Sample records for multiple vulnerabilities platform

  1. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  2. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  3. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  4. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  5. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  6. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  7. Robotic vehicle with multiple tracked mobility platforms

    DOE Patents [OSTI]

    Salton, Jonathan R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM); Garretson, Justin (Albuquerque, NM); Hayward, David R. (Wetmore, CO); Hobart, Clinton G. (Albuquerque, NM); Deuel, Jr., Jamieson K. (Albuquerque, NM)

    2012-07-24T23:59:59.000Z

    A robotic vehicle having two or more tracked mobility platforms that are mechanically linked together with a two-dimensional coupling, thereby forming a composite vehicle of increased mobility. The robotic vehicle is operative in hazardous environments and can be capable of semi-submersible operation. The robotic vehicle is capable of remote controlled operation via radio frequency and/or fiber optic communication link to a remote operator control unit. The tracks have a plurality of track-edge scallop cut-outs that allow the tracks to easily grab onto and roll across railroad tracks, especially when crossing the railroad tracks at an oblique angle.

  8. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  9. T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:

  10. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  11. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartmentWireshark

  12. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities | DepartmentEnergy

  13. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department of

  14. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  15. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCodeMultiple

  16. A Protocol for the Atomic Capture of Multiple Molecules on Large Scale Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Protocol for the Atomic Capture of Multiple Molecules on Large Scale Platforms Marin Bertier services. Envi- sioned over largely distributed and highly dynamic platforms, expressing this coordination coordination of services. However, the execution of such programs over large scale platforms raises several

  17. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  18. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  19. V-080: Apple iOS Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment

  20. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of Energy Cisco|

  1. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment ofWordPress

  2. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe

  3. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple has

  4. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59CapabilityVulnerabilities | Department1: IBM

  5. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were...

  6. Department of Industrial and Manufacturing Engineering Fall 2011 Multiple Position Welding Platform

    E-Print Network [OSTI]

    Demirel, Melik C.

    Welding Platform Overview The Rockland Manufacturing Company makes a wide variety of custom attachments · CAD models created for the adjustable platform designs · Prototype manufactured at Penn State using raw materials for the platform and railing and a purchased pallet stacker and step ladder Outcomes

  7. Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms

    E-Print Network [OSTI]

    Williams, Samuel

    2009-01-01T23:59:59.000Z

    but simpler than a recent index compression approach [28].multiplication using index and value compression. In Conf.format, and index size. i.e.the compression strategy that

  8. Poly(dimethylsiloxane) microchip-based immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform

    SciTech Connect (OSTI)

    Shao, Guocheng; Wang, Jun; Li, Zhaohui; Saraf, Laxmikant V.; Wang, Wanjun; Lin, Yuehe

    2011-09-20T23:59:59.000Z

    In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing platform with integrated pneumatic micro valves is described. The microchip was fabricated with multiple layer soft lithography technology. By controlling the activation status of corresponding valves, reagent flows in the microchannel network can be well manipulated so that immuno-reactions only take place at designated reaction zones (DRZs). Four DRZs are included in the prototype microchip. Since these DRZs are all isolated from each other by micro valves, cross contamination is prevented. Using the inner surface of the all-PDMS microchannel as immunoassay substrate, on-chip sandwich format solid phase immunoassay was performed to demonstrate the feasibility of this immuno-sensing platform. Mouse IgG and fluorescein isothiocyanate (FITC) were used as the model analyte and the signal reporter respectively. Only 10 ul sample is needed for the assay and low detection limit of 5 ng/ml (?33 pM) was achieved though low-cost polyclonal antibodies were used in our experiment for feasibility study only. The encouraging results from mouse IgG immunoassay proved the feasibility of our microchip design. With slight modification of the assay protocol, the same chip design can be used for multi-target detection and can provide a simple, cost-effective and integrated microchip solution for multiplex immunoassay applications.

  9. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    Vulnerability Scanning Policy 1 Introduction Vulnerability scanning is an important and necessary and can alert system administrators to potentially serious problems. However vulnerability scanning also to compromise system security. The following policy details the conditions under which vulnerability scans may

  10. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  11. Data collection and management of a mobile sensor platform

    E-Print Network [OSTI]

    Rosenfeld, Abraham M

    2013-01-01T23:59:59.000Z

    This thesis explores the development of a platform to better collect and manage data from multiple senor inputs mounted on a car sensor platform. Specifically, focusing on the collection and synchronization of multiple ...

  12. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  13. Platform identification using Design Structure Matrices

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Platform identification using Design Structure Matrices Konstantinos Kalligeros* , Olivier de Weck identification of platform components at multiple levels of system aggregation, among variants within a family variables of the variants. We then introduce a novel algorithm for the identification of platform variables

  14. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  15. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  16. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  17. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  18. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy 094: IBM

  19. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Office of Environmental Management (EM)

    51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

  20. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  1. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  2. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  3. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  4. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  5. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  6. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  7. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    Power Grid Vulnerability to Geographically Correlated Failures ­ Analysis and Control Implications such as telecommunications networks [14]. The power grid is vulnerable to natural disasters, such as earthquakes, hurricanes [17], [34]. Thus, we focus on the vulnerability of the power grid to an outage of several lines

  8. Reassessment of offshore platforms

    SciTech Connect (OSTI)

    Nair, V.V.D.; Kuhn, J.M. (Mobil Research and Development Corporation, Dallas, TX (United States))

    1993-05-01T23:59:59.000Z

    Data from Hurricane Andrew demonstrated that the systems and procedures in place for evacuating offshore workers and minimizing oil spills and environmental damage functioned as planned. While the vast majority of the platforms survived the storm with no damage, a few of the older platforms (installed prior to 1972) either collapsed or suffered severe damage. The collapsed platforms were designed with insufficient deck height to clear the storm waves. In recent years, the API RP 2A has introduced guidance for minimum air gap, minimum structures, platform inspection and platform reuse. These provisions, coupled with natural attribution of the older platforms, will significantly improve the performance of platforms in the future. The reliability of NDT techniques to detect major structural defects should be improved through continued research. While flooded member detection is used by several operators as a screening tool to detect major defects underwater, its reliability is not always good and further research is needed in this area. Another area of high priority research is related to the use of Remotely Operated Vehicles (ROV) to perform underwater inspection of structures. 51 refs., 7 figs.

  9. Ladder attachment platform

    DOE Patents [OSTI]

    Swygert,; Richard, W [Springfield, SC

    2012-08-28T23:59:59.000Z

    A ladder attachment platform is provided that includes a base for attachment to a ladder that has first and second side rails and a plurality of rungs that extend between in a lateral direction. Also included is a user platform for having a user stand thereon that is carried by the base. The user platform may be positioned with respect to the ladder so that it is not located between a first plane that extends through the first side rail and is perpendicular to the lateral direction and a second plane that extends through the second side rail and is perpendicular to the lateral direction.

  10. PHEV Development Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    mild hybrid platform with 75kW rear drive system and 10kWhr li- i b ion battery. * Rear electric drive system is modular such that other comparable drive motors can be evaluated...

  11. Agent-based Simulation Platforms Agent-based Simulation Platforms

    E-Print Network [OSTI]

    Boone, Randall B.

    Agent-based Simulation Platforms Agent-based Simulation Platforms: Review and Development 1081 Fritz Ave. McKinleyville, CA 95519, USA Five software platforms for scientific agent-based models (ABMs) were reviewed by implementing example models in each. NetLogo is the highest-level platform

  12. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01T23:59:59.000Z

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  13. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  14. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy...

  15. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  16. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  17. U-104: Adobe Flash Player Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and...

  18. ISSO Information Alert Multiple Vulnerabilities in Adobe Flash

    E-Print Network [OSTI]

    Dyer, Bill

    SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY MS-ISAC ADVISORY NUMBER: 2012-014 DATE(S) ISSUED: 3 to take complete control of affected systems. Adobe Flash Player is a widely distributed multimedia or URL and distributes that file or URL to unsuspecting users via e-mail or some other means. When

  19. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  20. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  2. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe

  3. V-083: Oracle Java Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of

  4. V-097: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy

  5. V-105: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSEGoogle

  6. V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of

  7. V-111: Multiple vulnerabilities have been reported in Puppet | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartmentof

  8. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department

  9. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartment of Energy IBM

  10. V-121: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartment of

  11. V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartmentAttacksMozilla

  12. T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThis

  13. U-100: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code |Energy

  14. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupal

  15. U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department

  16. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | DepartmentIBM

  17. U-273: Multiple vulnerabilities have been reported in Wireshark |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5

  18. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPointsInjection198: IBM Lotus

  19. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy| Department

  20. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113: Debian

  1. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2: Drupal

  2. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment ofGain

  3. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartmentFixation Attacks

  4. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac

  5. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere

  6. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemote

  7. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security BulletinDepartment ofEnergy

  8. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security BulletinDepartment

  9. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergy SEARCH-LAB has

  10. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment ofSUSEMultiple

  11. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment of Energy

  12. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment of

  13. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment| Department of

  14. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...

    Broader source: Energy.gov (indexed) [DOE]

    Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

  15. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  16. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31T23:59:59.000Z

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  17. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  18. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  19. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  20. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding RemovalCSSDepartmentDepartmentBoston,ClimateClimate

  1. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  2. Manipulator mounted transfer platform

    DOE Patents [OSTI]

    Dobbins, James C. (Idaho Falls, ID); Hoover, Mark A. (Idaho Falls, ID); May, Kay W. (Idaho Falls, ID); Ross, Maurice J. (Pocatello, ID)

    1990-01-01T23:59:59.000Z

    A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

  3. Service platform strategy : social networking and mobile service platform perspectives

    E-Print Network [OSTI]

    Yoo, Jang Hoon, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    The significance of the service platform is increasing, while studies on this phenomenon remain scarce and insufficient. Most of the researches focus on products, market segmentation and how platform triggers innovation ...

  4. attitudes perceived vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: BIODIVERSITY RESEARCH Assessing species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner-...

  5. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  6. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  7. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  8. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  9. Mobility platform coupling device and method for coupling mobility platforms

    DOE Patents [OSTI]

    Shirey, David L. (Albuquerque, NM); Hayward, David R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A coupling device for connecting a first mobility platform to a second mobility platform in tandem. An example mobility platform is a robot. The coupling device has a loose link mode for normal steering conditions and a locking position, tight link mode for navigation across difficult terrain and across obstacles, for traversing chasms, and for navigating with a reduced footprint in tight steering conditions.

  10. PLATFORMS FOR THE DESIGN OF PLATFORMS: COLLABORATING IN THE UNKNOWN

    E-Print Network [OSTI]

    Boyer, Edmond

    - such as `smart grids', home networking or new bio-materials - are currently looking for platforms to help them Gawer for fruitful discussions on Platform design and to the participants of the Platforms, Markets, the architecture of industry is tending to loosen or even disappear: `smart grids' in electricity supply, bio

  11. Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell-cell

    E-Print Network [OSTI]

    Kenis, Paul J. A.

    Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell are available today. Here, we report the design and validation of a microfluidic platform that enables (i) soluble molecule-cell and/or (ii) cell-cell paracrine signaling. In the microfluidic platform, multiple

  12. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co [Institute of Environmental Studies, National University of Colombia, Bogota (Colombia); Duarte, Oscar, E-mail: ogduartev@unal.edu.co [Department of Electrical and Electronics Engineering, National University of Colombia, Bogota (Colombia); Requena, Ignacio, E-mail: requena@decsai.ugr.es [Department of Computer Science and Artificial Intelligence, University of Granada (Spain); Zamorano, Montserrat, E-mail: zamorano@ugr.es [Department of Civil Engineering, University of Granada (Spain)

    2012-01-15T23:59:59.000Z

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  13. SPHERICALLY-ACTUATED PLATFORM MANIPULATOR

    E-Print Network [OSTI]

    Williams II, Robert L.

    1 SPHERICALLY-ACTUATED PLATFORM MANIPULATOR Robert L. Williams II Dana B. Poling Ohio University://www.ent.ohiou.edu/~bobw #12;2 SPHERICALLY-ACTUATED PLATFORM MANIPULATOR Robert L. Williams II and Dana B. Poling Ohio University Athens, OH 45701 KEYWORDS: Spherical Actuation, Platform Manipulator, Parallel Robot ABSTRACT

  14. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  15. Structural Vulnerability Assessment of Electric Power Grids

    E-Print Network [OSTI]

    Koç, Yakup; Kooij, Robert E; Brazier, Frances M T

    2013-01-01T23:59:59.000Z

    Cascading failures are the typical reasons of black- outs in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Complex Networks are widely used to investigate the grid vulnerability. Yet, these purely topological metrics fail to capture the real behaviour of power grids. This paper proposes a metric, the effective graph resistance, as a vulnerability measure to de- termine the critical components in a power grid. Differently than the existing purely topological measures, the effective graph resistance accounts for the electrical properties of power grids such as power flow allocation according to Kirchoff laws. To demonstrate the applicability of the effective graph resistance, a quantitative vulnerability assessment of the IEEE 118 buses power system is performed. The simulation results verify the effectiveness of the effect...

  16. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  17. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  18. Common tester platform concept.

    SciTech Connect (OSTI)

    Hurst, Michael James

    2008-05-01T23:59:59.000Z

    This report summarizes the results of a case study on the doctrine of a common tester platform, a concept of a standardized platform that can be applicable across the broad spectrum of testing requirements throughout the various stages of a weapons program, as well as across the various weapons programs. The common tester concept strives to define an affordable, next-generation design that will meet testing requirements with the flexibility to grow and expand; supporting the initial development stages of a weapons program through to the final production and surveillance stages. This report discusses a concept investing key leveraging technologies and operational concepts combined with prototype tester-development experiences and practical lessons learned gleaned from past weapons programs.

  19. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  20. Towards a Trust and Reputation Framework for Social Web Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards a Trust and Reputation Framework for Social Web Platforms Thao Nguyen12 , Luigi Liquori1 has always been spread by word-of-mouth and has been used as an enabler of numerous economic have a wide range of applications and are domain specific. The multiple areas where they are applied

  1. FUTURE POWER GRID INITIATIVE An Intelligent Agent Platform

    E-Print Network [OSTI]

    Sequencing For Managing Demand/Response IMPACT VOLTTRON fills the need for an independent language agnostic. This will allow customers, building owners, utilities, etc. to realize better energy efficiency and reliability the integrating platform for a DOE funded project combining multiple labs and vendors for building energy

  2. Platform Markets and Energy Services

    E-Print Network [OSTI]

    Weiller, Claire M.; Pollitt, Michael G.

    2014-01-07T23:59:59.000Z

    use their platform, and vice versa. Same-side externalities, which have also been referred to as “intraplatform competition” (Armstrong 2006) occur when users on one side of the platform are affected by other users from the same side, often... negative prices, i.e. is compensated for using the platform (e.g. nightclubs or dating websites). For example, nightclubs or online dating websites may subsidise women by offering free entry or drinks to attract more male customers. The existence of two...

  3. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  4. Platform-independent modelling in MDA: supporting abstract platforms

    E-Print Network [OSTI]

    Pires, Luís Ferreira

    Platform-independent modelling in MDA: supporting abstract platforms João Paulo Almeida, Remco { almeida, dijkman, sinderen, pires } @ cs.utwente.nl Abstract. An MDA-based design approach should be able as the various design goals. In this paper, we discuss how our design approach can be supported using the MDA

  5. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect (OSTI)

    SETH, S.S.

