Powered by Deep Web Technologies
Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

2

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

3

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

4

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

5

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

6

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

7

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

8

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

9

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

10

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

11

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM Multiple

12

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

13

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Broader source: Energy.gov (indexed) [DOE]

IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

14

Robotic vehicle with multiple tracked mobility platforms  

DOE Patents [OSTI]

A robotic vehicle having two or more tracked mobility platforms that are mechanically linked together with a two-dimensional coupling, thereby forming a composite vehicle of increased mobility. The robotic vehicle is operative in hazardous environments and can be capable of semi-submersible operation. The robotic vehicle is capable of remote controlled operation via radio frequency and/or fiber optic communication link to a remote operator control unit. The tracks have a plurality of track-edge scallop cut-outs that allow the tracks to easily grab onto and roll across railroad tracks, especially when crossing the railroad tracks at an oblique angle.

Salton, Jonathan R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM); Garretson, Justin (Albuquerque, NM); Hayward, David R. (Wetmore, CO); Hobart, Clinton G. (Albuquerque, NM); Deuel, Jr., Jamieson K. (Albuquerque, NM)

2012-07-24T23:59:59.000Z

15

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

16

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

17

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

18

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

19

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

20

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS MultipleWireshark

22

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment ofEnergy Multiple

23

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java Multiple

24

U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of8:

25

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacks |Multiple

26

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

27

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

28

Online Allocation of Splitable Clients to Multiple Servers on Large Scale Heterogeneous Platforms  

E-Print Network [OSTI]

, platforms like BOINC [1] or Folding@home [17] uses volunteers machines to perform hard computations

Paris-Sud XI, Université de

29

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS Multiple

30

Poly(dimethylsiloxane) microchip-based immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform  

SciTech Connect (OSTI)

In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing platform with integrated pneumatic micro valves is described. The microchip was fabricated with multiple layer soft lithography technology. By controlling the activation status of corresponding valves, reagent flows in the microchannel network can be well manipulated so that immuno-reactions only take place at designated reaction zones (DRZs). Four DRZs are included in the prototype microchip. Since these DRZs are all isolated from each other by micro valves, cross contamination is prevented. Using the inner surface of the all-PDMS microchannel as immunoassay substrate, on-chip sandwich format solid phase immunoassay was performed to demonstrate the feasibility of this immuno-sensing platform. Mouse IgG and fluorescein isothiocyanate (FITC) were used as the model analyte and the signal reporter respectively. Only 10 ul sample is needed for the assay and low detection limit of 5 ng/ml (?33 pM) was achieved though low-cost polyclonal antibodies were used in our experiment for feasibility study only. The encouraging results from mouse IgG immunoassay proved the feasibility of our microchip design. With slight modification of the assay protocol, the same chip design can be used for multi-target detection and can provide a simple, cost-effective and integrated microchip solution for multiplex immunoassay applications.

Shao, Guocheng; Wang, Jun; Li, Zhaohui; Saraf, Laxmikant V.; Wang, Wanjun; Lin, Yuehe

2011-09-20T23:59:59.000Z

31

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

32

Junior QA Engineer Intern -14895BR -EH QA Engineers are responsible for facilitating the analysis, evaluation, and testing of firmware across multiple platforms.  

E-Print Network [OSTI]

Junior QA Engineer Intern - 14895BR - EH QA Engineers are responsible for facilitating the analysis, evaluation, and testing of firmware across multiple platforms. · Develop, implement, review ­ C, Java, or other object-oriented programming language acceptable. · Networking experience (L2/L3

Ravikumar, B.

33

V-125: Cisco Connected Grid Network Management System Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

34

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

35

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

36

Data collection and management of a mobile sensor platform  

E-Print Network [OSTI]

This thesis explores the development of a platform to better collect and manage data from multiple senor inputs mounted on a car sensor platform. Specifically, focusing on the collection and synchronization of multiple ...

