Scalable Support and Training Services Platform Lead Performer: Big Ladder Software - Denver, CO DOE Funding: $149,554 Cost Share: N/A Project Term: June 2014 - March 2015 Funding Opportunity: Small Business Innovation Research FY 2014 Phase 1 Release 2 Awards Project Objective The Department of Energy has funded the development of two industry-leading simulation engines, EnergyPlus and

  12. Nanoscience Research at CINT Using Discovery Platforms. (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Nanoscience Research at CINT Using Discovery Platforms. Citation Details In-Document Search Title: Nanoscience Research at CINT Using Discovery Platforms. Authors: Sullivan, John P. Publication Date: 2012-05-01 OSTI Identifier: 1067715 Report Number(s): SAND2012-3588C DOE Contract Number: AC04-94AL85000 Resource Type: Conference Resource Relation: Conference: Proposed for presentation at the Sandia/Universidad Autonoma de Ciudad Juarez Meeting held April 27, 2012 in

  13. Robotic platform for traveling on vertical piping network

    DOE Patents [OSTI]

    Nance, Thomas A; Vrettos, Nick J; Krementz, Daniel; Marzolf, Athneal D

    2015-02-03

    This invention relates generally to robotic systems and is specifically designed for a robotic system that can navigate vertical pipes within a waste tank or similar environment. The robotic system allows a process for sampling, cleaning, inspecting and removing waste around vertical pipes by supplying a robotic platform that uses the vertical pipes to support and navigate the platform above waste material contained in the tank.

  14. 2011 Biomass Program Platform Peer Review: Integrated Biorefineries

    Energy Savers [EERE]

    Plaform Peer Review: Analysis 2011 Biomass Program Plaform Peer Review: Analysis This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Biomass Program's Analysis Platform Review meeting, held on April 4, 2011, at the Doubletree Hotel in Annapolis, Maryland. PDF icon 2011_analysis_review.pdf More Documents & Publications 2011 Biomass Program Platform

  15. Biomass Program Peer Review Sustainability Platform | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Peer Review Sustainability Platform Biomass Program Peer Review Sustainability Platform Presentation on the Update to the Billion-Ton Study, including differences between the Update and the 2005 Billion-Ton Sudy, assumptions, and findings. PDF icon bt2_webinar.pdf More Documents & Publications U.S. Billion-Ton Update: Biomass Supply for a Bioenergy and Bioproducts Industry Importance of Biomass Production and Supply ECOWAS - GBEP REGIONAL BIOMASS RESOURCE ASSESSMENT WORKSHOP

  16. A Functional Test Platform for the Community Land Model

    SciTech Connect (OSTI)

    Xu, Yang [ORNL] [ORNL; Thornton, Peter E [ORNL] [ORNL; King, Anthony Wayne [ORNL] [ORNL; Steed, Chad A [ORNL] [ORNL; Gu, Lianhong [ORNL] [ORNL; Schuchart, Joseph [ORNL] [ORNL

    2014-01-01

    A functional test platform is presented to create direct linkages between site measurements and the process-based ecosystem model within the Community Earth System Models (CESM). The platform consists of three major parts: 1) interactive user interfaces, 2) functional test model and 3) observational datasets. It provides much needed integration interfaces for both field experimentalists and ecosystem modelers to improve the model s representation of ecosystem processes within the CESM framework without large software overhead.

  17. A Systems Biology Platform for Characterizing Regulatory and Metabolic

    Office of Scientific and Technical Information (OSTI)

    Pathways that Influence and Control Microbial Hydrogen Production (Technical Report) | SciTech Connect Technical Report: A Systems Biology Platform for Characterizing Regulatory and Metabolic Pathways that Influence and Control Microbial Hydrogen Production Citation Details In-Document Search Title: A Systems Biology Platform for Characterizing Regulatory and Metabolic Pathways that Influence and Control Microbial Hydrogen Production Authors: Collins, James J [1] + Show Author Affiliations

  18. 2011 Biomass Program Platform Peer Review: Integrated Biorefineries |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Integrated Biorefineries 2011 Biomass Program Platform Peer Review: Integrated Biorefineries "This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Integrated Biorefinery Platform Review meeting, held on February 1...3, 2011, at the U.S. Department of Energy, Washington, D.C." PDF icon 2011_ibr_review.pdf More Documents & Publications 2011 Biomass

  19. An Extensible Sensing and Control Platform for Building Energy Management |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy An Extensible Sensing and Control Platform for Building Energy Management An Extensible Sensing and Control Platform for Building Energy Management Lead Performer: Carnegie Mellon University - Pittsburgh, PA Project Partners: -- Bosch RTC - Palo Alto, CA -- Lutron Electronics - Washington, DC DOE Funding: $507,402 Cost Share: $74,274 Project Term: 11/1/2013 - 10/31/2014 Funding Opportunity Announcement: "Turn-Key" Open Source Software Solutions for Energy

  20. Maturation and Hardening of the Stabilized Radiometer Platforms (STRAPS)

    Office of Scientific and Technical Information (OSTI)

    Field Campaign Report (Technical Report) | SciTech Connect Maturation and Hardening of the Stabilized Radiometer Platforms (STRAPS) Field Campaign Report Citation Details In-Document Search Title: Maturation and Hardening of the Stabilized Radiometer Platforms (STRAPS) Field Campaign Report Measurements of solar and infrared irradiance by instruments rigidly mounted to an aircraft have historically been plagued by the introduction of offsets and fluctuations into the data that are solely due

  1. CINT Discovery Platforms. (Conference) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    CINT Discovery Platforms. Citation Details In-Document Search Title: CINT Discovery Platforms. Abstract not provided. Authors: Sullivan, John P Publication Date: 2011-10-01 OSTI Identifier: 1118667 Report Number(s): SAND2011-7790C 481823 DOE Contract Number: AC04-94AL85000 Resource Type: Conference Resource Relation: Conference: 2011 Cint User Conference held September 15-16, 2011 in Albuquerque, NM.; Related Information: Proposed for presentation at the 2011 Cint User Conference held September

  2. 2011 Biomass Program Platform Peer Review: Biochemical Conversion |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Biochemical Conversion 2011 Biomass Program Platform Peer Review: Biochemical Conversion This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program's Biochemical Platform Review meeting, held on February 14-16, 2011, at the Crowne Plaza Hotel in Downtown Denver, Colorado. PDF icon 2011_biochem_review.pdf More Documents & Publications 2011 Biomass Program Peer