    2000-05-17T23:59:59.000Z

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  6. Turbine blade platform seal

    DOE Patents [OSTI]

    Zagar, Thomas W. (Winter Springs, FL); Schiavo, Anthony L. (Oviedo, FL)

    2001-01-01T23:59:59.000Z

    A rotating blade group 90 for a turbo-machine having an improved device for sealing the gap 110 between the edges 112,114 of adjacent blade platforms 96,104. The gap 110 between adjacent blades 92,100 is sealed by a seal pin 20 its central portion 110 and by a seal plate 58,60 at each of the front 54 and rear 56 portions. The seal plates 58,60 are inserted into corresponding grooves 62,64 formed in the adjacent edges 112,114 of adjoining blades 92,100 and held in place by end plates 40,42. The end of the seal plates 58,60 may be chamfered 78,80 to improve the seal against the end plate 40,42. The seal pin 20 provides the required damping between the blades 92,100 and the seal plates 58,60 provide improved sealing effectiveness.

  7. Energy Tracking Software Platform

    SciTech Connect (OSTI)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04T23:59:59.000Z

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  8. Platform Computing Inc. 3760 14th Avenue

    E-Print Network [OSTI]

    Buyya, Rajkumar

    Platform Computing Inc. 3760 14th Avenue Markham, Ontario L3R 3T7 Canada Tel: (905) 948-8448 Fax: (905) 948-9975 email: info@platform.com www.platform.com Platform Computing Launches Networking Site and researchers was launched today. The site, sponsored by HPC management software leader Platform Computing

  9. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  10. Bluetooth Vulnerabilities ECE 478 Winter 05

    E-Print Network [OSTI]

    Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee #12;Topics · What is Bluetooth? · History ­ Automobiles #12;What is Bluetooth? · Short-range (10m-100m) wireless specification · Operating at 2.4GHz radio 2Mb/s #12;History · Named from Danish King Harold Bluetooth from the 10th century ­ instrumental

  11. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  12. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  13. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  14. PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Hultman, Nathan E.

    PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE A Quantitative Approach R. H. Moss A. L. Brenkert E@ntis.fedworld.gov Online ordering: http://www.ntis.gov/ordering.htm #12;iii EXECUTIVE SUMMARY The PNNL Vulnerability

  15. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect (OSTI)

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  16. DECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL

    E-Print Network [OSTI]

    Wang, Hai

    , telecommunications, water supply, wastewater, electric power and other energy infrastructure. Event databasesDECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL INFRASTRUCTURE Zimmerman, R interdependencies, extreme events, vulnerability assessment 1 Introduction The provision of infrastructure services

  17. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  18. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    supply systems are vulnerable to many forms of terrorist acts, most of the vulnerability analysis studies on these systems have been for chemical and biological threats. Because of the interdependency of water supply infrastructure and emergency fire...

  19. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  20. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  1. Booly: a new data integration platform

    E-Print Network [OSTI]

    Do, Long H; Esteves, Francisco F; Karten, Harvey J; Bier, Ethan

    2010-01-01T23:59:59.000Z

    of the nation in data integration for bioinformatics. JBooly: a new data integration platform. BMC BioinformaticsAccess Booly: a new data integration platform Long H Do 1* ,

  2. A versatile scanning acoustic platform

    E-Print Network [OSTI]

    N G Parker; P V Nelson; M J W Povey

    2010-02-01T23:59:59.000Z

    We present a versatile and highly configurable scanning acoustic platform. This platform, comprising of a high frequency transducer, bespoke positioning system and temperature-regulated sample unit, enables the acoustic probing of materials over a wide range of length scales and with minimal thermal aberration. In its bare form the platform acts as a reflection-mode acoustic microscope, while optical capabilities are readily incorporated to extend its abilities to the acousto-optic domain. Here we illustrate the capabilities of the platform through its incarnation as an acoustic microscope. Operating at 55 MHz we demonstrate acoustic imaging with a lateral resolution of 25 microns. We outline its construction, calibration and capabilities as an acoustic microscope, and discuss its wider applications.

  3. Platform Chemicals from an Oilseed Biorefinery

    SciTech Connect (OSTI)

    Tupy, Mike; Schrodi Yann

    2006-11-06T23:59:59.000Z

    The US chemical industry is $460 billion in size where a $150 billion segment of which is non-oxygenated chemicals that is sourced today via petroleum but is addressable by a renewable feedstock if one considers a more chemically reduced feedstock such as vegetable oils. Vegetable oil, due to its chemical functionality, provides a largely untapped opportunity as a renewable chemical source to replace petroleum-derived chemicals and produce platform chemicals unavailable today. This project examined the fertile intersection between the rich building blocks provided by vegetable oils and the enhanced chemical modification capability provided by metathesis chemistry. The technology advanced in this study is the process of ethylene cross-metathesis (referred to as ethenolysis) with vegetable oil and vegetable oil derivatives to manufacture the platform-chemical 9-decenoic acid (or 9DA) and olefin co-products. The project team meet its goals of demonstrating improved catalyst efficiencies of several multiples, deepening the mechanistic understanding of metathesis, synthesis and screening of dozens of new catalysts, designing and modeling commercial processes, and estimating production costs. One demonstrable result of the study was a step change improvement in catalyst turnover number in the ethenolysis of methyl oleate as reported here. We met our key measurable of producing 100 lbs of 9DA at the pilot-scale, which demonstrated ability to scale-up ethenolysis. DOE Project funding had significant positive impact on development of metathetically modified vegetable oils more broadly as the Cargill/Materia partnership, that was able to initiate primarily due to DOE funding, has succeeded in commercializing products, validating metathesis as a platform technology, and expanding a diverse products portfolio in high value and in large volume markets. Opportunities have expanded and business development has gained considerable momentum and enabled further expansion of the Materia/Cargill relationship. This project exceeded expectations and is having immediate impact on DOE success by replacing petroleum products with renewables in a large volume application today.

  4. National Bioenergy Center Biochemical Platform Integration Project

    SciTech Connect (OSTI)

    Not Available

    2008-07-01T23:59:59.000Z

    April through June 2008 update on activities of the National Bioenergy Center's Biochemical Platform Integration Project.

  5. Communication platform for open heterogeneous MASs

    E-Print Network [OSTI]

    Zachmann, Gabriel

    (Technical Computer Science) Prof. Dr. Gabriel Zachmann (Computer Graphics) #12;Communication platform

  6. WORK PLATFORMS and SCAFFOLDING Table Of Contents

    E-Print Network [OSTI]

    US Army Corps of Engineers

    EM 385-1-1 XX Sep 13 i Section 22 WORK PLATFORMS and SCAFFOLDING Table Of Contents Section: Page 22 (Personnel) Platforms...................22-33 22.L Elevating Work Platforms..............................................22-33 22.M Vehicle-Mounted Elevating And Rotating Work Platforms (Aerial Devices

  7. A Verification Platform System on Chip

    E-Print Network [OSTI]

    Melham, Tom

    A Verification Platform for System on Chip Kong Woei Susanto A Dissertation submitted a platform based design method, called a system integration platform. In this design methodology, a system specifications. Subsequently, a similar platform can be constructed for formal verification. Every component

  8. Leveraging Platform Basic Services in Cloud Application Platforms for the Development of Cloud

    E-Print Network [OSTI]

    Simons, Anthony J. H.

    Leveraging Platform Basic Services in Cloud Application Platforms for the Development of Cloud.Simons@dcs.shef.ac.uk Abstract-- Cloud application platforms gain popularity and have the potential to alter the way service based cloud applications are developed involving utilisation of platform basic services. A platform

  9. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wolfsberg, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Macknick, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Middleton, Richard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01T23:59:59.000Z

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  10. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  11. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power...

  12. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  13. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Assessing Vulnerability of Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing...

  14. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  15. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  16. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  17. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    DMZs, the corporate network, and the outside. In an on-site assessment, while scanning for vulnerabilities on the CS network, the assessment team discovered IP addresses...

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Belgium) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Belgium Coordinates...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Czech Republic) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Czech Republic...

  3. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  4. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.

  5. Ecological Issues Related to Decommissioning of California's Offshore Production Platforms

    E-Print Network [OSTI]

    Carr, Mark H.

    Ecological Issues Related to Decommissioning of California's Offshore Production Platforms Report................................................................................................................ 8 II.A. Review of California platforms............................................................................. 8 II.A.i Geography of California platforms

  6. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  7. Importance-Scanning Worm Using Vulnerable-Host Distribution

    E-Print Network [OSTI]

    Ji, Chuanyi

    Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen School of Electrical scanning. The distribution of vulnerable hosts on the Internet, however, is highly non- uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent

  8. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  9. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  10. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  11. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011 The following) section on Chemical-Terrorism Vulnerability Information (CVI) 6 CFR 27.400. The Program Manager's comments.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating

  12. Static Performance of Power Augmented Ram Platform

    E-Print Network [OSTI]

    Collins, Gary S.

    Static Performance of Power Augmented Ram Platform Eliana Rodriguez (Advisor: Dr. Matveev) REU Site experiment that was conducted similar to the first experiment, but instead of a straight platform, a slanted platform positioned at five degrees to a horizontal plane was used. · As before, an air nozzle

  13. Toolbox Safety Talk Aerial Work Platforms

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Toolbox Safety Talk Aerial Work Platforms Environmental Health & Safety Facilities Safety & Health to Environmental Health & Safety for recordkeeping. Aerial work platforms are important tools and if used correctly, and equipment damage. This guide addresses safe use of aerial work platforms and provides tips to prevent

  14. Toolbox Safety Talk Articulating Boom Work Platforms

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Toolbox Safety Talk Articulating Boom Work Platforms Environmental Health & Safety Facilities sign-in sheet to Environmental Health & Safety for recordkeeping. Articulating boom work platforms platforms and provides tips to prevent injuries, death, and equipment damage. More information can be found

  15. Flexible Product Platforms Eun Suk Suh

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Flexible Product Platforms by Eun Suk Suh Submitted to the Engineering Systems Division in partial by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Richard de Neufville Professor of Engineering Systems #12;2 #12;Flexible Product Platforms by Eun Suk Suh of engineering systems by proposing and demonstrating a way to implement flexible platform strategy to re- spond

  16. Middleware Based Executive for Embedded Reconfigurable Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Middleware Based Executive for Embedded Reconfigurable Platforms A. Khiar and N.Knecht and L embedded Multiprocessor Systems-on-Chip (MPSoC) platform containing reconfigurable hardware computing units of the french ANR FOSFOR (Flexible Operating System FOr Reconfigurable platforms) [1] project, the objective

  17. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  18. www.canterbury.ac.nz/platform From the Vice-Chancellor Welcome to Platform

    E-Print Network [OSTI]

    Hickman, Mark

    www.canterbury.ac.nz/platform #12;From the Vice-Chancellor Welcome to Platform As a University-wide festival, Platform 2010 offers a unique and enriched experience of the arts. It is a chance for audiences for the third biennale University of Canterbury Arts Festival, Platform. The festival is 11 days of fine art

  19. Platform-of-Platforms: A Modular, Integrated Resource Framework for Large-Scale Services

    E-Print Network [OSTI]

    Weissman, Jon

    Platform-of-Platforms: A Modular, Integrated Resource Framework for Large-Scale Services Rahul there has been a great deal of research ac- tivity in the development of diverse network service platforms-tier resource platform may be a natural fit for such multi-tier network services. Figure 1: Hierarchical

  20. Resource Overbooking and Application Profiling in Shared Hosting Platforms *

    E-Print Network [OSTI]

    Urgaonkar, Bhuvan

    Resource Overbooking and Application Profiling in Shared Hosting Platforms * Bhuvan Urgaonkar for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third of overbooking resources in shared platforms, to maximize the platform yield: the revenue generated

  1. Ecological PErformancE of ocS PlatformS

    E-Print Network [OSTI]

    Love, Milton

    Ecological PErformancE of ocS PlatformS aS fiSh habitat off california OCS Study MMS 2004 Region #12;#12;Ecological PErformancE of ocS PlatformS aS fiSh habitat off california Authored by: Milton performance of OCS platforms as fish habitat off California. MMS OCS Study 2004-005. Marine Science Institute

  2. Turbine engine airfoil and platform assembly

    DOE Patents [OSTI]

    Campbell, Christian X. (Oviedo, FL); James, Allister W. (Chuluota, FL); Morrison, Jay A. (Oviedo, FL)

    2012-07-31T23:59:59.000Z

    A turbine airfoil (22A) is formed by a first process using a first material. A platform (30A) is formed by a second process using a second material that may be different from the first material. The platform (30A) is assembled around a shank (23A) of the airfoil. One or more pins (36A) extend from the platform into holes (28) in the shank (23A). The platform may be formed in two portions (32A, 34A) and placed around the shank, enclosing it. The two platform portions may be bonded to each other. Alternately, the platform (30B) may be cast around the shank (23B) using a metal alloy with better castability than that of the blade and shank, which may be specialized for thermal tolerance. The pins (36A-36D) or holes for them do not extend to an outer surface (31) of the platform, avoiding stress concentrations.

  3. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  4. Multibrowsing: Moving Web Content across Multiple Displays

    E-Print Network [OSTI]

    Stanford University

    is a framework for exploiting multiple heterogeneous displays, whether fixed or on mobile computing devices displays in a ubiquitous computing environment. The dis- plays may be "public" (e.g. wall-sized fixed for multi- display environments. Since it uses Web standards, it accommodates any device or platform already

  5. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  6. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10T23:59:59.000Z

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  7. Managing a Software Ecosystem Using a Multiple Software Product Line

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Managing a Software Ecosystem Using a Multiple Software Product Line: a Case Study on Digital increases the number of software ecosystems: software platforms developed and maintained in a decentralized YourCast from a single system to a medium- scale ecosystem, we show how organizing it as a multiple

  8. P-Trade the Generic P2P Trading Platform Foundations

    E-Print Network [OSTI]

    Narasayya, Vivek

    P-Trade ­ the Generic P2P Trading Platform Foundations · Auctions are negotiation mechanisms configuration depends on multiple factors like traded good, participants, information available on the value of the traded good, etc. The system architecture of P-Trade · A central auction name server (ANS) containing

  9. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  10. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  11. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  12. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  13. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  14. Researchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    , electrical power supply chains and telecommunications networks. University of Massachusetts Amherst components like roads, electrical power stations or transmission lines are destroyed and captures how usersResearchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability Natural disasters

  15. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power, smart grid, critical infrastructure, emergency and disaster pre- paredness, mergers for the determination of network vulnerability and robustness, since critical infrastructure networks from transportation, telecommunications, supply chains, to financial and electric power ones, provide the ties

  16. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  17. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  18. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01T23:59:59.000Z

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  19. Bucket platform cooling scheme and related method

    DOE Patents [OSTI]

    Abuaf, Nesim (Lincoln City, OR); Barb, Kevin Joseph (Halfmoon, NY); Chopra, Sanjay (Greenville, SC); Kercher, David Max (Ipswich, MA); Kellock, Iain Robertson (Simpsonville, SC); Lenahan, Dean Thomas (Cincinnati, OH); Nellian, Sankar (Mauldin, SC); Starkweather, John Howard (Sharonville, OH); Lupe, Douglas Arthur (Ballston Lake, NY)

    2002-01-01T23:59:59.000Z

    A turbine bucket includes an airfoil extending from a platform, having high and low pressure sides; a wheel mounting portion; a hollow shank portion located radially between the platform and the wheel mounting portion, the platform having an under surface. An impingement cooling plate is located in the hollow shank portion, spaced from the under surface, and the impingement plate is formed with a plurality of impingement cooling holes therein.