Rosenfeld, Abraham M

2013-01-01T23:59:59.000Z

37

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

38

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

39

U-100: Google Chrome Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

40

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

42

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

43

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

44

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

45

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Office of Environmental Management (EM)

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

46

Platform Markets and Energy Services  

E-Print Network [OSTI]

2010). Residential and commercial end-users are starting to be informed of their real-time costs, consumption patterns, and of the origin of their electricity. The partial self-supply of household users from solar panels and combined heat and power... to the development of one or multiple platform markets. Household consumers are expected to take a more active role and become producers, such as through selling small-scale photovoltaic energy production or participating in demand response contracts (UK...

Weiller, Claire M.; Pollitt, Michael G.

2014-01-07T23:59:59.000Z

47

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

48

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

49

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

50

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

51

Omnidirectional holonomic platforms  

SciTech Connect (OSTI)

This paper presents the concepts for a new family of wheeled platforms which feature full omnidirectionality with simultaneous and independently controlled rotational and translational motion capabilities. The authors first present the orthogonal-wheels concept and the two major wheel assemblies on which these platforms are based. They then describe how a combination of these assemblies with appropriate control can be used to generate an omnidirectional capability for mobile robot platforms. The design and control of two prototype platforms are then presented and their respective characteristics with respect to rotational and translational motion control are discussed.

Pin, F.G.; Killough, S.M.

1994-06-01T23:59:59.000Z

52

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

53

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

54

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

55

Aerial Work Platform Safety Program  

E-Print Network [OSTI]

Aerial Work Platform Safety Program Updated: July 22, 2013 #12;Aerial Work Platform Safety Program ..........................................................................................................11 #12;Aerial Work Platform Safety Program 1 The official version of this information will only for establishing and maintaining the Aerial Work Platform Safety Program. Appropriate safety equipment (e

Holland, Jeffrey

56

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

57

Transactional Network Platform: Applications  

SciTech Connect (OSTI)

In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

2013-10-31T23:59:59.000Z

58

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabiliti...  

Broader source: Energy.gov (indexed) [DOE]

RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found...

59

V-070: Apache CouchDB Multiple Vulnerabilities | Department of...  

Broader source: Energy.gov (indexed) [DOE]

access files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. Only Microsoft Windows versions of Apache CouchDB are affected....

60

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary...

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

ISSO Information Alert Multiple Vulnerabilities in Adobe Flash  

E-Print Network [OSTI]

SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY MS-ISAC ADVISORY NUMBER: 2012-014 DATE(S) ISSUED: 3 to take complete control of affected systems. Adobe Flash Player is a widely distributed multimedia or URL and distributes that file or URL to unsuspecting users via e-mail or some other means. When

Dyer, Bill

62

U-104: Adobe Flash Player Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and...

63

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar PowerDepartmentOracle

64

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBMMultiple

65

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements

66

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple

67

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment ofof

68

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentof

69

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartment of

70

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartmentGoogle

71

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy VMwareMozilla

72

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:|

73

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2:

74

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems for

75

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| DepartmentU-162:

76

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment

77

V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department

78

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |

79

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a

80

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |

82

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:

83

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:9:

84

U-273: Multiple vulnerabilities have been reported in Wireshark |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of

85

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New12.'6/0.2Contract (UESC)Department ofDepartment

86

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

87

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

88

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

89

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

90

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

91

Service platform strategy : social networking and mobile service platform perspectives  

E-Print Network [OSTI]

The significance of the service platform is increasing, while studies on this phenomenon remain scarce and insufficient. Most of the researches focus on products, market segmentation and how platform triggers innovation ...

Yoo, Jang Hoon, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

92

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

93

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

94

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...  

Broader source: Energy.gov (indexed) [DOE]

Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

95

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

96

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

97

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

98

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

99

Common tester platform concept.  

SciTech Connect (OSTI)

This report summarizes the results of a case study on the doctrine of a common tester platform, a concept of a standardized platform that can be applicable across the broad spectrum of testing requirements throughout the various stages of a weapons program, as well as across the various weapons programs. The common tester concept strives to define an affordable, next-generation design that will meet testing requirements with the flexibility to grow and expand; supporting the initial development stages of a weapons program through to the final production and surveillance stages. This report discusses a concept investing key leveraging technologies and operational concepts combined with prototype tester-development experiences and practical lessons learned gleaned from past weapons programs.