  3. 2011 Biomass Program Platform Peer Review: Sustainability | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Sustainability 2011 Biomass Program Platform Peer Review: Sustainability "This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Sustainability Platform Review meeting, held on April 5, 2011, at the Doubletree Hotel in Annapolis, Maryland." PDF icon 2011_sustainability_review.pdf More Documents & Publications 2011 Biomass Program Plaform Peer Review: Analysis

  4. 2011 Biomass Program Platform Peer Review: Thermochemical Conversion |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Thermochemical Conversion 2011 Biomass Program Platform Peer Review: Thermochemical Conversion "This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Thermochemical Conversion Platform Review meeting, held on February 16...18, 2011, at the Crowne Plaza Hotel in Downtown Denver, Colorado." PDF icon 2011_thermochem_review.pdf More Documents &

  5. Shasta/Mustique subsea equipment platform interface and operability

    SciTech Connect (OSTI)

    Jefferies, A.T.; Loegering, C.; Steib, D.; Schlater, D.

    1996-12-31

    The economic benefits of all inclusive systems engineering approach is now recognized in the offshore industry. Nowhere is this more evident than in the area of deepwater subsea tiebacks to existing facilities. This type of development requires effective management of the interfaces between personnel on the existing facility and the new project team, the interfaces between the new subsea facilities and the existing platform, and the interface of the new operating procedures with the existing platform daily routine. A second factor in the economic viability of many of these projects is the need to minimize operating costs by avoiding the need for subsea system repair intervention. An operability analysis focusing on the subsea system and platform interface engineering was used on the Hardy projects to address the concerns with the potential for interventions. With minimum operating costs as a primary goal, Hardy encouraged participation from both host platform operating groups from the outset of both projects. This cooperation was critical since both projects were planned to more than double the throughput for both host platforms without adding platform operating personnel. The approach of operator involvement also ensured a safe, reliable, and economic transition between the installation and operating phases of the developments.

  6. Blade platform seal for ceramic/metal rotor assembly

    DOE Patents [OSTI]

    Wertz, John L.

    1982-01-01

    A combination ceramic and metal turbine rotor for use in high temperature gas turbine engines includes a metal rotor disc having a rim with a plurality of circumferentially spaced blade root retention slots therein to receive a plurality of ceramic blades, each including side platform segments thereon and a dovetail configured root slidably received in one of the slots. Adjacent ones of the platform segments including edge portions thereon closely spaced when the blades are assembled to form expansion gaps in an annular flow surface for gas passage through the blades and wherein the assembly further includes a plurality of unitary seal members on the rotor connected to its rim and each including a plurality of spaced, axially extending, flexible fingers that underlie and conform to the edge portions of the platform segments and which are operative at turbine operating temperatures and speeds to distribute loading on the platform segments as the fingers are seated against the underside of the blade platforms to seal the gaps without undesirably stressing thin web ceramic sections of the platform.

  7. Comparison with Carrier Multiplication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complete Theory of Down-Conversion, and a Comparison with Carrier Multiplication 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 22 24 26 28 30 32 34 Measured Quantum Efficiency (QE) Efficiency [%] with Down-Conversion Single- Junction Threshold Solar Cell 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 Peak Efficiency [%] Splitting Multiplicity (M) C=max C=1000 C=100 C=1 C=10 Down Conversion Carrier Multiplication Ze'ev R. Abrams, Avi Niv, Majid Gharghi, Chris Gladden & Xiang Zhang Materials Science

  8. Protein-Based Nanomedicine Platforms for Drug Delivery

    SciTech Connect (OSTI)

    Ma Ham, Aihui; Tang, Zhiwen; Wu, Hong; Wang, Jun; Lin, Yuehe

    2009-08-03

    Drug delivery systems have been developed for many years, however some limitations still hurdle the pace of going to clinical phase, for example, poor biodistribution, drug molecule cytotoxicity, tissue damage, quick clearance from the circulation system, solubility and stability of drug molecules. To overcome the limitations of drug delivery, biomaterials have to be developed and applied to drug delivery to protect the drug molecules and to enhance the drug’s efficacy. Protein-based nanomedicine platforms for drug delivery are platforms comprised of naturally self-assembled protein subunits of the same protein or a combination of proteins making up a complete system. They are ideal for drug delivery platforms due to their biocompatibility and biodegradability coupled with low toxicity. A variety of proteins have been used and characterized for drug delivery systems including the ferritin/apoferritin protein cage, plant derived viral capsids, the small Heat shock protein (sHsp) cage, albumin, soy and whey protein, collagen, and gelatin. There are many different types and shapes that have been prepared to deliver drug molecules using protein-based platforms including the various protein cages, microspheres, nanoparticles, hydrogels, films, minirods and minipellets. There are over 30 therapeutic compounds that have been investigated with protein-based drug delivery platforms for the potential treatment of various cancers, infectious diseases, chronic diseases, autoimmune diseases. In protein-based drug delivery platforms, protein cage is the most newly developed biomaterials for drug delivery and therapeutic applications. Their uniform sizes, multifunctions, and biodegradability push them to the frontier for drug delivery. In this review, the recent strategic development of drug delivery has been discussed with a special emphasis upon the polymer based, especially protein-based nanomedicine platforms for drug delivery. The advantages and disadvantages are also discussed for each type of protein based drug delivery system.

  9. Multiple sort flow cytometer

    DOE Patents [OSTI]

    Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

    1996-01-01

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

  10. Multiple sort flow cytometer

    DOE Patents [OSTI]

    Engh, G. van den; Esposito, R.J.

    1996-01-09

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane. 8 figs.

  11. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  12. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  13. Multiple gap photovoltaic device

    DOE Patents [OSTI]

    Dalal, Vikram L.

    1981-01-01

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  14. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #23, April-June 2009

    SciTech Connect (OSTI)

    Schell, D.

    2009-08-01

    April to June, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  15. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #17, October-December 2007

    SciTech Connect (OSTI)

    Schell, D.

    2008-01-01

    October to December, 2007 edition of the newsletter of the Biochemical Platform Process Integration project.

  16. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #20, July-September 2008

    SciTech Connect (OSTI)

    Schell, D. J.