  20. U-117: Potential security vulnerability has been identified with...

    Broader source: Energy.gov (indexed) [DOE]

    printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a...

  1. Sandia National Laboratories: hydrodynamic modeling platform...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    modeling platform SNL-EFDC Upgrades to SNL-EFDC: A Tool to Balance Marine Hydrokinetic Energy Generation Efficiency with Environmental Response On June 26, 2014, in Computational...

  2. A Dynamic Platform for Runtime Adaptation

    E-Print Network [OSTI]

    Pham, Hubert

    We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

  3. Economic Analysis of Policy Effects Analysis Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Economic Analysis of Policy Effects Analysis Platform March 24, 2015 Jason Hansen, PhD Idaho National Laboratory This presentation does not contain any proprietary, confidential,...

  4. Operationalization of Learning Scenarios on Open and Distance Learning platforms: the case of the Moodle Platform

    E-Print Network [OSTI]

    Laforcade, Pierre

    Operationalization of Learning Scenarios on Open and Distance Learning platforms: the case of the Moodle Platform Aymen Abedmouleh, Lahcen Oubahssi, Pierre Laforcade and Christophe Choquet Université du of scenarios on learning platforms. We propose an approach based on the explicitation and the formalization

  5. Platform Based Designs for Future MPSoC Architectures This paper describes our communication centric platform

    E-Print Network [OSTI]

    Arslan, Tughrul

    Platform Based Designs for Future MPSoC Architectures ABSTRACT This paper describes our communication centric platform based designs for future multi-processor system-on-chip (MPSoC) architectures. The proposed platforms have built in controller, thus making the heterogeneous IPs (reconfigurable, fixed

  6. Reconciling Components and Services The Apam Component-Service Platform

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Reconciling Components and Services The Apam Component-Service Platform Jacky Estublier, German as with SOC. No platform today satisfies both needs. This paper presents the Component-Service model-service platform. Keywords-Service; CBSE, SOC, SOA, service platform, component platform, adaptability . I

  7. The OSIMIS Platform: Making OSI Management Simple

    E-Print Network [OSTI]

    Bhatti, Saleem N.

    and SNMP [Pav93a] while a similar approach for integrating OSI management and the OMG CORBA frame- work1 The OSIMIS Platform: Making OSI Management Simple George Pavlou, Kevin McCarthy, Saleem Bhatti.ucl.ac.uk Abstract The OSIMIS (OSI Management Information Service) platform provides the foundation for the quick

  8. Inorganic Nanotubes: A Novel Platform for Nanofluidics

    E-Print Network [OSTI]

    Yang, Peidong

    Inorganic Nanotubes: A Novel Platform for Nanofluidics JOSHUA GOLDBERGER, RONG FAN, AND PEIDONG are being developed for the synthesis of inorganic nanotubes, a novel platform for nanofluidics. Single modulation of ionic conductance. These nanofluidic devices have been further dem- onstrated to be useful

  9. Multiple piece turbine rotor blade

    DOE Patents [OSTI]

    Jones, Russell B; Fedock, John A

    2013-05-21T23:59:59.000Z

    A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

  10. An Evaluation of Sensing Platforms Used for Sensor Network Research

    E-Print Network [OSTI]

    Kansas, University of

    An Evaluation of Sensing Platforms Used for Sensor Network Research Daniel T. Fokum, Dr. Victor S to complex sensor nodes; which include fully configured computers. Several of these platforms were evaluated ................................................................................................................. 2 3 Evaluation of Sensor Platforms

  11. Roland Kruse, Tiedo Meyer: Vibration platform for the calibration of

    E-Print Network [OSTI]

    Vormann, Matthias

    Roland Kruse, Tiedo Meyer: Vibration platform for the calibration of optical sensors #12;Roland Kruse, Tiedo Meyer (Oldenburg University): Vibration platform for the calibration of optical sensors Meyer (Oldenburg University): Vibration platform for the calibration of optical sensors The project

  12. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  13. Auction Market System in Electronic Security Trading Platform

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Auction Market System in Electronic Security Trading Platform Li Xihao Bielefeld Graduate School security trading platform Xetra oper- ated by Frankfurt Stock Exchange, we consider the Xetra auction. Keywords: agent-based modelling, computational market experiment, electronic security trading platform

  14. Towards Controlling the Acceptance Factors for a Collaborative Platform in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Controlling the Acceptance Factors for a Collaborative Platform in Engineering Design factor which are supposed to influence future users of a collaborative KM platform (Dimocode). At the end management systems (KMS) deployment. Keywords: acceptance factors, collaborative, platforms, engineering

  15. APPENDIX 1. Platform Synopses In this section,we give a brief summary of each of the California platforms.The platforms are listed from the most

    E-Print Network [OSTI]

    Love, Milton

    A-1 APPENDICES APPENDIX 1. Platform Synopses In this section,we give a brief summary of each of the California platforms.The platforms are listed from the most northwest, Irene, off Point Arguello, to Emmy in the southeast off Long Beach. Wherever possible, we have included the following information on each platform: (1

  16. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  17. Polymer-based platform for microfluidic systems

    DOE Patents [OSTI]

    Benett, William (Livermore, CA); Krulevitch, Peter (Pleasanton, CA); Maghribi, Mariam (Livermore, CA); Hamilton, Julie (Tracy, CA); Rose, Klint (Boston, MA); Wang, Amy W. (Oakland, CA)

    2009-10-13T23:59:59.000Z

    A method of forming a polymer-based microfluidic system platform using network building blocks selected from a set of interconnectable network building blocks, such as wire, pins, blocks, and interconnects. The selected building blocks are interconnectably assembled and fixedly positioned in precise positions in a mold cavity of a mold frame to construct a three-dimensional model construction of a microfluidic flow path network preferably having meso-scale dimensions. A hardenable liquid, such as poly (dimethylsiloxane) is then introduced into the mold cavity and hardened to form a platform structure as well as to mold the microfluidic flow path network having channels, reservoirs and ports. Pre-fabricated elbows, T's and other joints are used to interconnect various building block elements together. After hardening the liquid the building blocks are removed from the platform structure to make available the channels, cavities and ports within the platform structure. Microdevices may be embedded within the cast polymer-based platform, or bonded to the platform structure subsequent to molding, to create an integrated microfluidic system. In this manner, the new microfluidic platform is versatile and capable of quickly generating prototype systems, and could easily be adapted to a manufacturing setting.

  18. ESF Mine Power Center Platforms

    SciTech Connect (OSTI)

    T.A. Misiak

    2000-02-10T23:59:59.000Z

    The purpose and objective of this analysis is to structurally evaluate the existing Exploratory Studies Facility (ESF) mine power center (MPC) support frames and to design service platforms that will attach to the MPC support frames. This analysis follows the Development Plan titled ''Produce Additional Design for Title 111 Evaluation Report'' (CRWMS M&O 1999a). This analysis satisfies design recommended in the ''Title III Evaluation Report for the Surface and Subsurface Power System'' (CRWMS M&O 1999b, Section 7.6) and concurred with in the ''System Safety Evaluation of Title 111 Evaluation Reports Recommended Work'' (Gwyn 1999, Section 10.1.1). This analysis does not constitute a level-3 deliverable, a level-4 milestone, or a supporting work product. This document is not being prepared in support of the Monitored Geologic Repository (MGR) Site Recommendation (SR), Environmental Impact Statement (EIS), or License Application (LA) and should not be cited as a reference in the MGR SR, EIS, or LA.

  19. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergyDepartment

  20. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability

  1. Platform Architecture A Two-Level Optimization Approach

    E-Print Network [OSTI]

    de Weck, Olivier

    2002-10-03T23:59:59.000Z

    Introduction to Platform Architecture in Products VW Golf 2 -Automotive Platforming Example:A Two-Level Optimization Approach 3 -Discussion

  2. An Extensible Sensing and Control Platform for Building Energy...

    Office of Environmental Management (EM)

    An Extensible Sensing and Control Platform for Building Energy Management An Extensible Sensing and Control Platform for Building Energy Management Lead Performer: Carnegie Mellon...

  3. An Analysis Platform for Multiscale Hydrogeologic Modeling with...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    An Analysis Platform for Multiscale Hydrogeologic Modeling with Emphasis on Hybrid Multiscale Methods. An Analysis Platform for Multiscale Hydrogeologic Modeling with Emphasis on...

  4. Multilayer Platform for Ultra-Low-Loss Waveguide Applications

    E-Print Network [OSTI]

    2012-01-01T23:59:59.000Z

    1, 2012 Multilayer Platform for Ultra-Low-Loss Waveguidepreviously demonstrated ultra-low-loss technologies. Groupet al. : MULTILAYER PLATFORM FOR ULTRA-LOW-LOSS WAVEGUIDE

  5. Apoferritin-based nanomedicine platform for drug delivery: equilibrium...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nanomedicine platform for drug delivery: equilibrium binding study of daunomycin with DNA. Apoferritin-based nanomedicine platform for drug delivery: equilibrium binding study...

  6. Making a Hybrid Microfluidic Platform Compatible for In Situ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Hybrid Microfluidic Platform Compatible for In Situ Imaging by Vacuum-Based Techniques. Making a Hybrid Microfluidic Platform Compatible for In Situ Imaging by Vacuum-Based...

  7. Web Machines : a new platform for application construction and execution

    E-Print Network [OSTI]

    Bryant, Robert A., M. Eng. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    In today's world, computer application platforms are becoming increasingly important in providing positive application end-user and developer experiences. While there are many successful application platforms available, ...

  8. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    SciTech Connect (OSTI)

    Kvaerner, Jens [Bioforsk-Norwegian Institute for Agricultural and Environmental Research, Soil and Environmental Division, Frederik A. Dahls vei 20, N-1432 As (Norway)]. E-mail: jens.kvarner@bioforsk.no; Swensen, Grete [NIKU, Norwegian Institute for Cultural Heritage Research, Storgata 2, P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: grete.swensen@niku.no; Erikstad, Lars [NINA, Norwegian Institute for Nature Research, Dronningens gt. 13., P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: lars.erikstad@nina.no

    2006-07-15T23:59:59.000Z

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended.

  9. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  10. Multiple Critical Vulnerabilities in Blackboard due to persistent Cross Site Scripting and Authorization bugs

    E-Print Network [OSTI]

    Sekar, R.

    and Authorization bugs Tung Tran ­ tunghack@gmail.com Alireza Saberi - saberi.alireza@gmail.com The current version

  11. U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O 484.1Department

  12. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of Energy

  13. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPointsInjection1 -Energy

  14. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1: Red Hat

  15. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov

  16. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY 20113: Debian42: Mac

  17. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe

  18. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:Energy 86: IBM

  19. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartmentFixation

  20. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for PHEVs |

  1. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|Attacks |1: Apple

  2. Cell Culture on MEMS Platforms: A Review

    E-Print Network [OSTI]

    Ni, Ming

    Microfabricated systems provide an excellent platform for the culture of cells, and are an extremely useful tool for the investigation of cellular responses to various stimuli. Advantages offered over traditional methods ...

  3. Digital Construction Platform: A Compound Arm Approach

    E-Print Network [OSTI]

    Spielberg, Nathan A.

    2014-01-01T23:59:59.000Z

    We introduce a novel large-scale Digital Construction Platform (DCP) for on-site sensing, analysis, and fabrication. The DCP is an in-progress research project consisting of a compound robotic arm system comprised of a ...

  4. High index contrast platform for silicon photonics

    E-Print Network [OSTI]

    Akiyama, Shoji, 1972-

    2004-01-01T23:59:59.000Z

    This thesis focuses on silicon-based high index contrast (HIC) photonics. In addition to mature fiber optics or low index contrast (LIC) platform, which is often referred to as Planar Lightwave Cirrcuit (PLC) or Silica ...

  5. Open vs. closed Apple music distribution platform

    E-Print Network [OSTI]

    Aye, Thida, S.M. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    In this thesis, based on the example case study of the Apple iTunes-iPods platform technology, two simple models are analyzed to gain a better understanding of open vs. closed business models as management and market ...

  6. COMPONENTS, PLATFORMS, AND ARCHITECTURES Subthreshold Computing

    E-Print Network [OSTI]

    Texas at Arlington, University of

    as reducing resource consumption have become emerging trends in computing. As computers increase in speed Modeling the Energy Consumption of Distributed Applications A Comparative Study of Runtime Systems for COMPONENTS, PLATFORMS, AND ARCHITECTURES Subthreshold Computing Energy-Efficient Network

  7. Cloud Based Applications and Platforms (Presentation)

    SciTech Connect (OSTI)

    Brodt-Giles, D.

    2014-05-15T23:59:59.000Z

    Presentation to the Cloud Computing East 2014 Conference, where we are highlighting our cloud computing strategy, describing the platforms on the cloud (including Smartgrid.gov), and defining our process for implementing cloud based applications.

  8. Static Stability of Tension Leg Platforms

    E-Print Network [OSTI]

    Xu, Ning

    2010-07-14T23:59:59.000Z

    The static stability of a Tension Leg Platform (TLP) with an intact tendon system is principally provided by its tendons and hence quite different from those of a conventional ship or even a floating structure positioned by its mooring system...

  9. Visualization of vibration experienced in offshore platforms

    E-Print Network [OSTI]

    Patrikalakis, Alexander Marinos Charles

    2010-01-01T23:59:59.000Z

    In this thesis, I design and evaluate methods to optimize the visualization of vortex-induced vibration (VIV) in marine risers. VIV is vibration experienced by marine risers in offshore drilling platforms due to ocean ...

  10. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  11. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  12. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  13. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  14. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  15. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  16. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01T23:59:59.000Z

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  17. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  18. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  19. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect (OSTI)

    Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

    1995-03-01T23:59:59.000Z

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  20. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  1. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  2. A case study of social vulnerability mapping: issues of scale and aggregation

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15T23:59:59.000Z

    This study uses geographic information systems to determine if the aggregation of census block data are better than census block group data for analyzing social vulnerability. This was done by applying a social vulnerability method that used census...

  3. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

    E-Print Network [OSTI]

    Narasayya, Vivek

    programs by exploiting browser vulnerabilities are a serious emerging threat. In response, we have-management methodology to cybersecurity: instead of directly detecting the acts of vulnerability exploits, the system

  4. Horizontally scaling dChache SRM with the Terracotta platform

    SciTech Connect (OSTI)

    Perelmutov, T.; Crawford, M.; Moibenko, A.; Oleynik, G.; /Fermilab

    2011-01-01T23:59:59.000Z

    The dCache disk caching file system has been chosen by a majority of LHC experiments Tier 1 centers for their data storage needs. It is also deployed at many Tier 2 centers. The Storage Resource Manager (SRM) is a standardized grid storage interface and a single point of remote entry into dCache, and hence is a critical component. SRM must scale to increasing transaction rates and remain resilient against changing usage patterns. The initial implementation of the SRM service in dCache suffered from an inability to support clustered deployment, and its performance was limited by the hardware of a single node. Using the Terracotta platform, we added the ability to horizontally scale the dCache SRM service to run on multiple nodes in a cluster configuration, coupled with network load balancing. This gives site administrators the ability to increase the performance and reliability of SRM service to face the ever-increasing requirements of LHC data handling. In this paper we will describe the previous limitations of the architecture SRM server and how the Terracotta platform allowed us to readily convert single node service into a highly scalable clustered application.