Hurst, Michael James

2008-05-01T23:59:59.000Z

100

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell-cell  

E-Print Network [OSTI]

Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell are available today. Here, we report the design and validation of a microfluidic platform that enables (i) soluble molecule-cell and/or (ii) cell-cell paracrine signaling. In the microfluidic platform, multiple

Kenis, Paul J. A.

102

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

103

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

104

FUTURE POWER GRID INITIATIVE An Intelligent Agent Platform  

E-Print Network [OSTI]

Sequencing For Managing Demand/Response IMPACT VOLTTRON fills the need for an independent language agnostic. This will allow customers, building owners, utilities, etc. to realize better energy efficiency and reliability the integrating platform for a DOE funded project combining multiple labs and vendors for building energy

105

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

106

Universal Developer Platform for MachinePlatform for Machine  

E-Print Network [OSTI]

1 Universal Developer Platform for MachinePlatform for Machine Control Applications Hansjoerg will need some things: · Senses · Means June 24-26, 2008 ETH Zurich #12;2 And for Machine Control? June 24 ETH Zurich Conclusion: big effort for things that have little to do with Machine Control Multi

107

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

108

Turbine blade platform seal  

DOE Patents [OSTI]

A rotating blade group 90 for a turbo-machine having an improved device for sealing the gap 110 between the edges 112,114 of adjacent blade platforms 96,104. The gap 110 between adjacent blades 92,100 is sealed by a seal pin 20 its central portion 110 and by a seal plate 58,60 at each of the front 54 and rear 56 portions. The seal plates 58,60 are inserted into corresponding grooves 62,64 formed in the adjacent edges 112,114 of adjoining blades 92,100 and held in place by end plates 40,42. The end of the seal plates 58,60 may be chamfered 78,80 to improve the seal against the end plate 40,42. The seal pin 20 provides the required damping between the blades 92,100 and the seal plates 58,60 provide improved sealing effectiveness.

Zagar, Thomas W. (Winter Springs, FL); Schiavo, Anthony L. (Oviedo, FL)

2001-01-01T23:59:59.000Z

109

Energy Tracking Software Platform  

SciTech Connect (OSTI)

Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

2011-04-04T23:59:59.000Z

110

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

111

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

112

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

113

Toolbox Safety Talk Articulating Boom Work Platforms  

E-Print Network [OSTI]

Toolbox Safety Talk Articulating Boom Work Platforms Environmental Health & Safety Facilities sign-in sheet to Environmental Health & Safety for recordkeeping. Articulating boom work platforms Articulating Boom Work Platforms Environmental Health & Safety Facilities Safety & Health Section 395 Pine Tree

Pawlowski, Wojtek

114

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

115

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

116

next-generation sequencing platforms | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

next-generation sequencing platforms next-generation sequencing platforms Leads No leads are available at this time. The Epsomitic Phototrophic Microbial Mat of Hot Lake,...

117

Platform Chemicals from an Oilseed Biorefinery  

SciTech Connect (OSTI)

The US chemical industry is $460 billion in size where a $150 billion segment of which is non-oxygenated chemicals that is sourced today via petroleum but is addressable by a renewable feedstock if one considers a more chemically reduced feedstock such as vegetable oils. Vegetable oil, due to its chemical functionality, provides a largely untapped opportunity as a renewable chemical source to replace petroleum-derived chemicals and produce platform chemicals unavailable today. This project examined the fertile intersection between the rich building blocks provided by vegetable oils and the enhanced chemical modification capability provided by metathesis chemistry. The technology advanced in this study is the process of ethylene cross-metathesis (referred to as ethenolysis) with vegetable oil and vegetable oil derivatives to manufacture the platform-chemical 9-decenoic acid (or 9DA) and olefin co-products. The project team meet its goals of demonstrating improved catalyst efficiencies of several multiples, deepening the mechanistic understanding of metathesis, synthesis and screening of dozens of new catalysts, designing and modeling commercial processes, and estimating production costs. One demonstrable result of the study was a step change improvement in catalyst turnover number in the ethenolysis of methyl oleate as reported here. We met our key measurable of producing 100 lbs of 9DA at the pilot-scale, which demonstrated ability to scale-up ethenolysis. DOE Project funding had significant positive impact on development of metathetically modified vegetable oils more broadly as the Cargill/Materia partnership, that was able to initiate primarily due to DOE funding, has succeeded in commercializing products, validating metathesis as a platform technology, and expanding a diverse products portfolio in high value and in large volume markets. Opportunities have expanded and business development has gained considerable momentum and enabled further expansion of the Materia/Cargill relationship. This project exceeded expectations and is having immediate impact on DOE success by replacing petroleum products with renewables in a large volume application today.