    2008-12-01

    July to September, 2008 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  17. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #25, October - December 2009

    SciTech Connect (OSTI)

    Schell, D.

    2010-01-01

    October to December, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  18. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #15, April - June 2007

    SciTech Connect (OSTI)

    Schell, D.

    2007-07-01

    July quarterly update for the National Bioenergy Center's Biochemical Processing Platform Integration Project.

  19. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #22, January - March 2009

    SciTech Connect (OSTI)

    Not Available

    2009-04-01

    January to March, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  20. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #24, July-September 2009

    SciTech Connect (OSTI)

    Schell, D.

    2009-10-01

    July to September, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  1. D0 Cryogenic System Superconducting Solenoid Platform I/O

    SciTech Connect (OSTI)

    Markley, D.; /Fermilab

    1997-10-09

    The Dzero detector is scheduled for a major upgrade between 1996 and 1999. This note describes the specifications and configuration of the physical Input/Output devices and instrumentation of the 2 Tesla Superconducting Solenoid. The Solenoid and the VLPC cryostats both reside on the detector platform and are cooled by the Dzero Helium Refrigerator. The cryogenic process control s for these two components will be an extension of the TI565 programmable logic controller system used for other Dzero cryogenic controls. Two Input/Output Bases will be installed on the Dzero detector platform near the cryo corner. These I/O bases will handle all the sensor input and process control output devices from the Solenoid and VLPC cryostats. Having the I/O bases installed on the detector platform makes the connecting cabl ing to the platform much easier . All the instruments are wired directly to the I/O base. The bases have only one communications network cabl e that must be routed off the platform to the South side of the Dzero building.

  2. The Globus Galaxies Platform. Delivering Science Gateways as a Service

    SciTech Connect (OSTI)

    Madduri, Ravi; Chard, Kyle; Chard, Ryan; Lacinski, Lukasz; Rodriguez, Alex; Sulakhe, Dinanath; Kelly, David; Dave, Utpal; Foster, Ian

    2015-04-29

    We use public cloud computers to host sophisticated scientific data; software is then used to transform scientific practice by enabling broad access to capabilities previously available only to the few. The primary obstacle to more widespread use of public clouds to host scientific software (‘cloud-based science gateways’) has thus far been the considerable gap between the specialized needs of science applications and the capabilities provided by cloud infrastructures. We describe here a domain-independent, cloud-based science gateway platform, the Globus Galaxies platform, which overcomes this gap by providing a set of hosted services that directly address the needs of science gateway developers. The design and implementation of this platform leverages our several years of experience with Globus Genomics, a cloud-based science gateway that has served more than 200 genomics researchers across 30 institutions. Building on that foundation, we have also implemented a platform that leverages the popular Galaxy system for application hosting and workflow execution; Globus services for data transfer, user and group management, and authentication; and a cost-aware elastic provisioning model specialized for public cloud resources. We describe here the capabilities and architecture of this platform, present six scientific domains in which we have successfully applied it, report on user experiences, and analyze the economics of our deployments. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  3. Coiled tubing deployed ESP on the Auk platform

    SciTech Connect (OSTI)

    Stewart, D.W.; Watkins, P.; Holtslag, R.J.; Hudson, A.; Wee, P.Y.; McCleery, B.

    1996-12-31

    In March 1995, what is believed to be the world`s first offshore coiled tubing deployed electrical submersible pump (ESP) was successfully commissioned in well AA-03S1 on Shell U.K. Exploration and Production (Shell Expro) Auk platform in the United Kingdom`s Central North Sea. The ESP provides a new and important method of artificial lift for the 21 year old Auk platform, which hitherto had relied upon downhole hydraulic jet pumps to lift approximately half of the platform`s oil production. The coiled tubing deployment proved the viability of performing future workovers with or without the assistance or indeed the presence of a drilling package. The novel completion design successfully catered to the wide variety of customer requirements; Well Engineering for a rigless workover, Petroleum Engineering for reservoir access and Facilities Engineering for a specified flowline height. The experience gained during this project will be a valuable input in determining the future artificial lift strategy for this platform and for other prospects in terms of performance, reliability and operating costs.

  4. Modular turbine airfoil and platform assembly with independent root teeth

    DOE Patents [OSTI]

    Campbell, Christian X; Davies, Daniel O; Eng, Darryl

    2013-07-30

    A turbine airfoil (22E-H) extends from a shank (23E-H). A platform (30E-H) brackets or surrounds a first portion of the shank (23E-H). Opposed teeth (33, 35) extend laterally from the platform (30E-H) to engage respective slots (50) in a disk. Opposed teeth (25, 27) extend laterally from a second portion of the shank (29) that extends below the platform (30E-H) to engage other slots (52) in the disk. Thus the platform (30E-H) and the shank (23E-H) independently support their own centrifugal loads via their respective teeth. The platform may be formed in two portions (32E-H, 34E-H), that are bonded to each other at matching end-walls (37) and/or via pins (36G) passing through the shank (23E-H). Coolant channels (41, 43) may pass through the shank beside the pins (36G).

  5. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  6. Software Platform Evaluation - Verifiable Fuel Cycle Simulation (VISION) Model

    SciTech Connect (OSTI)

    J. J. Jacobson; D. E. Shropshire; W. B. West

    2005-11-01

    The purpose of this Software Platform Evaluation (SPE) is to document the top-level evaluation of potential software platforms on which to construct a simulation model that satisfies the requirements for a Verifiable Fuel Cycle Simulation Model (VISION) of the Advanced Fuel Cycle (AFC). See the Software Requirements Specification for Verifiable Fuel Cycle Simulation (VISION) Model (INEEL/EXT-05-02643, Rev. 0) for a discussion of the objective and scope of the VISION model. VISION is intended to serve as a broad systems analysis and study tool applicable to work conducted as part of the AFCI (including costs estimates) and Generation IV reactor development studies. This document will serve as a guide for selecting the most appropriate software platform for VISION. This is a “living document” that will be modified over the course of the execution of this work.