  5. Atlas: A Novel Kinematic Architecture for Six DOF Motion Platforms

    E-Print Network [OSTI]

    Hayes, John

    Atlas: A Novel Kinematic Architecture for Six DOF Motion Platforms M.J.D. HAYES, R.G. LANGLOIS alternative motion platform configurations and developed a novel concept that overcomes existing limitations. This paper presents an overview of the Atlas platform: a novel six DOF motion platform architecture

  6. A Multisensor Platform for Kinematic Track Surveying Thomas Wildi

    E-Print Network [OSTI]

    A Multisensor Platform for Kinematic Track Surveying Thomas Wildi HTA Burgdorf, Pestalozzistrasse Burgdorf developed a track surveying platform in co-operation with terra vermessungen AG, Switzerland of railway lines, tunnel profile measurements) the platform can be flexibly adapted. The platform is designed

  7. Resource Overbooking and Application Profiling in Shared Hosting Platforms

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Resource Overbooking and Application Profiling in Shared Hosting Platforms #3; Bhuvan Urgaonkar resources in shared hosting platforms running potentially antagonistic third­party applications. The primary platforms, to maximize the platform yield: the revenue generated by the available resources. We do

  8. Trusted Integrity Measurement and Reporting for Virtualized Platforms

    E-Print Network [OSTI]

    Ryan, Mark

    Trusted Integrity Measurement and Reporting for Virtualized Platforms (Work-in-Progress) Serdar of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of com- plexity and dynamic changes of platform components. In this paper, we

  9. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  10. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  11. Aneka: A Software Platform for .NET-based Cloud Computing

    E-Print Network [OSTI]

    Vecchiola, Christian; Buyya, Rajkumar

    2009-01-01T23:59:59.000Z

    Aneka is a platform for deploying Clouds developing applications on top of it. It provides a runtime environment and a set of APIs that allow developers to build .NET applications that leverage their computation on either public or private clouds. One of the key features of Aneka is the ability of supporting multiple programming models that are ways of expressing the execution logic of applications by using specific abstractions. This is accomplished by creating a customizable and extensible service oriented runtime environment represented by a collection of software containers connected together. By leveraging on these architecture advanced services including resource reservation, persistence, storage management, security, and performance monitoring have been implemented. On top of this infrastructure different programming models can be plugged to provide support for different scenarios as demonstrated by the engineering, life science, and industry applications.

  12. Experience using EPICS on PC platforms

    SciTech Connect (OSTI)

    Hill, J.O. [Los Alamos National Lab., NM (United States); Kasemire, K.U. [Univ. Osnabruck (Germany). Fachbereich Physik

    1998-03-01T23:59:59.000Z

    The Experimental Physics and Industrial Control System (EPICS) has been widely adopted in the accelerator community. Although EPICS is available on many platforms, the majority of implementations have used UNIX workstations as clients, and VME- or VXI-based processors for distributed input output controllers. Recently, a significant portion of EPICS has been ported to personal computer (PC) hardware platforms running Microsoft`s operating systems, and also Wind River System`s real time vxWorks operating system. This development should significantly reduce the cost of deploying EPICS systems, and the prospect of using EPICS together with the many high quality commercial components available for PC platforms is also encouraging. A hybrid system using both PC and traditional platforms is currently being implemented at LANL for LEDA, the low energy demonstration accelerator under construction as part of the Accelerator Production of Tritium (APT) project. To illustrate these developments the authors compare their recent experience deploying a PC-based EPICS system with experience deploying similar systems based on traditional (UNIX-hosted) EPICS hardware and software platforms.

  13. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  14. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  15. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  16. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  17. Traffic information computing platform for big data

    SciTech Connect (OSTI)

    Duan, Zongtao, E-mail: ztduan@chd.edu.cn; Li, Ying, E-mail: ztduan@chd.edu.cn; Zheng, Xibin, E-mail: ztduan@chd.edu.cn; Liu, Yan, E-mail: ztduan@chd.edu.cn; Dai, Jiting, E-mail: ztduan@chd.edu.cn; Kang, Jun, E-mail: ztduan@chd.edu.cn [Chang'an University School of Information Engineering, Xi'an, China and Shaanxi Engineering and Technical Research Center for Road and Traffic Detection, Xi'an (China)

    2014-10-06T23:59:59.000Z

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  18. A Proposal for Autotuning Linear AlgebraA Proposal for Autotuning Linear Algebra Routines on Multicore PlatformsRoutines on Multicore Platforms

    E-Print Network [OSTI]

    Giménez, Domingo

    on Multicore PlatformsRoutines on Multicore Platforms Javier Cuenca, Luis P. García Domingo Giménez Parallel Algebra Routines on Multicore PlatformsPlatforms 22 parallelparallelumum Introduction Algebra Routines on MulticoreA Proposal for Autotuning Linear Algebra Routines on Multicore PlatformsPlatforms

  19. Pseudomonas fluorescens -A robust manufacturing platform

    E-Print Network [OSTI]

    Lebendiker, Mario

    Pseudomonas fluorescens -A robust manufacturing platform Reprinted from July/August 2004 Speciality at efficient- ly transporting single chain antibodies and other mammalian-derived proteins. In addition production. Dowpharma, a contract manufacturing services unit of Dow Chemical, has developed a manufacturing

  20. The Durham ELT adaptive optics simulation platform

    E-Print Network [OSTI]

    Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

    2006-11-09T23:59:59.000Z

    Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

  1. Platform for Hybrid Cloud Technical White Paper

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Platform for Hybrid Cloud Technical White Paper Published: September 2013 (updated) Applies to: SQL Server and Windows Azure Summary: Cloud computing brings a new paradigm shift in computing in the cloud with greater scale and flexibility. Microsoft SQL Server runs very well in the cloud environment

  2. Microfluidic Platforms for Capturing Circulating Tumor Cells

    E-Print Network [OSTI]

    Tang, William C

    Microfluidic Platforms for Capturing Circulating Tumor Cells Sweta Gupta, Allison C. Baker-cost microfluidic device that can be used to isolate and capture circulating tumor cells (CTCs) from whole blood. The device was made from polydimethylsiloxane (PDMS) consisting of a microfluidic channel with microposts

  3. Vol 442|6 July 2006 Multiple introductions of H5N1 in Nigeria

    E-Print Network [OSTI]

    Cai, Long

    Vol 442|6 July 2006 37 Multiple introductions of H5N1 in Nigeria Phylogenetic analysis reveals- try farming industry is second only to oil production in Nigeria and is particularly vulnerable the two flight paths that link Nigeria with the south- ern Russian region and Europe, and with western

  4. Towards the Next Generation of Model-Driven Cloud Platforms

    E-Print Network [OSTI]

    Muñoz, Francesc

    Towards the Next Generation of Model-Driven Cloud Platforms Javier Esparza-Peidro, Francesc D. Mu~noz-Esco of Model-Driven Cloud Platforms Javier Esparza-Peidro, Francesc D. Mu~noz-Esco´i Institut Universitari Mixt

  5. Integer-based Optimisations for Resource-constrained Sensor Platforms

    E-Print Network [OSTI]

    Roussos, George

    time model adapted for a WSN platform. Key words: Wireless Sensor Networks, Optimisation, Integer Tech batteries has changed only modestly [4]. These fundamental constraints suggest that programming optimisationInteger-based Optimisations for Resource-constrained Sensor Platforms Michael Zoumboulakis

  6. Characterizing System Level Energy Consumption in Mobile Computing Platforms

    E-Print Network [OSTI]

    Obraczka, Katia

    1 Characterizing System Level Energy Consumption in Mobile Computing Platforms Cintia B. Margi 1156 High Street Santa Cruz, CA 95064 Abstract--- This paper approaches energy consumption charac­ terization in mobile computing platforms by assessing energy con­ sumption of ''basic'' application

  7. A Robust Platform for the Synthesis of New Tetracycline Antibiotics

    E-Print Network [OSTI]

    A Robust Platform for the Synthesis of New Tetracycline Antibiotics Cuixiang Sun, Qiu Wang, Jason D potent antibiotic activities, both in bacterial cell culture and in vivo. The platform for tetracycline

  8. Disposable endoscope tip actuation design and robotic platform

    E-Print Network [OSTI]

    Chen, Yi

    A disposable endoscopic platform with actuation motors inside the body of the endoscope is presented. This platform can enable new medical devices for diagnosis and for minimally invasive surgeries. This paper addresses ...

  9. Robot Work Platform for Large Hot Cell Deactivation

    SciTech Connect (OSTI)

    BITTEN, E.J.

    2000-05-01T23:59:59.000Z

    The 324 Building, located at the Hanford Site near Richland, Washington, is being deactivated to meet state and federal cleanup commitments. The facility is currently in its third year of a nine-year project to complete deactivation and closure for long-term surveillance and maintenance. The 324 building contains large hot cells that were used for high-radiation, high-contamination chemical process development and demonstrations. A major obstacle for the 324 deactivation project is the inability to effectively perform deactivation tasks within highly radioactive, contaminated environments. Current strategies use inefficient, resource intensive technologies that significantly impact the cost and schedule for deactivation. To meet mandated cleanup commitments, there is a need to deploy rapid, more efficient remote/robot technologies to minimize worker exposure, accelerate work tasks, and eliminate the need for multiple specialized tool design and procurement efforts. This paper describes the functions and performance requirements for a crane-deployed remote/robot Work Platform possessing full access capabilities. The remote/robot Work Platform will deploy commercially available off-the-shelf tools and end effectors to support Project cleanup goals and reduce overall project risk and cost. The intent of this system is to maximize the use of off-the-shelf technologies that minimize additional new, unproven, or novel designs. This paper further describes procurement strategy, the selection process, the selected technology, and the current status of the procurement and lessons learned. Funding, in part, has been provided by the US Department of Energy, Office of Science and Technology, Deactivation and Decommissioning Focus Area.

  10. 2011 Biomass Program Platform Peer Review: Thermochemical Conversion...

    Energy Savers [EERE]

    Thermochemical Conversion 2011 Biomass Program Platform Peer Review: Thermochemical Conversion "This document summarizes the recommendations and evaluations provided by an...

  11. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  12. V-062: Asterisk Two Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote

  13. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  14. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery

  15. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment of

  16. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  17. Storage Exchange: A Global Trading Platform for Storage Services

    E-Print Network [OSTI]

    Melbourne, University of

    Storage Exchange: A Global Trading Platform for Storage Services Martin Placek and Rajkumar Buyya,raj}@csse.unimelb.edu.au Abstract. The Storage Exchange (SX) is a new platform allowing stor- age to be treated as a tradeable resource. Organisations with varying storage requirements can use the SX platform to trade and exchange

  18. ICT COMPETENCES ACQUISITION USING THE CONCORDE E-LEARNING PLATFORM

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ICT COMPETENCES ACQUISITION USING THE CONCORDE E-LEARNING PLATFORM Mircea Giurgiu Technical of the web platform. The targeted competences respond to the training needs identified in the first stage of the project. A web platform developed at Technical University of Cluj supports on-line training material

  19. GRAVIMETRIC MEASUREMENTS ON MOVING AND NON-INERTIAL PLATFORMS

    E-Print Network [OSTI]

    GRAVIMETRIC MEASUREMENTS ON MOVING AND NON-INERTIAL PLATFORMS By Haydey Alvarez Allende, Elias: http://www.ima.umn.edu #12;Gravimetric Measurements on Moving and Non-inertial Platforms Haydey Alvarez of the gravitational field using a gravimeter mounted on an aircraft. In a moving non-inertial platform, like

  20. Dual Stewart Platform Mobility Simulator R.F. Boian1

    E-Print Network [OSTI]

    New Jersey, University of Medicine and Dentistry of

    Dual Stewart Platform Mobility Simulator R.F. Boian1 , M. Bouzit1 , G.C. Burdea1,* , and J. The system uses two Stewart platform robots to render the walking surface geometry and condition. The hardware components of the platforms and the considerations behind their design are presented here

  1. Crafting Platform Strategy based on Anticipated Benefits and Costs1

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Chapter 2 Crafting Platform Strategy based on Anticipated Benefits and Costs1 Bruce G. Cameron, with a view to creating long-term competitive advantage for the firm. 2.1 Introduction Platforming industrial products. Example include Volkswagen's MQB platform (including VW Golf, Audi A3, and Seat Octavia

  2. Using Ontologies for Modeling Context-Aware Services Platforms

    E-Print Network [OSTI]

    van Sinderen, Marten

    Using Ontologies for Modeling Context-Aware Services Platforms Diego Rios1 , Patrícia Dockhorn-aware services platforms. It addresses the directions of research we are following in the WASP (Web Architectures for Services Platforms) project. For this purpose a simple scenario is considered. Keywords. Context

  3. Three Dimensional Dielectrophoretic Assembly of Nanostructures on a Micromachined Platform

    E-Print Network [OSTI]

    Dokmeci, Mehmet

    Three Dimensional Dielectrophoretic Assembly of Nanostructures on a Micromachined Platform University, Boston, MA-02115, USA ABSTRACT In this paper, we introduce a novel platform for selectively. The microfabricated platform based nanoscale assembly is quite versatile and has potential applications in fabricating

  4. Forest Research Dyfi Catchment and Woodland Research Platform

    E-Print Network [OSTI]

    Forest Research Dyfi Catchment and Woodland Research Platform The Dyfi Catchment and Woodland Research Platform is a collaborative initiative that focuses on the study of multi-functional landscapes and tourism. The Dyfi Catchment and Woodland Research Platform is data-rich. Both existing and new data

  5. The RASCALLI Platform For a Flexible and Distributed Development of

    E-Print Network [OSTI]

    The RASCALLI Platform For a Flexible and Distributed Development of Virtual Systems Augmented with Cognition Brigitte Kenn, Christian Schollum Abstract The RASCALLI platform is a modular and flexible development and runtime environment for artificial systems augmented with aspects of cognition. The platform

  6. Platform-Based Design for Embedded Luca P. Carloni a

    E-Print Network [OSTI]

    Carloni, Luca

    Platform-Based Design for Embedded Systems Luca P. Carloni a Fernando De Bernardinis a,b ClaudioDoCoMo Euro-labs, Munich, Germany Abstract A platform is an abstraction layer that hides the details composition of the elements. A legal com- position of elements and interconnects is called a platform instance

  7. Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms Aarthi Nagarajan attestation in trusted computing provides the ability to reason about the state of a platform using integrity attestation by abstracting low level binary values to high level security properties or functions of platforms

  8. A contextual semantic mediator for a distributed cooperative maintenance platform

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A contextual semantic mediator for a distributed cooperative maintenance platform Mohamed-Mechatronic Systems department (AS2M) {hedi.karray, Brigitte.morello, Noureddine.zerhouni}@femto-st.fr Abstract-Platforms expand maintenance systems from centralized systems into e-maintenance platforms integrating various

  9. Optimizing the Cost of an Heterogeneous Distributed Platform

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Optimizing the Cost of an Heterogeneous Distributed Platform Jean-Marc Nicod, Laurent Philippe [nicod,philippe,sabbah]@lifc.univ-fcomte.fr Abstract--Distributed platforms become heterogeneous in more. For production grids and factories, it is mandatory to control and optimize the economic cost of a such platforms

  10. Microcontroller Platform Design Mengting Nan, Christopher Salthouse, Ph.D.

    E-Print Network [OSTI]

    Mountziaris, T. J.