  7. Portable multiplicity counter

    DOE Patents [OSTI]

    Newell, Matthew R.; Jones, David Carl

    2009-09-01

    A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

  8. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect (OSTI)

    Singleton, M

    2009-07-08

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

  9. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  10. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  11. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  12. Graph processing platforms at scale: practices and experiences

    SciTech Connect (OSTI)

    Lim, Seung-Hwan; Lee, Sangkeun; Brown, Tyler C; Sukumar, Sreenivas R; Ganesh, Gautam

    2015-01-01

    Graph analysis unveils hidden associations of data in many phenomena and artifacts, such as road network, social networks, genomic information, and scientific collaboration. Unfortunately, a wide diversity in the characteristics of graphs and graph operations make it challenging to find a right combination of tools and implementation of algorithms to discover desired knowledge from the target data set. This study presents an extensive empirical study of three representative graph processing platforms: Pegasus, GraphX, and Urika. Each system represents a combination of options in data model, processing paradigm, and infrastructure. We benchmarked each platform using three popular graph operations, degree distribution, connected components, and PageRank over a variety of real-world graphs. Our experiments show that each graph processing platform shows different strength, depending the type of graph operations. While Urika performs the best in non-iterative operations like degree distribution, GraphX outputforms iterative operations like connected components and PageRank. In addition, we discuss challenges to optimize the performance of each platform over large scale real world graphs.

  13. Biomass Program 2007 Program Peer Review - Thermochemical Conversion Platform Summary

    SciTech Connect (OSTI)

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Biomass Program Peer Review for the Thermochemical Platform, held on July 9th and 10th in Golden, Colorado.

  14. Biomass Program 2007 Program Peer Review - Feedstock Platform Summary

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Feedstock Platform Portfolio Peer Review held on August 21st through 23rd in Washington D.C.

  15. Biomass Program 2007 Peer Review - Integrated Biorefinery Platform Summary

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Integrated Biorefinery Platform Review held on August 13-15, 2007 in Golden, Colorado.

  16. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  17. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  18. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, Norman J.; Zhang, Jian Z.

    1995-01-01

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibres to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands.

  19. Multiple-port valve

    DOE Patents [OSTI]

    Doody, Thomas J.

    1978-08-22

    A multiple-port valve assembly is designed to direct flow from a primary conduit into any one of a plurality of secondary conduits as well as to direct a reverse flow. The valve includes two mating hemispherical sockets that rotatably receive a spherical valve plug. The valve plug is attached to the primary conduit and includes diverging passageways from that conduit to a plurality of ports. Each of the ports is alignable wih one or more of a plurality of secondary conduits fitted into one of the hemispherical sockets. The other hemispherical socket includes a slot for the primary conduit such that the conduit's motion along that slot with rotation of the spherical plug about various axes will position the valve-plug ports in respect to the secondary conduits.

  20. Multiple layer insulation cover

    DOE Patents [OSTI]

    Farrell, James J.; Donohoe, Anthony J.

    1981-11-03

    A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

  1. MULTIPLE SPARK GAP SWITCH

    DOE Patents [OSTI]

    Schofield, A.E.

    1958-07-22

    A multiple spark gap switch of unique construction is described which will permit controlled, simultaneous discharge of several capacitors into a load. The switch construction includes a disc electrode with a plurality of protuberances of generally convex shape on one surface. A firing electrode is insulatingly supponted In each of the electrode protuberances and extends substantially to the apex thereof. Individual electrodes are disposed on an insulating plate parallel with the disc electrode to form a number of spark gaps with the protuberances. These electrodes are each connected to a separate charged capacitor and when a voltage ls applied simultaneously between the trigger electrodes and the dlsc electrode, each spark gap fires to connect its capacitor to the disc electrode and a subsequent load.

  2. Ultra Fast X-ray Streak Camera for TIM Based Platforms (Conference...

    Office of Scientific and Technical Information (OSTI)

    Ultra Fast X-ray Streak Camera for TIM Based Platforms Citation Details In-Document Search Title: Ultra Fast X-ray Streak Camera for TIM Based Platforms You are accessing a ...

  3. One UN Training Service Platform for Climate Change (UN CC:LEARN...

    Open Energy Info (EERE)

    UN Training Service Platform for Climate Change (UN CC:LEARN) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: One UN Training Service Platform for Climate Change (UN...

  4. OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction Validation (OPPSDIV) OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction Validation (OPPSDIV) OTEC Cold Water ...

  5. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; McWhorter, Paul Jackson; Rodgers, Murray Steven; Sniegowski, Jeffry J.; Barnes, Stephen M.

    2003-04-08

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  6. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; McWhorter, Paul Jackson; Rodgers, Murray Steven; Sniegowski, Jeffry J.; Barnes, Stephen M.

    2004-07-06

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with-the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  7. Simulator platform for fast reactor operation and safety technology demonstration

    SciTech Connect (OSTI)

    Vilim, R. B.; Park, Y. S.; Grandy, C.; Belch, H.; Dworzanski, P.; Misterka, J.

    2012-07-30

    A simulator platform for visualization and demonstration of innovative concepts in fast reactor technology is described. The objective is to make more accessible the workings of fast reactor technology innovations and to do so in a human factors environment that uses state-of-the art visualization technologies. In this work the computer codes in use at Argonne National Laboratory (ANL) for the design of fast reactor systems are being integrated to run on this platform. This includes linking reactor systems codes with mechanical structures codes and using advanced graphics to depict the thermo-hydraulic-structure interactions that give rise to an inherently safe response to upsets. It also includes visualization of mechanical systems operation including advanced concepts that make use of robotics for operations, in-service inspection, and maintenance.

  8. REopt: A Platform for Energy System Integration and Optimization: Preprint

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    REopt: A Platform for Energy System Integration and Optimization Preprint T. Simpkins, D. Cutler, K. Anderson, D. Olis, E. Elgqvist, M. Callahan, and A. Walker Presented at the 8th International Conference on Energy and Sustainability (ES2014) Boston, Massachusetts June 20 - July 2, 2014 Conference Paper NREL/CP-7A40-61783 August 2014 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (Alliance), a contractor of the US Government under

  9. LANL researchers develop platform to study subsurface reservoir conditions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Subsurface reservoir conditions LANL researchers develop platform to study subsurface reservoir conditions This increasing demand for energy around the globe requires a better understanding of subsurface energy resources and their associated environmental issues. March 7, 2016 Shown are time lapse images of supercritical CO2 displacing water in a fracture etched into a shale micromodel. The white, blue and gray colors represent supercritical CO2, water and shale, respectively. Shown are time

  10. Development of a Very Dense Liquid Cooled Compute Platform

    SciTech Connect (OSTI)

    Hughes, Phillip N.; Lipp, Robert J.