    Microcontroller Platform Design Mengting Nan, Christopher Salthouse, Ph.D. University interface between computers and external devices. In this work, we developed a microcontroller platform, we demonstrated the applicability of the system to biomedical research by using the platform in two

  11. Correlates of vulnerability among arthropod species threatened by invasive ants

    E-Print Network [OSTI]

    Krushelnycky, Paul D.; Gillespie, Rosemary G.

    2010-01-01T23:59:59.000Z

    declines and extinctions of native species worldwide.and even extinctions, of native species through variousG (2004) How species respond to multiple extinction threats.

  12. Porting salinas to the windows platform.

    SciTech Connect (OSTI)

    Reese, Garth M.; Wilson, Christopher Riley

    2006-06-01T23:59:59.000Z

    The ASC program has enabled significant development of high end engineering applications on massively parallel machines. There is a great benefit in providing these applications on the desktop of the analysts and designers, at least insofar as the small models may be run on these platforms, thus providing a tool set that spans the application needs. This effort documents the work of porting Salinas to the WINDOWS{trademark} platform. Selection of the tools required to compile, link, test and run Salinas in this environment is discussed. Significant problems encountered along the way are listed along with an estimation of the overall cost of the port. This report may serve as a baseline for streamlining further porting activities with other ASC codes.

  13. Platform Based Design for Automotive Sensor Conditioning

    E-Print Network [OSTI]

    Fanucci, L; Iozzi, F; Marino, C; Rocchi, A

    2011-01-01T23:59:59.000Z

    In this paper a general architecture suitable to interface several kinds of sensors for automotive applications is presented. A platform based design approach is pursued to improve system performance while minimizing time-to-market.. The platform is composed by an analog front-end and a digital section. The latter is based on a microcontroller core (8051 IP by Oregano) plus a set of dedicated hardware dedicated to the complex signal processing required for sensor conditioning. The microcontroller handles also the communication with external devices (as a PC) for data output and fast prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive applications. Measured performance results outperform current state-of-the-art commercial devices.

  14. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  15. The LEDA Platform Combinatorial and Geometric Computing

    E-Print Network [OSTI]

    Mehlhorn, Kurt

    ~iher** and Christian Uhrig*** Abstract. We give an overview of the LEDA platform for combinatorial and geometric in the text books of the area ([AtHJ83, Meh84, Tar83, CLR90, 0'R94, Woo93, Sed91, Kin90, van88, NH93 = (V, E), a node s G V, called the source, and a non-negative cost function on the edges cost : E -+ R

  16. AoM 2007 ID Number : 12323 NEW PRODUCT DEVELOPMENT IN A PLATFORM-DRIVEN ORGANIZATION : TOWARDS PLATFORM

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AoM 2007 ID Number : 12323 NEW PRODUCT DEVELOPMENT IN A PLATFORM-DRIVEN ORGANIZATION : TOWARDS PLATFORM LIFECYCLE MANAGEMENT. SYLVAIN LENFLE, SIHEM JOUINI, CAROLINE DERROUSSEAUX CENTRE DE RECHERCHE EN GESTION, ECOLE POLYTECHNIQUE ABSTRACT Platform product development is now widely used to tackle the cost

  17. Policy brief | the health systems funding Platform--a Primer | 1 The Health Systems Funding Platform--A Primer

    E-Print Network [OSTI]

    Klein, Ophir

    Policy brief | the health systems funding Platform--a Primer | 1 The Health Systems Funding Platform--A Primer Policy Brief introduction In September 2009, the High Level Task Force on Innovative International Financing for Health Systems recommended the creation of a platform to coordinate aid to health

  18. PROCEDURES FOR RESEARCH UNITS AND INFRASTRUCTURE PLATFORMS As per Policy on Research Units and Infrastructure Platforms (VPRGS-8)

    E-Print Network [OSTI]

    Doedel, Eusebius

    PROCEDURES FOR RESEARCH UNITS AND INFRASTRUCTURE PLATFORMS As per Policy on Research Units and Infrastructure Platforms (VPRGS-8) Last Updated ­ January 31 2014 These Procedures are related to the Policy on Research Units and Infrastructure Platforms (VPRGS- 8) and reflect current practices concerning

  19. Abstract--This paper describes a software platform used for controlling any set of collaborative robots. The platform is

    E-Print Network [OSTI]

    González de Rivera, Guillermo

    Abstract-- This paper describes a software platform used for controlling any set of collaborative robots. The platform is specially designed for users without special skills on hardware design or communication topics. The platform provides a standard to simplify the addition of new hardware devices

  20. RUNNING HEAD: Subaerial Exposure Unconformities on the Vercors Carbonate Platform Subaerial Exposure Unconformities on the Vercors Carbonate Platform (SE France)

    E-Print Network [OSTI]

    Fouke, Bruce W.

    1 RUNNING HEAD: Subaerial Exposure Unconformities on the Vercors Carbonate Platform Subaerial Exposure Unconformities on the Vercors Carbonate Platform (SE France) and their Sequence Stratigraphic carbonate platform (SE France), shows that the most prominent break in depositional style does not coincide

  1. Vulnerability of nuclear power plant structures to large external fires

    SciTech Connect (OSTI)

    Bennett, D.E.

    1983-08-01T23:59:59.000Z

    This report examines the inherent vulnerability of nuclear power plant structures to the thermal environments arising from large, external fires. The inherent vulnerability is the capacity of the concrete safety-related structures to absorb thermal loads without exceeding the appropriate thermal and structural design criteria. The potential sources of these thermal environments are large, offsite fires arising from accidents involving the transportation or storage of large quantities of flammable gases or liquids. A realistic thermal response analysis of a concrete panel was performed using three limiting criteria: temperature at the first rebar location, erosion and ablation of the front (exterior) surface due to high heat fluxes, and temperature at the back (interior) surface. The results of this analysis yield a relationship between incident heat flux and the maximum allowable exposure duration. Example calculations for the break of a 0.91 m (3') diameter high-pressure natural gas pipeline and a 1 m/sup 2/ hole in a 2-1/2 million gallon gasoline tank show that the resulting fires do not pose a significant hazard for ranges of 500 m or greater.

  2. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  3. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  4. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  5. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  6. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  7. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  9. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  10. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  11. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  12. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  13. Platform Models for Sustainable Internet Regulation kc claffy and David D. Clark

    E-Print Network [OSTI]

    California at San Diego, University of

    Platform Models for Sustainable Internet Regulation kc claffy and David D. Clark kc and persistent features of today's telecommunications ecosystem: the use of layered platforms to implement desired functionality; and interconnection between actors at different platform layers. We use platform

  14. A preliminary technology assessment of alternative uses for offshore petroleum platforms

    E-Print Network [OSTI]

    Lawlor, Frank James

    1975-01-01T23:59:59.000Z

    -contained platforms have been constructed. Structures other than self-contained platforms are required for oil production purposes. These include oil storage platforms, quarters platforms, compressor platforms, separator platforms, etc. These platforms...A PRELIMINARY TECHNOLOGY ASSESSMENT OF ALTERNATIVE USES FOR OFFSHORE PETROLEUM PLATFORMS A Thesis by FRANK JAMES LAWLOR III Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirement for the degree...

  15. A Virtualized Computing Platform For Fusion Control Systems

    SciTech Connect (OSTI)

    Frazier, T; Adams, P; Fisher, J; Talbot, A

    2011-03-18T23:59:59.000Z

    The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory is a stadium-sized facility that contains a 192-beam, 1.8-Megajoule, 500-Terawatt, ultraviolet laser system together with a 10-meter diameter target chamber with room for multiple experimental diagnostics. NIF is the world's largest and most energetic laser experimental system, providing a scientific center to study inertial confinement fusion (ICF) and matter at extreme energy densities and pressures. NIF's laser beams are designed to compress fusion targets to conditions required for thermonuclear burn, liberating more energy than required to initiate the fusion reactions. 2,500 servers, 400 network devices and 700 terabytes of networked attached storage provide the foundation for NIF's Integrated Computer Control System (ICCS) and Experimental Data Archive. This talk discusses the rationale & benefits for server virtualization in the context of an operational experimental facility, the requirements discovery process used by the NIF teams to establish evaluation criteria for virtualization alternatives, the processes and procedures defined to enable virtualization of servers in a timeframe that did not delay the execution of experimental campaigns and the lessons the NIF teams learned along the way. The virtualization architecture ultimately selected for ICCS is based on the Open Source Xen computing platform and 802.1Q open networking standards. The specific server and network configurations needed to ensure performance and high availability of the control system infrastructure will be discussed.

  16. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  17. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  18. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

    2011-04-08T23:59:59.000Z

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  19. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami, FL 33174 (United States)] [Applied Research Center, Florida International University, Miami, FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)] [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

    2013-07-01T23:59:59.000Z

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  20. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  3. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  4. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  5. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    nega- tive pressures (Dixon and Joly, 1895; Briggs, 1950) allows plants to power the movement of water to withstand tension-induced cavitation is typ- ically inferred from "vulnerability curves" generatedVulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels

  6. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  7. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  8. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  9. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  10. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  11. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  12. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  13. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  14. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  15. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  16. Biomass Program Peer Review Sustainability Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | DepartmentBioenergyUS0IBRDepartments of

  17. VOLTTRON Lite: Integration Platform for the Transactional Network

    SciTech Connect (OSTI)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31T23:59:59.000Z

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  18. Multimodality Imaging with Silica-Based Targeted Nanoparticle Platforms

    SciTech Connect (OSTI)

    Jason S. Lewis

    2012-04-09T23:59:59.000Z

    Objectives: To synthesize and characterize a C-Dot silica-based nanoparticle containing 'clickable' groups for the subsequent attachment of targeting moieties (e.g., peptides) and multiple contrast agents (e.g., radionuclides with high specific activity) [1,2]. These new constructs will be tested in suitable tumor models in vitro and in vivo to ensure maintenance of target-specificity and high specific activity. Methods: Cy5 dye molecules are cross-linked to a silica precursor which is reacted to form a dye-rich core particle. This core is then encapsulated in a layer of pure silica to create the core-shell C-Dot (Figure 1) [2]. A 'click' chemistry approach has been used to functionalize the silica shell with radionuclides conferring high contrast and specific activity (e.g. 64Cu and 89Zr) and peptides for tumor targeting (e.g. cRGD and octreotate) [3]. Based on the selective Diels-Alder reaction between tetrazine and norbornene, the reaction is bioorthogonal, highyielding, rapid, and water-compatible. This radiolabeling approach has already been employed successfully with both short peptides (e.g. octreotate) and antibodies (e.g. trastuzumab) as model systems for the ultimate labeling of the nanoparticles [1]. Results: PEGylated C-Dots with a Cy5 core and labeled with tetrazine have been synthesized (d = 55 nm, zeta potential = -3 mV) reliably and reproducibly and have been shown to be stable under physiological conditions for up to 1 month. Characterization of the nanoparticles revealed that the immobilized Cy5 dye within the C-Dots exhibited fluorescence intensities over twice that of the fluorophore alone. The nanoparticles were successfully radiolabeled with Cu-64. Efforts toward the conjugation of targeting peptides (e.g. cRGD) are underway. In vitro stability, specificity, and uptake studies as well as in vivo imaging and biodistribution investigations will be presented. Conclusions: C-Dot silica-based nanoparticles offer a robust, versatile, and multi-functional platform to enhance in vivo detection sensitivity and non-invasively assay receptor expression/status of tumor cellular targets, including those of low abundance, using nuclear-NIR fluorescence imaging approaches [2]. Improvements in molecular diagnostics, refined by the availability of nanotechnology platforms, will be a key determinant in driving early-stage disease detection and prevention, ultimately leading to decreases in mortality.

  19. Outage Performance of Double Stratospheric Platforms Diversity Systems

    E-Print Network [OSTI]

    Gesbert, David

    /stratospheric platforms (HAPs) are either airships or planes that operate in the stratosphere, 17-22km above the ground [1

  20. 2011 Biomass Program Platform Peer Review: Biochemical Conversion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biochemical Conversion 2011 Biomass Program Platform Peer Review: Biochemical Conversion This document summarizes the recommendations and evaluations provided by an independent...

  1. Standard Energy Efficiency Data (SEED) Platform - 2014 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation More Documents & Publications Standard Energy Efficiency Database Platform - 2013 BTO Peer Review LBNL SEED: Why Open Source Overview LBNL SEED for Cities Overview...

  2. alliances simulation platform: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    space on FPGA-based reconfigurable platforms. Application fields of this work include seismic modeling and migration, computational electromagnetics, aeroacoustics, marine...

  3. VOLTTRONTM as an Open Source Platform for Energy Management Applicatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Virginia Tech VOLTTRON TM as an Open Source Platform for Energy Management Applications HVAC Controllers Lighting Controllers Lighting circuit(s) Plug load Controllers July 23,...

  4. The Tariff Analysis Project: A Database and Analysis Platform...

    Open Energy Info (EERE)

    search Tool Summary LAUNCH TOOL Name: The Tariff Analysis Project: A Database and Analysis Platform for Electricity Tariffs Focus Area: Renewable Energy Topics: Policy...

  5. Sandia Energy - Study Compares Floating-Platform Options for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Study Compares Floating-Platform Options for Offshore Vertical-Axis Wind Turbines Home Renewable Energy Energy Partnership News Wind Energy News & Events Study Compares...

  6. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26T23:59:59.000Z

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  7. Minerals Management Service perspective of platform reassessment

    SciTech Connect (OSTI)

    Dyhrkopp, F.G. [Minerals Management Service, New Orleans, LA (United States). Office of Structural and Technical Support

    1995-10-01T23:59:59.000Z

    As a result of the destruction caused by the Loma Prieta Earthquake, which occurred in the San Francisco Bay Area in 1989, and the passage of Hurricane Andrew through the Central Gulf of Mexico (GOM) oil and gas fields in August 1002, the Minerals Management Service (MMS) has been actively developing a policy over the past few years that will comprehensively address the reassessment of existing Outer Continental Shelf (OCS) oil and gas structures. Central to the development of such policy has been the need to develop a procedure by which reassessment can be carried out. This paper discusses the history of MMS involvement in the area of reassessment, their concerns, and how they view the reassessment procedures found in the Draft Section 17, Assessment of Existing Platforms, proposed for inclusion in future API RP 2A Editions. Minerals Management Service procedures for review and approval of proposals to remove and reuse existing structures in OCS waters are also discussed.