    2013-12-10

    The objective of this project was to design and develop a prototype very energy efficient high density compute platform with 100% pumped refrigerant liquid cooling using commodity components and high volume manufacturing techniques. Testing at SLAC has indicated that we achieved a DCIE of 0.93 against our original goal of 0.85. This number includes both cooling and power supply and was achieved employing some of the highest wattage processors available.

  11. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #12, July-September 2006

    SciTech Connect (OSTI)

    Schell, D.

    2006-10-01

    Volume 12 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

  12. AutoGrid - Turning Big Data Into Power with the Energy Data Platform and Apps

    SciTech Connect (OSTI)

    Narayan, Amit; Dresselhuys, Eric; Kulp, Yann; Buseman, Greg; Piette, Mary Ann; Tang, Andrew; Dailey, Karla; Knudsen, Chris

    2014-03-25

    AutoGrid personnel discuss how they are turning big data into power with the energy data platform and apps.

  13. P417755_IndirectDirectDrivePlatforms_NUG14_v8

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ignition Facility * Lawrence Livermore National Laboratory * Operated by the U.S. Department of Energy This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. P417755_Platforms_Ma LLNL-POST-649443 Indirect and Direct Drive Implosion Platforms on the National Ignition Facility Diagnostic Con guration Warm Targets Indirect Drive Platforms Why Implosions? Direct Drive Platforms Cryogenic Targets Nuclear

  14. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #21, October - December 2008

    SciTech Connect (OSTI)

    Schell, D.

    2009-01-01

    October to December, 2008 edition of the National Bioenergy Center?s Biochemical Platform Integration Project quarterly newsletter.

  15. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #10, January-March 2006

    SciTech Connect (OSTI)

    Not Available

    2006-04-01

    Volume 10 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

  16. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #9, October-December 2005

    SciTech Connect (OSTI)

    Schell, D. J.

    2006-01-01

    Volume 9 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

  17. National Bioenergy Center Biochemical Platform Process Integration Project: Quarterly Update #18, January-March 2008

    SciTech Connect (OSTI)

    Schell, D.

    2008-04-01

    January-March, 2008 edition of the quarterly update for the National Bioenergy Center's Biochemical Platform Integration Project.

  18. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #11, April-June 2006

    SciTech Connect (OSTI)

    Schell, D.

    2006-07-01

    Volume 11 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

  19. REopt: A Platform for Energy System Integration and Optimization: Preprint

    SciTech Connect (OSTI)

    Simpkins, T.; Cutler, D.; Anderson, K.; Olis, D.; Elgqvist, E.; Callahan, M.; Walker, A.

    2014-08-01

    REopt is NREL's energy planning platform offering concurrent, multi-technology integration and optimization capabilities to help clients meet their cost savings and energy performance goals. The REopt platform provides techno-economic decision-support analysis throughout the energy planning process, from agency-level screening and macro planning to project development to energy asset operation. REopt employs an integrated approach to optimizing a site?s energy costs by considering electricity and thermal consumption, resource availability, complex tariff structures including time-of-use, demand and sell-back rates, incentives, net-metering, and interconnection limits. Formulated as a mixed integer linear program, REopt recommends an optimally-sized mix of conventional and renewable energy, and energy storage technologies; estimates the net present value associated with implementing those technologies; and provides the cost-optimal dispatch strategy for operating them at maximum economic efficiency. The REopt platform can be customized to address a variety of energy optimization scenarios including policy, microgrid, and operational energy applications. This paper presents the REopt techno-economic model along with two examples of recently completed analysis projects.

  20. Lightweight Integrated Optical Sensor for Atmospheric Measurements on Mobile Platforms

    SciTech Connect (OSTI)

    Parameswaran, Krishnan R.

    2013-12-02

    The goal of the Phase I program was to develop a novel open path sensor platform technology based on integration of semiconductor waveguides with efficient optoelectronic components on a monolithic platform. The successful Phase I effort resulted in demonstration of a novel optical resonator structure based on semiconductor high contrast gratings (HCGs) that will enable implementation of an ultra-compact, low-power gas sensor suitable for use on mobile platforms. Extensive numerical modeling was performed to design a device optimized for measuring CO2 at a wavelength for which a laser was available for proof of concept. Devices were fabricated and tested to match the target wavelength, angle, and operating temperature. This demonstration is the first implementation of HCGs at the wavelengths of interest and shows the flexibility of the proposed architecture for gas sensing applications. The measured cavity Q was lower than anticipated due to fabrication process challenges. The PSI and UC Berkeley team has identified solutions to these challenges and will produce optimized devices in a Phase II program where a prototype sensor will be fabricated and tested.

  1. A Power Hardware-in-the-Loop Platform with Remote Distribution Circuit Cosimulation

    SciTech Connect (OSTI)

    Palmintier, Bryan; Lundstrom, Blake; Chakraborty, Sudipta; Williams, Tess L.; Schneider, Kevin P.; Chassin, David P.

    2015-04-01

    This paper demonstrates the use of a novel cosimulation architecture that integrates hardware testing using Power Hardware-in-the-Loop (PHIL) with larger-scale electric grid models using off-the-shelf, non-PHIL software tools. This architecture enables utilities to study the impacts of emerging energy technologies on their system and manufacturers to explore the interactions of new devices with existing and emerging devices on the power system, both without the need to convert existing grid models to a new platform or to conduct in-field trials. The paper describes an implementation of this architecture for testing two residential-scale advanced solar inverters at separate points of common coupling. The same hardware setup is tested with two different distribution feeders (IEEE 123 and 8500 node test systems) modeled using GridLAB-D. In addition to simplifying testing with multiple feeders, the architecture demonstrates additional flexibility with hardware testing in one location linked via the Internet to software modeling in a remote location. In testing, inverter current, real and reactive power, and PCC voltage are well captured by the co-simulation platform. Testing of the inverter advanced control features is currently somewhat limited by the software model time step (1 sec) and tested communication latency (24 msec). Overshoot induced oscillations are observed with volt/VAR control delays of 0 and 1.5 sec, while 3.4 sec and 5.5 sec delays produced little or no oscillation. These limitations could be overcome using faster modeling and communication within the same co-simulation architecture.