  8. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  9. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L., E-mail: jalonne@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 109 S. Observatory, SPH II, Rm. M6314, Ann Arbor, MI 48109 (United States); Sanchez, Brisa N., E-mail: brisa@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Jolliet, Olivier, E-mail: ojolliet@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Zhang, Zhenzhen, E-mail: zhzh@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Parker, Edith A., E-mail: Edith-Parker@uiowa.edu [University of Michigan School of Public Health, Health Behavior and Health Education Department, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Timothy Dvonch, J., E-mail: dvonch@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 1415 Washington Heights, 6642 SPH Tower, Ann Arbor, MI 48109 (United States); O'Neill, Marie S., E-mail: marieo@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6631 SPH Tower, 1415 Washington Heights, Ann Arbor, MI 48109 (United States)

    2012-01-15T23:59:59.000Z

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  10. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  11. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  12. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  13. The Mars Hopper: a radioisotope powered, impulse driven, long-range, long-lived mobile platform for exploration of Mars

    SciTech Connect (OSTI)

    Steven D. Howe; Robert C. O'Brien; William Taitano; Doug Crawford; Nathan Jerred; Spencer Cooley; John Crapeau; Steve Hansen; Andrew Klein; James Werner

    2011-02-01T23:59:59.000Z

    Planetary exploration mission requirements are becoming more demanding. Due to the increasing cost, the missions that provide mobile platforms that can acquire data at multiple locations are becoming more attractive. Wheeled vehicles such as the MER rovers have proven extremely capable but have very limited range and cannot traverse rugged terrain. Flying vehicles such as balloons and airplanes have been proposed but are problematic due to the very thin atmospheric pressure and the strong, dusty winds present on Mars. The Center for Space Nuclear Research has designed an instrumented platform that can acquire detailed data at hundreds of locations during its lifetime - a Mars Hopper. The Mars Hopper concept utilizes energy from radioisotopic decay in a manner different from any existing radioisotopic power sources—as a thermal capacitor. By accumulating the heat from radioisotopic decay for long periods, the power of the source can be dramatically increased for short periods. The platform will be able to "hop" from one location to the next every 5-7 days with a separation of 5-10 km per hop. Preliminary designs show a platform that weighs around 52 kgs unfueled which is the condition at deployment. Consequently, several platforms may be deployed on a single launch from Earth. With sufficient lifetime, the entire surface of Mars can be mapped in detail by a couple dozen platforms. In addition, Hoppers can collect samples from all over the planet, including gorges, mountains and crevasses, and deliver them to a central location for eventual pick-up by a Mars Sample Return mission. The status of the Mars Hopper development project at the CSNR is discussed.

  14. FadE: whole genome methylation analysis for multiple sequencing platforms

    E-Print Network [OSTI]

    Chen, Ting

    and disease. Sodium bisulfite treatment (SBT) causes unmethylated cytosines to be sequenced as thymine, which to bases because single sequencing errors effect the down- stream sequence. We describe FadE, an algorithm describing its distribution at every reference cytosine. We sequenced two slides of human fibroblast cell

  15. Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms

    E-Print Network [OSTI]

    Williams, Samuel

    2009-01-01T23:59:59.000Z

    Yelick, and J. Demmel. Optimization of Sparse Matrix-Vectorand R. Vuduc. Sparsity: Optimization framework for sparseYelick. Memory hierarchy optimizations and bounds for sparse

  16. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy 9:

  17. Software Platforms for Smart Building Ecosystems: Understanding the

    E-Print Network [OSTI]

    Software Platforms for Smart Building Ecosystems: Understanding the Key Architectural-ready software platform for the smart building domain. We analyzed the type of contributors that may exist in a smart building ecosystem, the quality attributes that those roles are concerned with, and the key

  18. NADIM-Travel: A Multiagent Platform for Travel Services Aggregation

    E-Print Network [OSTI]

    Kropf, Peter

    services aggregators are increasingly in demand. A travel services aggregation platform should be able-coordinator agent manages users' requests as well as the response aggregation process. Service agents, on their partNADIM-Travel: A Multiagent Platform for Travel Services Aggregation Houssein Ben-Ameur a , François

  19. A New Motorcycle Simulator Platform: Mechatronics Design, Dynamics Modeling

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A New Motorcycle Simulator Platform: Mechatronics Design, Dynamics Modeling and Control L. Nehaoua and dynamics modeling will be presented. Some results are shown, validating the actutation requirements and platform control. 1. INTRODUCTION Road safety has become a major political and economical issue. While all

  20. Characterizing System Level Energy Consumption in Mobile Computing Platforms

    E-Print Network [OSTI]

    Obraczka, Katia

    1 Characterizing System Level Energy Consumption in Mobile Computing Platforms Cintia B. Margi 1156 High Street Santa Cruz, CA 95064 Abstract-- This paper approaches energy consumption charac- terization in mobile computing platforms by assessing energy con- sumption of "basic" application-level tasks

  1. An Open and Integrated Management Platform for Wireless Sensor Networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    such as heterogeneity, limited bandwidth and energy constraints, WSN management and monitoring architectures need to and management platform, and OpenRSM, an open source integrated remote systems and network management platform. The proposed system architecture can support several levels of integration (infrastructure management

  2. Matched Public PUF: Ultra Low Energy Security Platform

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Matched Public PUF: Ultra Low Energy Security Platform Saro Meguerdichian and Miodrag Potkonjak that cannot be matched with any third such module. Each device enables rapid, low-energy computation of ultra Our strategic objective is to introduce concepts and a hard- ware platform that enable ultra low power

  3. MICROMACHINED FOURIER TRANSFORM SPECTROMETER ON SILICON OPTICAL BENCH PLATFORM

    E-Print Network [OSTI]

    Park, Namkyoo

    MICROMACHINED FOURIER TRANSFORM SPECTROMETER ON SILICON OPTICAL BENCH PLATFORM Kyoungsik Yu1 a miniaturized Fourier transform spectrometer implemented on a silicon optical bench platform. The optical-etching. A spectral resolution of 45 nm near 1550 nm wavelength is demonstrated. Keywords: Fourier transform

  4. Microfluidics for biological analysis: Triumphs and hurdles of CD platforms

    E-Print Network [OSTI]

    Joshi, Yogesh Moreshwar

    Microfluidics for biological analysis: Triumphs and hurdles of CD platforms JONATHAN SIEGRIST1 , R on microfluidic technologies has become extensive, particularly in regards to the develop- ment of sample. Centrifugal microfluidic platforms based on the compact-disc format are discussed, along with the advantages

  5. A MODELING APPROACH FOR LOCATING LOGISTICS PLATFORMS FOR FAST PARCEL

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 29 A MODELING APPROACH FOR LOCATING LOGISTICS PLATFORMS FOR FAST PARCEL DELIVERY IN URBAN AREAS for optimizing, in a sustainable way (i.e. economical, eco-friendly and societal), the location of logistics has a logistics platform right in its centre (ARENC: 41362 m2 of warehouses and offices

  6. Platform Based Design for Automotive Sensor Conditioning L. Fanucci1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Platform Based Design for Automotive Sensor Conditioning L. Fanucci1 , A. Giambastiani2 , F. Iozzi3 kinds of sensors for automotive applications is presented. A platform based design approach is pursued prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive

  7. product platforms Marc H. Meyer, Olivier de Weck and Tucker

    E-Print Network [OSTI]

    de Weck, Olivier L.

    FIR ST PAG E PR O O FS wiem05025 product platforms Marc H. Meyer, Olivier de Weck and Tucker Marion across existing products as well as new market appli- cations (Meyer, Tertzakian, and Utterback, 1997 that end (Meyer and Lehnerd, 1997). We first define the meaning and context for product platforms in new

  8. Platform Independence Java Virtual Machine (JVM)

    E-Print Network [OSTI]

    Martin, Jonathan E.

    Utility to generate Web of documents 3 #12; Missing Pieces Efficient Compilers Now 1/30 speed of C++ Just Operating System Services File I/O Network I/O User Interface Multiple Threads Safety Byte Code Verifier Hello.html 11 #12; Java versus C Java is like C in low level syntax ... variables, arrays, expressions

  9. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  10. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  11. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  12. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  13. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  14. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability · Adaptation and Vulnerability · Transboundary Cooperation ­ Conflict · Irrigation Performance and Policy · River Basin Management · Water Allocation · Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  15. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  16. DNA repair modulates the vulnerability of the developing brain to alkylating agents

    E-Print Network [OSTI]

    Samson, Leona D.

    Neurons of the developing brain are especially vulnerable to environmental agents that damage DNA (i.e., genotoxicants), but the mechanism is poorly understood. The focus of the present study is to demonstrate that DNA ...

  17. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  18. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  19. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01T23:59:59.000Z

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to further characterise...

  20. EWEC 2006, Athens, The Anemos Wind Power Forecasting Platform Technology The Anemos Wind Power Forecasting Platform Technology -

    E-Print Network [OSTI]

    Boyer, Edmond

    the fluctuating output from wind farms into power plant dispatching and energy trading, wind power predictionsEWEC 2006, Athens, The Anemos Wind Power Forecasting Platform Technology 1 The Anemos Wind Power a professional, flexible platform for operating wind power prediction models, laying the main focus on state

  1. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  2. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  3. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    through a social vulnerability perspective they all can be seen as lacking access to vital economic and social resources, possessing lim- ited autonomy and power, and having low levels of social capital (Morrow, 1999). They also, for socio- historical... of these socially vulnerable populations, but we do not yet know what parts of the community infrastructure are most critical to support their resilience in the post- disaster context. Given the dearth of empirical studies that actu- ally explore how disaster...

  4. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    and Hydrological Science iii ABSTRACT Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico. (August 2009) Maria del Rosario Sanchez Flores, B.S., Monterrey Tech.; M.S., Instituto Matias Romero Co-Chairs of Advisory Committee: Dr... this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer...

  5. DOE Hybrid Electric Vehicle Test Platform

    SciTech Connect (OSTI)

    Gao, Yimin

    2012-03-31T23:59:59.000Z

    Based on the contract NT-42790 to the Department of Energy, “Plug-in Hybrid Ethanol Research Platform”, Advanced Vehicle Research Center (AVRC) Virginia has successfully developed the phase I electric drive train research platform which has been named as Laboratory Rapid Application Testbed (LabRAT). In phase II, LabRAT is to be upgraded into plug-in hybrid research platform, which will be capable of testing power systems for electric vehicles, and plug-in hybrid electric vehicles running on conventional as well as alternative fuels. LabRAT is configured as a rolling testbed with plentiful space for installing various component configurations. Component connections are modularized for flexibility and are easily replaced for testing various mechanisms. LabRAT is designed and built as a full functional vehicle chassis with a steering system, brake system and four wheel suspension. The rear drive axle offers maximum flexibility with a quickly changeable gear ratio final drive to accommodate different motor speed requirements. The electric drive system includes an electric motor which is mechanically connected to the rear axle through an integrated speed/torque sensor. Initially, a 100 kW UQM motor and corresponding UQM motor controller is used which can be easily replaced with another motor/controller combination. A lithium iron phosphate (LiFePO4) battery pack is installed, which consists of 108 cells of 100 AH capacity, giving the total energy capacity of 32.5 kWh. Correspondingly, a fully functional battery management system (BMS) is installed to perform battery cell operation monitoring, cell voltage balancing, and reporting battery real time operating parameters to vehicle controller. An advanced vehicle controller ECU is installed for controlling the drive train. The vehicle controller ECU receives traction or braking torque command from driver through accelerator and brake pedal position sensors and battery operating signals from the BMS through CAN BUS, and then generates motor torque command (traction or braking) to the motor controller based on the control algorithm software embedded in the vehicle controller ECU. The vehicle controller ECU is a re-programmable electronic control unit. Any control algorithm software developed can be easily downloaded to vehicle controller ECU to test any newly developed control strategy. The flexibility of the control system significantly enhances the practical applicability of the LabRAT. A new test methodology has been developed for the LabRAT simulating any vehicles running on road with different weights from compact passenger car to light duty truck on an AC or eddy current dynamometers without much effort for modification of the system. LabRAT is equipped with a fully functional data acquisition system supplied by CyberMetrix. The measurement points along the drive train are DC electric power between battery pack and motor controller input, AC electric power between motor controller and electric motor, mechanical power between motor and rear axle. The data acquisition system is designed with more capability than current requirements in order to meet the requirements for phase II.

  6. Tectonic synthesis of the northern Arabian platform

    SciTech Connect (OSTI)

    Everett, J.R.; Russell, O.R.; Stasxkowski, R.J.; Loyd, S.P.; Tabbutt, V.M. (Earth Satellite Corp., Chevy Chase, MD (USA)); Dolan, P.; Stein, A. (Dolan and Associates, Richmond (England)); Scott, J. (Petroleum Geological Analysis, Ltd., Reading (England))

    1990-05-01T23:59:59.000Z

    The creation and destruction of Tethys oceans from the early Mesozoic to the present has created a complex suture zone along the Zagros/Bitlus trend. The fundamental interactions are between the Arabian and Euasian plates, but several microplates trapped between the major plates further complicate the tectonic fabric of the region. On the west, the Arabian plate slides past the African plate and the Sinai microplate along the Levant fault. The Palmyrides are related to a bend in this plate boundary and are not an offset extension of the Syrian arc. As Arabia penetrates Eurasia the Anatolian block is escaping to the west along the northern (right-lateral) and eastern (left-lateral) faults. Convergence of the Eurasian and Arabian plates resulted in ophiolite abduction (Late Cretaceous), followed by continent-continent collision (Miocene to present). The zone of collision is marked by the Bitlis-Zagrosa suture. Structural features associated with the collision include overthrusting, impactogens, and complexly folded and faulted mountain systems. Intensity and complexity of structuring decreases southward into open long-wavelength folds on the Arabian Platform. The fortuitous combination of rich source rocks, abundant reservoir rocks with primary and fracture porosity, and numerous trapping structures make this an extraordinary prolific hydrocarbon province. A structural and lithologic interpretation of 53 contiguous Landsat Multispectral Scanner scenes covering all of Syria, Iraq, and Kuwait, and portions of Turkey, Iran, Jordan, Lebanon, and Saudi Arabia has provided insights into the tectonic history of this area and its hydrocarbon accumulation.

  7. Autonomous biomorphic robots as platforms for sensors

    SciTech Connect (OSTI)

    Tilden, M.; Hasslacher, B.; Mainieri, R.; Moses, J.

    1996-10-01T23:59:59.000Z

    The idea of building autonomous robots that can carry out complex and nonrepetitive tasks is an old one, so far unrealized in any meaningful hardware. Tilden has shown recently that there are simple, processor-free solutions to building autonomous mobile machines that continuously adapt to unknown and hostile environments, are designed primarily to survive, and are extremely resistant to damage. These devices use smart mechanics and simple (low component count) electronic neuron control structures having the functionality of biological organisms from simple invertebrates to sophisticated members of the insect and crab family. These devices are paradigms for the development of autonomous machines that can carry out directed goals. The machine then becomes a robust survivalist platform that can carry sensors or instruments. These autonomous roving machines, now in an early stage of development (several proof-of-concept prototype walkers have been built), can be developed so that they are inexpensive, robust, and versatile carriers for a variety of instrument packages. Applications are immediate and many, in areas as diverse as prosthetics, medicine, space, construction, nanoscience, defense, remote sensing, environmental cleanup, and biotechnology.

  8. ADS: The Next Generation Search Platform

    E-Print Network [OSTI]

    Accomazzi, Alberto; Henneken, Edwin A; Chyla, Roman; Luker, James; Grant, Carolyn S; Thompson, Donna M; Holachek, Alexandra; Dave, Rahul; Murray, Stephen S

    2015-01-01T23:59:59.000Z

    Four years after the last LISA meeting, the NASA Astrophysics Data System (ADS) finds itself in the middle of major changes to the infrastructure and contents of its database. In this paper we highlight a number of features of great importance to librarians and discuss the additional functionality that we are currently developing. Starting in 2011, the ADS started to systematically collect, parse and index full-text documents for all the major publications in Physics and Astronomy as well as many smaller Astronomy journals and arXiv e-prints, for a total of over 3.5 million papers. Our citation coverage has doubled since 2010 and now consists of over 70 million citations. We are normalizing the affiliation information in our records and, in collaboration with the CfA library and NASA, we have started collecting and linking funding sources with papers in our system. At the same time, we are undergoing major technology changes in the ADS platform which affect all aspects of the system and its operations. We hav...

  9. agent-based applications platforms: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    S. 133 Benefits and applications of commonality and platforming in the oil and gas industry MIT - DSpace Summary: Platforming, the sharing of parts, processes, knowledge, and...

  10. Performance Characteristics of an Adaptive Mesh Refinement Calculation on Scalar and Vector Platforms

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    Platforms Michael Welcome, Charles Rendleman, Leonid Oliker Computational Research Division Lawrence. It is therefore imperative to understand the tradeoffs between conventional scalar and parallel-vector platforms

  11. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06T23:59:59.000Z

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  12. New platform proposal for West Troll gas field

    SciTech Connect (OSTI)

    Not Available

    1984-10-01T23:59:59.000Z

    The Condeep Skirt Pile described in this paper is a central fixed production platform which could offer greater topside flexibility as well as reduced settlement compared with other gravity platforms. The new design resembles a stretched version of the successful Condeep gravity platforms for medium water depths, with a multicell foundation and up to four shafts extended to carry the deck. This solution permits a more flexible topside layout with wider separation between the living quarters and hazardous areas. It also provides a larger volume in the shafts compared with a monotower for accomodating conductors and risers from the many satellite wells planned on West Troll and utilities.

  13. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  14. Multiple mass solvers

    E-Print Network [OSTI]

    B. Jegerlehner

    1997-08-29T23:59:59.000Z

    We present a general method to construct multiple mass solvers from standard algorithms. As an example, the BiCGstab-M algorithm is derived.

  15. Multiple System Rate Process

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savisngs Under...

  16. Tracking Provenance in ORNL's Flexible Research Platforms

    SciTech Connect (OSTI)

    Hensley, Zachary P [ORNL; Sanyal, Jibonananda [ORNL; New, Joshua Ryan [ORNL

    2013-08-01T23:59:59.000Z

    Provenance is dened as information about the origin of objects, a concept that applies to both physical and digital objects and often overlaps both. The use of provenance in systems designed for research is an important but forgotten feature. Provenance allows for proper and exact tracking of information, its use, its lineage, its derivations and other metadata that are important for correctly adhering to the scien- tic method. In our project's prescribed use of provenance, researchers can determine detailed information about the use of sensor data in their experiments on ORNL's Flexible Research Platforms (FRPs). Our project's provenance system, Provenance Data Management System (ProvDMS), tracks information starting with the creation of information by an FRP sensor. The system determines station information, sensor information, and sensor channel information. The system allows researchers to derive generations of experiments from the sensor data and tracks their hierarchical flow. Key points can be seen in the history of the information as part of the information's workflow. The concept of provenance and its usage in science is relatively new and while used in other cases around the world, our project's provenance diers in a key area. To keep track of provenance, most systems must be designed or redesigned around the new provenance system. Our system is designed as a cohesive but sepa- rate entity and allows for researchers to continue using their own methods of analysis without being constrained in their ways in order to track the provenance. We have designed ProvDMS using a lightweight provenance library, Core Provenance Library (CPL) v.6 In addition to keeping track of sensor data experiments and its provenance, ProvDMS also provides a web-enabled visualization of the inheritance.

  17. Acoustic classification of buried objects with mobile sonar platforms

    E-Print Network [OSTI]

    Edwards, Joseph Richard, 1971-

    2006-01-01T23:59:59.000Z

    In this thesis, the use of highly mobile sonar platforms is investigated for the purpose of acoustically classifying compact objects on or below the seabed. The extension of existing strategies, including synthetic aperture ...

  18. Platform-independent method for computer aided schematic drawings

    DOE Patents [OSTI]

    Vell, Jeffrey L. (Slingerlands, NY); Siganporia, Darius M. (Clifton Park, NY); Levy, Arthur J. (Fort Lauderdale, FL)

    2012-02-14T23:59:59.000Z

    A CAD/CAM method is disclosed for a computer system to capture and interchange schematic drawing and associated design information. The schematic drawing and design information are stored in an extensible, platform-independent format.

  19. A Complete Microfluidic Screening Platform for Rational Protein Crystallization

    E-Print Network [OSTI]

    Hansen, Carl L.

    A Complete Microfluidic Screening Platform for Rational Protein Crystallization Billy T. C. Lau integration, and low reagent consumption, microfluidic devices have emerged as viable technologies for protein crystallization. Current microfluidic crystallization technologies have focused on two separate strategies: one

  20. automated microarray platform: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 21 Microfluidics-based biochips: technology issues, implementation platforms, and design automation...

  1. High-throughput Microfluidic Screening Platforms for Microalgae Study 

    E-Print Network [OSTI]

    Kim, Hyun Soo

    2014-12-15T23:59:59.000Z

    parallel studies are needed, however, current microalgae culture systems are lack of high-throughput screening capabilities, and thus not suitable for the parallel studies. Here, three different high-throughput microfluidic microalgae screening platforms...

  2. Responses of an articulated loading platform in waves and currents

    E-Print Network [OSTI]

    Ran, Zhihuang

    1993-01-01T23:59:59.000Z

    The responses of an articulated loading platform (ALP) in regular and irregular unidirectional waves (with or without currents) are investigated both in frequency and time domain. The first- and second-order wave diffraction radiation are solved...

  3. Development of a microfluidic platform for integrated DNA sequencing protocols

    E-Print Network [OSTI]

    Kumar, Mayank, S.M. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    This thesis describes the design and development of a microfluidic platform to reduce costs and improve the quality of in the DNA sequencing methodology currently implemented at the Broad Institute in Cambridge, Massachusetts. ...

  4. Architecture, Platforms and Integration Information Services and Technology

    E-Print Network [OSTI]

    Walker, Matthew P.

    Architecture, Platforms and Integration Information Services and Technology March 1, 2013 Bill Jon Broshious Systems Integration & Architecture George Atala Joel Henderson Lito Tejada Bernard Wong Tamer Sakr Developer Toolkit Karin Bliman Mary Washburn Enterprise Architecture Consulting Russell

  5. Design and implementation of an automated battery management platform

    E-Print Network [OSTI]

    Toksoz, Tuna

    2012-01-01T23:59:59.000Z

    This thesis describes the design and the implementation of the hardware platform for automated battery management with battery changing/charging capability for autonomous UAV missions with persistency requirement that ...

  6. Standard Energy Efficiency Data (SEED) Platform Homepage Screenshot

    Broader source: Energy.gov [DOE]

    The Standard Energy Efficiency Data (SEED) Platform™ is an open source software application that helps organizations easily manage data on the energy performance of large groups of buildings. This is a screenshot of the application homepage.

  7. 2011 Biomass Program Platform Peer Review: Integrated Biorefineries...

    Broader source: Energy.gov (indexed) [DOE]

    provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Integrated Biorefinery Platform Review meeting, held on February 1...3,...

  8. Communication centric platforms for future high data intensive applications 

    E-Print Network [OSTI]

    Ahmad, Balal

    The notion of platform based design is considered as a viable solution to boost the design productivity by favouring reuse design methodology. With the scaling down of device feature size and scaling up of design complexity, ...

  9. A platform based approach for embedded systems software development

    E-Print Network [OSTI]

    Seth, Deepak

    2006-01-01T23:59:59.000Z

    A platform based approach for product development allows companies to eliminate redundancies, efficiently utilize its resources and provide products for a wider market. The basic idea is to develop and share key components ...

  10. Seafloor anchoring for platforms in the Messina Strait

    E-Print Network [OSTI]

    Manno, Antonioluca

    2010-01-01T23:59:59.000Z

    The importance of properly designing and selecting an anchor is key to reliable techniques for floating offshore platforms including power generation from marine currents. Numerous studies have demonstrated how the uplift ...

  11. VOLTTRON: An Agent Execution Platform for the Electric Power System

    SciTech Connect (OSTI)

    Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

    2012-06-05T23:59:59.000Z

    Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

  12. A Knowledge Management Platform for Documentation of Case Reports in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Knowledge Management Platform for Documentation of Case Reports in Pharmacovigilance Florence systematic reviews are needed, there is little guidance on how systematic documentation of drug adverse documentation of pharmacovigilance case reports for the pharmaceutical industry and regulatory authorities

  13. An architectural selection framework for data fusion in sensor platforms

    E-Print Network [OSTI]

    Mirza, Atif R

    2007-01-01T23:59:59.000Z

    The role of data fusion in sensor platforms is becoming increasingly important in various domains of science, technology and business. Fusion pertains to the merging or integration of information towards an enhanced level ...

  14. Development and optimization of high-throughput zebrafish screening platform

    E-Print Network [OSTI]

    Koo, Bryan Kyo

    2010-01-01T23:59:59.000Z

    The high-throughput zebrafish screening platform is a revolutionary tool that enables subcellular precision in vivo whole animal screening of Danio Rerio. It can perform laser surgery and/or imaging in less than twenty ...

  15. Sandia National Laboratories: floating-platform options for offshore...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    vertical-axis wind turbines (VAWTs). This analysis uses a 5 MW VAWT topside design envelope created by Sandia to compare floating platform options for each turbine in the...

  16. Aneka Cloud Application Platform and Its Integration with Windows Azure

    E-Print Network [OSTI]

    Melbourne, University of

    scheduling, and energy efficient resource utilization. The Aneka Cloud Application platform, together. Ltd., Melbourne, Victoria, Australia 2 Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia Abstract

  17. Fluidics platform and method for sample preparation and analysis

    DOE Patents [OSTI]

    Benner, W. Henry; Dzenitis, John M.; Bennet, William J.; Baker, Brian R.

    2014-08-19T23:59:59.000Z

    Herein provided are fluidics platform and method for sample preparation and analysis. The fluidics platform is capable of analyzing DNA from blood samples using amplification assays such as polymerase-chain-reaction assays and loop-mediated-isothermal-amplification assays. The fluidics platform can also be used for other types of assays and analyzes. In some embodiments, a sample in a sealed tube can be inserted directly. The following isolation, detection, and analyzes can be performed without a user's intervention. The disclosed platform may also comprises a sample preparation system with a magnetic actuator, a heater, and an air-drying mechanism, and fluid manipulation processes for extraction, washing, elution, assay assembly, assay detection, and cleaning after reactions and between samples.

  18. EPICS SCA CLIENTS ON THE .NET X64 PLATFORM

    E-Print Network [OSTI]

    Timossi, Chris; Nishimura, Hiroshi

    2006-01-01T23:59:59.000Z

    EPICS SCA CLIENTS ON THE .NET X64 PLATFORM* C. Timossi 1 andAbstract We have developed a .NET assembly, which we callCa.dll) are categorized by .NET as unmanaged because they

  19. High-throughput Microfluidic Screening Platforms for Microalgae Study

    E-Print Network [OSTI]

    Kim, Hyun Soo

    2014-12-15T23:59:59.000Z

    parallel studies are needed, however, current microalgae culture systems are lack of high-throughput screening capabilities, and thus not suitable for the parallel studies. Here, three different high-throughput microfluidic microalgae screening platforms...

  20. Design of miniature floating platform for marginal fields

    E-Print Network [OSTI]

    Miao, Sha, S.M. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    This thesis presents the design of a novel type of miniature floating offshore platforms with a heave plate attached at the keel, suitable for developing deep-water marginal fields. This design features a small displacement, ...

  1. Towards the Development of a Web-based Alignment Platform 

    E-Print Network [OSTI]

    Schnober, Carsten

    2010-01-01T23:59:59.000Z

    In this work, a platform is developed that makes existing sentence and word alignment tools available as web services. The tools implemented are Hunalign and GIZA++; after creating wrappers and format converters, they are embedded into a pipeline...

  2. Single-word multiple-bit upsets in static random access devices

    SciTech Connect (OSTI)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B. (Aerospace Corp., Los Angeles, CA (United States))

    1993-12-01T23:59:59.000Z

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU.

  3. A Functional Test Platform for the Community Land Model

    SciTech Connect (OSTI)

    Xu, Yang [ORNL] [ORNL; Thornton, Peter E [ORNL] [ORNL; King, Anthony Wayne [ORNL] [ORNL; Steed, Chad A [ORNL] [ORNL; Gu, Lianhong [ORNL] [ORNL; Schuchart, Joseph [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    A functional test platform is presented to create direct linkages between site measurements and the process-based ecosystem model within the Community Earth System Models (CESM). The platform consists of three major parts: 1) interactive user interfaces, 2) functional test model and 3) observational datasets. It provides much needed integration interfaces for both field experimentalists and ecosystem modelers to improve the model s representation of ecosystem processes within the CESM framework without large software overhead.

  4. Blade platform seal for ceramic/metal rotor assembly

    DOE Patents [OSTI]

    Wertz, John L. (Indianapolis, IN)

    1982-01-01T23:59:59.000Z

    A combination ceramic and metal turbine rotor for use in high temperature gas turbine engines includes a metal rotor disc having a rim with a plurality of circumferentially spaced blade root retention slots therein to receive a plurality of ceramic blades, each including side platform segments thereon and a dovetail configured root slidably received in one of the slots. Adjacent ones of the platform segments including edge portions thereon closely spaced when the blades are assembled to form expansion gaps in an annular flow surface for gas passage through the blades and wherein the assembly further includes a plurality of unitary seal members on the rotor connected to its rim and each including a plurality of spaced, axially extending, flexible fingers that underlie and conform to the edge portions of the platform segments and which are operative at turbine operating temperatures and speeds to distribute loading on the platform segments as the fingers are seated against the underside of the blade platforms to seal the gaps without undesirably stressing thin web ceramic sections of the platform.

  5. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W. (Tracy, CA)

    1994-01-01T23:59:59.000Z

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  6. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, T.W.

    1994-09-06T23:59:59.000Z

    A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

  7. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  8. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #22, January - March 2009

    SciTech Connect (OSTI)

    Not Available

    2009-04-01T23:59:59.000Z

    January to March, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  9. Optimization of platform game levels for player experience Chris Pedersen, Julian Togelius, Georgios Yannakakis

    E-Print Network [OSTI]

    Togelius, Julian

    Platform game The test-bed platform game used for our studies is a ver- sion of Infinite Mario Bros (seeOptimization of platform game levels for player experience Chris Pedersen, Julian Togelius of certain parameters of platform game levels on the play- ers' experience of the game. A version of Super

  10. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #25, October - December 2009

    SciTech Connect (OSTI)

    Schell, D.

    2010-01-01T23:59:59.000Z

    October to December, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  11. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #20, July-September 2008

    SciTech Connect (OSTI)

    Schell, D. J.

    2008-12-01T23:59:59.000Z

    July to September, 2008 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  12. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #24, July-September 2009

    SciTech Connect (OSTI)

    Schell, D.

    2009-10-01T23:59:59.000Z

    July to September, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  13. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #17, October-December 2007

    SciTech Connect (OSTI)

    Schell, D.

    2008-01-01T23:59:59.000Z

    October to December, 2007 edition of the newsletter of the Biochemical Platform Process Integration project.

  14. National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #15, April - June 2007

    SciTech Connect (OSTI)

    Schell, D.

    2007-07-01T23:59:59.000Z

    July quarterly update for the National Bioenergy Center's Biochemical Processing Platform Integration Project.