  2. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis Acknowledgements This report was produced by the U.S. Department of Energy's Office of Energy Policy and Systems Analysis (DOE-EPSA) under the direction of Craig Zamuda. Matt Antes, C.W. Gillespie, Anna Mosby, and Beth Zotter of Energetics Incorporated provided analysis, drafting support, and technical editing.

  3. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  4. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  5. Vulnerability and adaptation to severe weather events in the American southwest

    SciTech Connect (OSTI)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptation to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.

  6. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  7. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  8. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  9. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  10. Multiple stage railgun

    DOE Patents [OSTI]

    Hawke, Ronald S.; Scudder, Jonathan K.; Aaland, Kristian

    1982-01-01

    A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

  11. MULTIPLE SHAFT TOOL HEAD

    DOE Patents [OSTI]

    Colbert, H.P.

    1962-10-23

    An improved tool head arrangement is designed for the automatic expanding of a plurality of ferruled tubes simultaneously. A plurality of output shafts of a multiple spindle drill head are driven in unison by a hydraulic motor. A plurality of tube expanders are respectively coupled to the shafts through individual power train arrangements. The axial or thrust force required for the rolling operation is provided by a double acting hydraulic cylinder having a hollow through shaft with the shaft cooperating with an internally rotatable splined shaft slidably coupled to a coupling rigidly attached to the respectlve output shaft of the drill head, thereby transmitting rotary motion and axial thrust simultaneously to the tube expander. A hydraulic power unit supplies power to each of the double acting cylinders through respective two-position, four-way valves, under control of respective solenoids for each of the cylinders. The solenoids are in turn selectively controlled by a tool selection control unit which in turn is controlled by signals received from a programmed, coded tape from a tape reader. The number of expanders that are extended in a rolling operation, which may be up to 42 expanders, is determined by a predetermined program of operations depending upon the arrangement of the ferruled tubes to be expanded in the tube bundle. The tape reader also supplies dimensional information to a machine tool servo control unit for imparting selected, horizontal and/or vertical movement to the tool head assembly. (AEC)

  12. Sigmund and WInterbon Multiple Scattering

    Energy Science and Technology Software Center (OSTI)

    1985-03-01

    SWIMS calculates the angular dispersion of ion beams that undergo small-angle, incoherent multiple scattering by gaseous or solid media.

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. VOLUNTARY LEAVE TRANSFER PROGRAM

    Energy Savers [EERE]

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  15. The Draugen platform and subsea structures, installation and foundation aspects

    SciTech Connect (OSTI)

    Alm, T.; Bye, A.; Sandvik, K.; Egeland, S.

    1995-12-01

    Installation data from the Draugen GBS and subsea structures have been processed and analyzed in order to verify the design assumptions with regards to soil reactions. These results have shown that penetration of concrete skirts and piles into the very hard clay layer, typically found at the Haltenbanken area is feasible. The resistances may be predicted with reasonable accuracy using conventional methods and average soil strength values as obtained by traditional soil testing. This paper reveals and comments the installation data both for the gravity platform and the piles for the different subsea structures and provides and updated basis for foundation design of similar structures in the area.

  16. The power grid of the future is a platform that

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    power grid of the future is a platform that delivers reliable, affordable, and clean electricity to American consumers where they want it, when they want it, and how they want it. To jump start the modernization of our nation's aging energy infrastructure, the American Recovery and Reinvestment Act invested $4.5 billion in the electric sector -matched by private funding to reach a total of about $9.5 billion- so that Americans could start experiencing the benefits of the future grid sooner. Over

  17. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  18. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  19. Monitoring system including an electronic sensor platform and an interrogation transceiver

    DOE Patents [OSTI]

    Kinzel, Robert L.; Sheets, Larry R.

    2003-09-23

    A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.

  20. Multiple Motivations Institutional Change Principle

    Broader source: Energy.gov [DOE]

    The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

  1. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  2. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  3. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  4. April 5 PSERC Webinar: Seamless Bulk Electric Grid Management: A Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for Designing the Next Generation EMS | Department of Energy 5 PSERC Webinar: Seamless Bulk Electric Grid Management: A Platform for Designing the Next Generation EMS April 5 PSERC Webinar: Seamless Bulk Electric Grid Management: A Platform for Designing the Next Generation EMS March 21, 2016 - 1:27pm Addthis The DOE-funded Power Systems Engineering Research Center (PSERC) is offering a free public webinar that will address the feasibility of a flexible platform that is needed when designing

  5. Design of the SLAC RCE Platform: A General Purpose ATCA Based Data

    Office of Scientific and Technical Information (OSTI)

    Acquisition System (Conference) | SciTech Connect Conference: Design of the SLAC RCE Platform: A General Purpose ATCA Based Data Acquisition System Citation Details In-Document Search Title: Design of the SLAC RCE Platform: A General Purpose ATCA Based Data Acquisition System The SLAC RCE platform is a general purpose clustered data acquisition system implemented on a custom ATCA compliant blade, called the Cluster On Board (COB). The core of the system is the Reconfigurable Cluster Element

  6. Advanced Sorbents as a Versatile Platform for Gas Separation

    SciTech Connect (OSTI)

    Neil Stephenson

    2003-09-30

    The program objective was to develop materials and processes for industrial gas separations to reduce energy use and enable waste reduction. The approach chosen combined novel oxygen selective adsorbents and pressure swing adsorption (PSA) processes. Preliminary materials development and process simulation results indicated that oxygen selective adsorbents could provide a versatile platform for industrial gas separations. If fully successful, this new technology offered the potential for reducing the cost of producing nitrogen/oxygen co-products, high purity nitrogen, argon, and possibly oxygen. The potential energy savings for the gas separations are appreciable, but the end users are the main beneficiaries. Lowering the cost of industrial gases expands their use in applications that can employ them for reducing energy consumption and emissions.

  7. Nanoporous Gold as a Platform for a Building Block Catalyst

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wittstock, Arne; Wichmann, Andre; Baeumer, Marcus

    2012-09-25

    The porous bulk materials are of great interest in catalysis because they can be employed in heterogeneous gas and liquid phase catalysis, electrocatalysis, and in electrocatalytic sensing. Nanoporous gold gained considerable attraction in this context because it is the prime example of a corrosion-derived nanoporous bulk metal. Moreover, the material was shown to be a very active and selective Au type catalyst for a variety of oxidation reactions. In leveraging the functionalization of the surface of the material with various additives, its catalytic applications can be extended and tuned. In this review, we will summarize recent developments in using nanoporousmore » gold as the platform for the development of high performance catalytic materials by adding metals, metal oxides, and molecular functionalities as building blocks.« less

  8. Evaluation of the Tellabs 1150 GPON multiservice access platform.

    SciTech Connect (OSTI)

    Brenkosh, Joseph Peter; Wolf, Jimmie V.

    2014-11-01

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  9. Pretreatment Engineering Platform Phase 1 Final Test Report

    SciTech Connect (OSTI)

    Kurath, Dean E.; Hanson, Brady D.; Minette, Michael J.; Baldwin, David L.; Rapko, Brian M.; Mahoney, Lenna A.; Schonewill, Philip P.; Daniel, Richard C.; Eslinger, Paul W.; Huckaby, James L.; Billing, Justin M.; Sundar, Parameshwaran S.; Josephson, Gary B.; Toth, James J.; Yokuda, Satoru T.; Baer, Ellen BK; Barnes, Steven M.; Golovich, Elizabeth C.; Rassat, Scot D.; Brown, Christopher F.; Geeting, John GH; Sevigny, Gary J.; Casella, Amanda J.; Bontha, Jagannadha R.; Aaberg, Rosanne L.; Aker, Pamela M.; Guzman-Leong, Consuelo E.; Kimura, Marcia L.; Sundaram, S. K.; Pires, Richard P.; Wells, Beric E.; Bredt, Ofelia P.

    2009-12-23

    Pacific Northwest National Laboratory (PNNL) was tasked by Bechtel National Inc. (BNI) on the River Protection Project, Hanford Tank Waste Treatment and Immobilization Plant (RPP-WTP) project to conduct testing to demonstrate the performance of the WTP Pretreatment Facility (PTF) leaching and ultrafiltration processes at an engineering-scale. In addition to the demonstration, the testing was to address specific technical issues identified in Issue Response Plan for Implementation of External Flowsheet Review Team (EFRT) Recommendations - M12, Undemonstrated Leaching Processes.( ) Testing was conducted in a 1/4.5-scale mock-up of the PTF ultrafiltration system, the Pretreatment Engineering Platform (PEP). Parallel laboratory testing was conducted in various PNNL laboratories to allow direct comparison of process performance at an engineering-scale and a laboratory-scale. This report presents and discusses the results of those tests.

  10. Quantitative Comparison of the Responses of Three Floating Platforms

    SciTech Connect (OSTI)

    Jonkman, J.; Matha, D.

    2010-03-01

    This report presents a comprehensive dynamic-response analysis of three offshore floating wind turbine concepts. Models were composed of one 5-MW turbine supported on land and three 5-MW turbines located offshore on a tension leg platform, a spar buoy, and a barge. A loads and stability analysis adhering to the procedures of international design standards was performed for each model using the fully coupled time-domain aero-hydro-servo-elastic design code FAST with AeroDyn and HydroDyn. The concepts are compared based on the calculated ultimate loads, fatigue loads, and instabilities. The results of this analysis will help resolve the fundamental design trade-offs between the floating-system concepts.

  11. Vertically Aligned Carbon Nanofiber Based Biosensor Platform for Glucose Sensor

    SciTech Connect (OSTI)

    Mamun, Khandaker Abdullah Al; Tulip, Fahmida S; Macarthur, Kimberly C; McFarlane, Nicole M; Islam, Syed K

    2014-01-01

    Vertically aligned carbon nanofibers (VACNFs) have recently become an important tool for biosensor design. Carbon nanofibers (CNF) have excellent conductive and structural properties with many irregularities and defect sites in addition to exposed carboxyl groups throughout their surfaces. These properties allow a better immobilization matrix compared to carbon nanotubes and offer better resolution when compared with the FET-based biosensors. VACNFs can be deterministically grown on silicon substrates allowing optimization of the structures for various biosensor applications. Two VACNF electrode architectures have been employed in this study and a comparison of their performances has been made in terms of sensitivity, sensing limitations, dynamic range, and response time. The usage of VACNF platform as a glucose sensor has been verified in this study by selecting an optimum architecture based on the VACNF forest density. Read More: http://www.worldscientific.com/doi/abs/10.1142/S0129156414500062

  12. Hazard Analysis for the Pretreatment Engineering Platform (PEP)

    SciTech Connect (OSTI)

    Sullivan, Robin S.; Geeting, John GH; Lawrence, Wesley E.; Young, Jonathan

    2008-07-10

    The Pretreatment Engineering Platform (PEP) is designed to perform a demonstration on an engineering scale to confirm the Hanford Waste Treatment Plant Pretreatment Facility (PTF) leaching and filtration process equipment design and sludge treatment process. The system will use scaled prototypic equipment to demonstrate sludge water wash, caustic leaching, oxidative leaching, and filtration. Unit operations to be tested include pumping, solids washing, chemical reagent addition and blending, heating, cooling, leaching, filtration, and filter cleaning. In addition, the PEP will evaluate potential design changes to the ultrafiltration process system equipment to potentially enhance leaching and filtration performance as well as overall pretreatment throughput. The skid-mounted system will be installed and operated in the Processing Development Laboratory-West at Pacific Northwest National Laboratory (PNNL) in Richland, Washington.

  13. MeDICi: An Open Platform for Sensor Integration

    SciTech Connect (OSTI)

    Wynne, Adam S.; Gorton, Ian; Chase, Jared M.; Stephan, Eric G.