  15. Temperature measurement in the Intel Efraim Rotem Mobile Platform Group, Intel corporation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Intel corporation Jim Hermerding ­ Mobile platform Group, Intel corporation Cohen Aviad - Microprocessor

  16. Platform Enhancements and System Identification for Control of an Unmanned Helicopter

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    Platform Enhancements and System Identification for Control of an Unmanned Helicopter Matt Garratt. A linear model has been identified using time domain methods for both platforms. The identified models on moving platforms. In this paper, the innovation is the enhancement of experimental platforms to better

  17. On the kinematic constraint surfaces of general three-legged planar robot platforms

    E-Print Network [OSTI]

    Hayes, John

    On the kinematic constraint surfaces of general three-legged planar robot platforms M.J.D. Hayes a robot platforms are enumerated and classified. Constraint surfaces corresponding to individual platform important applications to the kinematic analysis of planar three-legged robot platforms, hence appropriate

  18. Demonstration of Prognostics-Enabled Decision Making Algorithms on a Hardware Mobile Robot Test Platform

    E-Print Network [OSTI]

    Daigle, Matthew

    Platform Adam Sweet1 , George Gorospe2 , Matthew Daigle1 , Jos´e R. Celaya2 , Edward Balaban1 , Indranil on a hardware mobile robot platform. The hardware platform, based on the K11 planetary rover prototype. The PDM algorithms were adapted to the hardware platform, including develop- ment of a software module

  19. Singularity-invariant leg rearrangements in doubly-planar Stewart-Gough platforms

    E-Print Network [OSTI]

    Singularity-invariant leg rearrangements in doubly-planar Stewart-Gough platforms Júlia Borràs of a Stewart-Gough platform, i.e., changing the locations of its leg attachments, modifies the platform-Gough platforms containing rigid components. In this work, the authors go a step further presenting singularity

  20. The CyberWalk Platform: Human-Machine Interaction Enabling Unconstrained Walking through VR

    E-Print Network [OSTI]

    The CyberWalk Platform: Human-Machine Interaction Enabling Unconstrained Walking through VR P, locomotion is either restricted to a 1D motion on a linear treadmill, like in the Treadport platform [3: the "omni-directional" CyberWalk platform (Figs. 1­2). The platform consists of an array of synchronous

  1. National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #23, April-June 2009

    SciTech Connect (OSTI)

    Schell, D.

    2009-08-01T23:59:59.000Z

    April to June, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

  2. Protein-Based Nanomedicine Platforms for Drug Delivery

    SciTech Connect (OSTI)

    Ma Ham, Aihui; Tang, Zhiwen; Wu, Hong; Wang, Jun; Lin, Yuehe

    2009-08-03T23:59:59.000Z

    Drug delivery systems have been developed for many years, however some limitations still hurdle the pace of going to clinical phase, for example, poor biodistribution, drug molecule cytotoxicity, tissue damage, quick clearance from the circulation system, solubility and stability of drug molecules. To overcome the limitations of drug delivery, biomaterials have to be developed and applied to drug delivery to protect the drug molecules and to enhance the drug’s efficacy. Protein-based nanomedicine platforms for drug delivery are platforms comprised of naturally self-assembled protein subunits of the same protein or a combination of proteins making up a complete system. They are ideal for drug delivery platforms due to their biocompatibility and biodegradability coupled with low toxicity. A variety of proteins have been used and characterized for drug delivery systems including the ferritin/apoferritin protein cage, plant derived viral capsids, the small Heat shock protein (sHsp) cage, albumin, soy and whey protein, collagen, and gelatin. There are many different types and shapes that have been prepared to deliver drug molecules using protein-based platforms including the various protein cages, microspheres, nanoparticles, hydrogels, films, minirods and minipellets. There are over 30 therapeutic compounds that have been investigated with protein-based drug delivery platforms for the potential treatment of various cancers, infectious diseases, chronic diseases, autoimmune diseases. In protein-based drug delivery platforms, protein cage is the most newly developed biomaterials for drug delivery and therapeutic applications. Their uniform sizes, multifunctions, and biodegradability push them to the frontier for drug delivery. In this review, the recent strategic development of drug delivery has been discussed with a special emphasis upon the polymer based, especially protein-based nanomedicine platforms for drug delivery. The advantages and disadvantages are also discussed for each type of protein based drug delivery system.

  3. Calculating Nuclear Power Plant Vulnerability Using Integrated Geometry and Event/Fault-Tree Models

    SciTech Connect (OSTI)

    Peplow, Douglas E. [Oak Ridge National Laboratory (United States); Sulfredge, C. David [Oak Ridge National Laboratory (United States); Sanders, Robert L. [Oak Ridge National Laboratory (United States); Morris, Robert H. [Oak Ridge National Laboratory (United States); Hann, Todd A. [Defense Threat Reduction Agency (United States)

    2004-01-15T23:59:59.000Z

    Since the events of September 11, 2001, the vulnerability of nuclear power plants to terrorist attacks has become a national concern. The results of vulnerability analysis are greatly influenced by the computational approaches used. Standard approximations used in fault-tree analysis are not applicable for attacks, where high component failure probabilities are expected; two methods that do work with high failure probabilities are presented. Different blast modeling approaches can also affect the end results. Modeling the structural details of facility buildings and the geometric layout of components within the buildings is required to yield meaningful results.

  4. Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures

    SciTech Connect (OSTI)

    Bickford, W.E.

    1994-09-15T23:59:59.000Z

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

  5. Space qualified nanosatellite electronics platform for photon pair experiments

    E-Print Network [OSTI]

    Cheng, Cliff; Tan, Yue Chuan; Ling, Alexander

    2015-01-01T23:59:59.000Z

    We report the design and implementation of a complete electronics platform for conducting a quantum optics experiment that will be operated on board a 1U CubeSat (a 10 x 10 x 10 cm satellite). The quantum optics experiment is designed to produce polarization-entangled photon pairs using non-linear optical crystals and requires opto-electronic components such as a pump laser, single photon detectors and liquid crystal based polarization rotators in addition to passive optical elements. The platform provides mechanical support for the optical assembly. It also communicates autonomously with the host satellite to provide experiment data for transmission to a ground station. A limited number of commands can be transmitted from ground to the platform enabling it to switch experimental modes. This platform requires less than 1.5W for all operations, and is space qualified. The implementation of this electronics platform is a major step on the road to operating quantum communication experiments using nanosatellites.

  6. Modular turbine airfoil and platform assembly with independent root teeth

    DOE Patents [OSTI]

    Campbell, Christian X; Davies, Daniel O; Eng, Darryl

    2013-07-30T23:59:59.000Z

    A turbine airfoil (22E-H) extends from a shank (23E-H). A platform (30E-H) brackets or surrounds a first portion of the shank (23E-H). Opposed teeth (33, 35) extend laterally from the platform (30E-H) to engage respective slots (50) in a disk. Opposed teeth (25, 27) extend laterally from a second portion of the shank (29) that extends below the platform (30E-H) to engage other slots (52) in the disk. Thus the platform (30E-H) and the shank (23E-H) independently support their own centrifugal loads via their respective teeth. The platform may be formed in two portions (32E-H, 34E-H), that are bonded to each other at matching end-walls (37) and/or via pins (36G) passing through the shank (23E-H). Coolant channels (41, 43) may pass through the shank beside the pins (36G).

  7. Dolomitization by ground-water flow systems in carbonate platforms

    SciTech Connect (OSTI)

    Simms, M.

    1984-09-01T23:59:59.000Z

    Dolomite occurs throughout the subsurface of modern carbonate platforms such as the Bahamas. Groundwater flow systems must be responsible for delivery of reactants needed for dolomitization. Reflux, freshwater lens flows, and thermal convection are large-scale flow systems that may be widespread in active platforms. The author has evaluated some aspects of the dynamics and characteristics of these processes with ground-water flow theory and by scaled sandbox experiments. Reflux is not restricted to hypersaline brines, but can occur with bankwaters of only slightly elevated salinity such as those found on the Bahama Banks today (42%). The lack of evaporites in a stratigraphic section, therefore, does not rule out the possibility that reflux may have operated. Flows associated with freshwater lenses include flow in the lens, in the mixing zone, and in the seawater beneath and offshore of the lens. Upward transfer of seawater through the platform margins occurs when surrounding cold ocean water migrates into the platform and is heated. This type of thermal convection (Kohout convection) has been studied by Francis Kohout in south Florida. The ranges of mass flux of magnesium in these processes are all comparable and are all sufficient to account for young dolomites beneath modern platforms. Each process yields dolomitized zones of characteristic shape and location and perhaps may be distinguishable in ancient rocks. The concepts presented here may have application to exploration for dolomite reservoirs in the Gulf Coast and elsewhere.

  8. Space qualified nanosatellite electronics platform for photon pair experiments

    E-Print Network [OSTI]

    Cliff Cheng; Rakhitha Chandrasekara; Yue Chuan Tan; Alexander Ling

    2015-05-25T23:59:59.000Z

    We report the design and implementation of a complete electronics platform for conducting a quantum optics experiment that will be operated on board a 1U CubeSat (a 10 x 10 x 10 cm satellite). The quantum optics experiment is designed to produce polarization-entangled photon pairs using non-linear optical crystals and requires opto-electronic components such as a pump laser, single photon detectors and liquid crystal based polarization rotators in addition to passive optical elements. The platform provides mechanical support for the optical assembly. It also communicates autonomously with the host satellite to provide experiment data for transmission to a ground station. A limited number of commands can be transmitted from ground to the platform enabling it to switch experimental modes. This platform requires less than 1.5W for all operations, and is space qualified. The implementation of this electronics platform is a major step on the road to operating quantum communication experiments using nanosatellites.

  9. A Multiple Procedure DDT

    E-Print Network [OSTI]

    Knight, Thomas

    1968-01-01T23:59:59.000Z

    This Memo. Describes a version of DDT used as the command level of the A.I. Group PDP-6 Time Sharing System (ITS). Special features include capability to handle multiple jobs, ability to stop open read or write references ...

  10. Multiple jet interactions

    E-Print Network [OSTI]

    Hehr, Roger James

    1983-01-01T23:59:59.000Z

    MULTIPLE JET INTERACTIONS A Thesis by ROGER JAMES HEHR Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 1983 Major Subject: Aerospace Engineering... MULTIPLE JET INTERACTIONS A Thesis by ROGER JAMES HEHR Approved as to style and content by: David . Norton (Chairman of Committee) raid L. orrison (Mem er) Leland A. Carlson (Member) Er est . Cross, r. (Head of Department) August 1983 ABSTRACT...

  11. FOURIER TRANSFORM MULTIPLE QUANTUM NMR

    E-Print Network [OSTI]

    Drobny, G.

    2011-01-01T23:59:59.000Z

    of transition observed in Fourier transform multiple quantumDecember 18-19, 1979 FOURIER TRANSFORM MULTIPLE QUANTUM NMRof London, December 1978. FOURIER TRANSFO~~ MULTIPLE QUANTUM

  12. Arctic sea ice trends and narwhal vulnerability Kristin L. Laidre a,*, Mads Peter Heide-Jrgensen b

    E-Print Network [OSTI]

    Laidre, Kristin L.

    risk assess- ments as this may exceed the natural response capacity of the species. Ó 2004 Elsevier Ltd; Risk assessment; Vulnerability 1. Introduction Significant physical and biological shifts have recently climate change require that species vulnerability be incorporated into population risk models, especially

  13. More information from http://www.researchandmarkets.com/reports/1054243/ Fragile Networks: Identifying Vulnerabilities and Synergies in an

    E-Print Network [OSTI]

    Nagurney, Anna

    and Links in Financial Networks. Chapter 7: Dynamic Networks, the Internet, and Electric Power. Chapter 8: Identifying Vulnerabilities and Synergies in an Uncertain World Description: A unified treatment of the vulnerabilities that exist in real-world network systems?--with tools to identify synergies for mergers

  14. Software Platform Evaluation - Verifiable Fuel Cycle Simulation (VISION) Model

    SciTech Connect (OSTI)

    J. J. Jacobson; D. E. Shropshire; W. B. West

    2005-11-01T23:59:59.000Z

    The purpose of this Software Platform Evaluation (SPE) is to document the top-level evaluation of potential software platforms on which to construct a simulation model that satisfies the requirements for a Verifiable Fuel Cycle Simulation Model (VISION) of the Advanced Fuel Cycle (AFC). See the Software Requirements Specification for Verifiable Fuel Cycle Simulation (VISION) Model (INEEL/EXT-05-02643, Rev. 0) for a discussion of the objective and scope of the VISION model. VISION is intended to serve as a broad systems analysis and study tool applicable to work conducted as part of the AFCI (including costs estimates) and Generation IV reactor development studies. This document will serve as a guide for selecting the most appropriate software platform for VISION. This is a “living document” that will be modified over the course of the execution of this work.

  15. Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    (river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

  16. A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo

    E-Print Network [OSTI]

    Bullo, Francesco

    of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph in the power network model. The study of dynamical systems in descriptor form has received sensible attention

  17. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  18. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  19. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  20. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

  1. Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1

    E-Print Network [OSTI]

    and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

  2. Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass

    E-Print Network [OSTI]

    '. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

  3. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory was supported by Electric Power Research Center (EPRC) at Iowa State University. C.-W. Ten, C.-C. Liu, and M

  4. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack was supported by the Electric Power Research Center (EPRC) at Iowa State University. Paper no. TPWRS-00963- 2007

  5. Vulnerability of national economies to the impacts of climate change on fisheries

    E-Print Network [OSTI]

    Reynolds, John D.

    economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

  6. Vulnerability of the New York City Metropolitan Area to Coastal Hazards,

    E-Print Network [OSTI]

    moved from a manufacturing to a service industry-based economy. Mid-town and Lower Manhattan are two on Long Island, NY, and the north- ern New Jersey shore. Beaches and coastal wetlands provide recreational at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

  7. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies, NM, USA Abstract--Modern power grids rely heavily on their control systems operating over and blackouts remain possible if the initial disturbances in the power grid are accompanied by other system

  8. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  9. Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste

    E-Print Network [OSTI]

    Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

  10. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08T23:59:59.000Z

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  11. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

  12. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

  13. American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE

    E-Print Network [OSTI]

    Pockman, William T.

    1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

  14. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  15. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  16. From Sustainability to Transformation: dynamics and diversity in reflexive governance of vulnerability, Andy Stirling

    E-Print Network [OSTI]

    Sussex, University of

    of vulnerability, Andy Stirling From "Broadening Out" Appraisal to "Opening Up" Commitments This chapter turns our-technical choice (Stirling, 2008a). Organizational, cultural, political, and economic forces structure our implications (Stirling, 2008b). In this way, we can extend attention to alternative trajectories reflecting

  17. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31T23:59:59.000Z

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  18. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, Jr., Harry K. (Birmingham, MI)

    1983-05-31T23:59:59.000Z

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  19. A High-Altitude, Station-Keeping Astronomical Platform

    E-Print Network [OSTI]

    Robert A. Fesen

    2006-06-15T23:59:59.000Z

    Several commercial telecommunication ventures together with a well funded US military program make it a likely possibility that an autonomous, high-altitude, light-than-air (LTA) vehicle which could maneuver and station-keep for weeks to many months will be a reality in a few years. Here I outline how this technology could be used to develop a high-altitude astronomical observing platform which could return high-resolution optical data rivaling those from space-based platforms but at a fraction of the cost.

  20. A High-Altitude, Station-Keeping Astronomical Platform

    E-Print Network [OSTI]

    Fesen, R A

    2006-01-01T23:59:59.000Z

    Several commercial telecommunication ventures together with a well funded US military program make it a likely possibility that an autonomous, high-altitude, light-than-air (LTA) vehicle which could maneuver and station-keep for weeks to many months will be a reality in a few years. Here I outline how this technology could be used to develop a high-altitude astronomical observing platform which could return high-resolution optical data rivaling those from space-based platforms but at a fraction of the cost.