    2009-09-04

    MeDICi (Middleware for Data Intensive Computing) is a platform for developing high performance, distributed streaming analytic and scientific applications. Developed at Pacific Northwest National Laboratory (PNNL), MeDICi has been released under an open source license and is based on enterprise-proven middleware technologies including a widely used Enterprise Service Bus (ESB), the standard Business Process Execution Language (BPEL), and open source message brokers. Wherever possible, we have built on existing open source, standards-based systems and integrated them into a coherent whole by creating simplified graphical programming tools such as a Workflow Designer and an easy to use and well-documented integration API. This software development approach allows us to: avoid re-creating complex service integration and orchestration systems, reap the benefits of continual improvements to the technology base, and focus on creating tools and APIs which allow for the creation of re-usable component-based software components applications and workflows. These aspects have facilitated rapid adoption of the platform within PNNL for demonstration and operational applications. In fact, MeDICi has been used for a wide range of integration projects including two sensor integration applications described later on in this paper. The remainder of this article white paper is organized as follows: Section 2 provides a high-level description of the MeDICi architecture. In Section 3, the open aspects of the API and tool development are highlighted. Section 4 explains system readiness by presenting relevant demonstrations and deployments. Finally documentation and licensing details are provided in Section 5

  14. LEDSGP/about/Latin America and Caribbean Regional Platform/LAC...

    Open Energy Info (EERE)

    and Caribbean Regional Platform Workshop 12-14 November 2012 Alajuela, Costa Rica, INCAE Business School The workshop is an initiative of the LEDS Global Partnership (http:...

  15. Microfluidic Molecular Assay Platform for the Detection of miRNAs...

    Office of Scientific and Technical Information (OSTI)

    Article: Microfluidic Molecular Assay Platform for the Detection of miRNAs, mRNAs, Proteins, and Post-translational Modifications at Single-cell Resolution. Citation Details...

  16. A MEMS platform for in situ, real-time monitoring of electrochemically...

    Office of Scientific and Technical Information (OSTI)

    Title: A MEMS platform for in situ, real-time monitoring of electrochemically induced mechanical changes in lithium-ion battery electrodes Authors: Pomerantseva, Ekaterina ; Jung, ...

  17. OpenMortar.io: An Extensible Sensing and Control Platform for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... side * Extensible Device Interfaces - FireFly Wireless Sensing Platform, BACnet, Android@Home, NEST thermostat, Web Services, ModBus, PUP, Zigbee, Zwave 7 Mortar.io ...

  18. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  19. Groundwaters of Florence (Italy): Trace element distribution and vulnerability of the aquifers

    SciTech Connect (OSTI)

    Bencini, A.; Ercolanelli, R.; Sbaragli, A.

    1993-11-01

    Geochemical and hydrogeological research has been carried out in Florence, to evaluate conductivity and main chemistry of groundwaters, the pattern of some possible pollutant chemical species (Fe, Mn, Cr, Cu, Pb, Zn, NO{sub 2}, NO{sub 3}), and the vulnerability of the aquifers. The plain is made up of Plio-Quaternary alluvial and lacustrine sediments for a maximum thickness of 600 m. Silts and clays, sometimes with lenses of sandy gravels, are dominant, while considerable deposits of sands, pebbles, and gravels occur along the course of the Arno river and its tributary streams, and represent the most important aquifer of the plain. Most waters show conductivity values around 1000-1200 {mu}S, and almost all of them have an alkaline-earth-bicarbonate chemical character. In western areas higher salt content of the groundwaters is evident. Heavy metal and NO{sub 2}, NO{sub 3} analyses point out that no important pollution phenomena affect the groundwaters; all mean values are below the maximum admissible concentration (MAC) for drinkable waters. Some anomalies of NO{sub 2}, NO{sub 3}, Fe, Mn, and Zn are present. The most plausible causes can be recognized in losses of the sewage system; use of nitrate compounds in agriculture; oxidation of well pipes. All the observations of Cr, Cu, and Pb are below the MAC; the median values of <3, 3.9, and 1.1 {mu}g/l, respectively, could be considered reference concentrations for groundwaters in calcareous lithotypes, under undisturbed natural conditions. Finally, a map of vulnerability shows that the areas near the Arno river are highly vulnerable, for the minimum thickness (or lacking) of sediments covering the aquifer. On the other hand, in the case of pollution, several factors not considered could significantly increase the self-purification capacity of the aquifer, such asdilution of groundwaters, bacteria oxidation of nitrogenous species, and sorption capacity of clay minerals and organic matter. 31 refs., 6 figs., 5 tabs.

  20. Vulnerability of Karangkates dams area by means of zero crossing analysis of data magnetic

    SciTech Connect (OSTI)

    Sunaryo, E-mail: sunaryo.geofis.ub@gmail.com; Susilo, Adi

    2015-04-24

    Study with entitled Vulnerability Karangkates Dam Area By Means of Zero Crossing Analysis of Data Magnetic has been done. The study was aimed to obtain information on the vulnerability of two parts area of Karangkates dams, i.e. Lahor dam which was inaugurated in 1977 and Sutami dam inaugurated in 1981. Three important things reasons for this study are: 1). The dam age was 36 years old for Lahor dam and 32 years old for Sutami dam, 2). Geologically, the location of the dams are closed together to the Pohgajih local shear fault, Selorejo local fault, and Selorejo limestone-andesite rocks contact plane, and 3). Karangkates dams is one of the important Hydro Power Plant PLTA with the generating power of about 400 million KWH per year from a total of about 29.373MW installed in Indonesia. Geographically, the magnetic data acquisition was conducted at coordinates (112.4149oE;-8.2028oS) to (112.4839oE;-8.0989oS) by using Proton Precession Magnetometer G-856. Magnetic Data acquisition was conducted in the radial direction from the dams with diameter of about 10 km and the distance between the measurements about 500m. The magnetic data acquisition obtained the distribution of total magnetic field value in the range of 45800 nT to 44450 nT. Residual anomalies obtained by doing some corrections, including diurnal correction, International Geomagnetic Reference Field (IGRF) correction, and reductions so carried out the distribution of the total magnetic field value in the range of -650 nT to 700 nT. Based on the residual anomalies, indicate the presence of 2 zones of closed closures dipole pairs at located in the west of the Sutami dam and the northwest of the Lahor dam from 5 total zones. Overlapping on the local geological map indicated the lineament of zero crossing patterns in the contour of residual anomaly contour with the Pohgajih shear fault where located at about 4 km to the west of the Sutami dam approximately and andesite-limestone rocks contact where located at about 6 km to the west of the Lahor dam approximately. These shown a possible of vulnerability on geohazards at the west zone of the Karangkates (Lahor-Sutami) dams area if there are triggers by the vibration (earthquake) on the Pohgajih shear fault, andesite-limestone contact plane, and instability rocks on two zones of closed closure dipole pairs area. Reality, on the location of the study shown some local landslide at the several locations and the main road that need considering for disaster mitigation.