Tupy, Mike; Schrodi Yann

2006-11-06T23:59:59.000Z

118

Communication platform for open heterogeneous MASs  

E-Print Network [OSTI]

(Technical Computer Science) Prof. Dr. Gabriel Zachmann (Computer Graphics) #12;Communication platform

Zachmann, Gabriel

119

National Bioenergy Center Biochemical Platform Integration Project  

SciTech Connect (OSTI)

April through June 2008 update on activities of the National Bioenergy Center's Biochemical Platform Integration Project.

Not Available

2008-07-01T23:59:59.000Z

120

A Python Software Platform for Cooperatively Tracking Multiple GPS  

E-Print Network [OSTI]

of GPS enabled devices in use today, the potential gains from harnessing data collected over a network received her B.S. degree in Mechanical Engineering in 2001 and her M.S. degree in Electrical Engineering in 2003, both at Tsinghua University, China. She obtained her Ph.D. degree in Electrical Engineering

Gao, Grace Xingxin

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

122

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

123

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

124

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

125

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

126

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

127

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

128

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

129

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

130

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

131

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

132

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

133

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

134

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

135

Parameters Identification for Motorcycle Simulator's Platform Characterization  

E-Print Network [OSTI]

Parameters Identification for Motorcycle Simulator's Platform Characterization L. Nehaoua H modeling and parameters identification of a motorcycle simulator's platform. This model begins with some (cars and motorcycles) is possible by taking in care some characteristics of land vehicles. Indeed

Paris-Sud XI, Université de

136

Arduino: An Open Electronics Prototyping Platform  

E-Print Network [OSTI]

Arduino: An Open Electronics Prototyping Platform Abstract Arduino is a platform for prototyping and library for writing code to control the board. Arduino comes from a philosophy of learning by doing the Arduino prototyping platform. This paper discusses related work, the educational and design context within

Herr, Hugh

137

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

138

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

139

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

140

Turbine engine airfoil and platform assembly  

DOE Patents [OSTI]

A turbine airfoil (22A) is formed by a first process using a first material. A platform (30A) is formed by a second process using a second material that may be different from the first material. The platform (30A) is assembled around a shank (23A) of the airfoil. One or more pins (36A) extend from the platform into holes (28) in the shank (23A). The platform may be formed in two portions (32A, 34A) and placed around the shank, enclosing it. The two platform portions may be bonded to each other. Alternately, the platform (30B) may be cast around the shank (23B) using a metal alloy with better castability than that of the blade and shank, which may be specialized for thermal tolerance. The pins (36A-36D) or holes for them do not extend to an outer surface (31) of the platform, avoiding stress concentrations.

Campbell, Christian X. (Oviedo, FL); James, Allister W. (Chuluota, FL); Morrison, Jay A. (Oviedo, FL)

2012-07-31T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

142

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

143

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

144

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

145

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

146

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

147

Bucket platform cooling scheme and related method  

DOE Patents [OSTI]

A turbine bucket includes an airfoil extending from a platform, having high and low pressure sides; a wheel mounting portion; a hollow shank portion located radially between the platform and the wheel mounting portion, the platform having an under surface. An impingement cooling plate is located in the hollow shank portion, spaced from the under surface, and the impingement plate is formed with a plurality of impingement cooling holes therein.

Abuaf, Nesim (Lincoln City, OR); Barb, Kevin Joseph (Halfmoon, NY); Chopra, Sanjay (Greenville, SC); Kercher, David Max (Ipswich, MA); Kellock, Iain Robertson (Simpsonville, SC); Lenahan, Dean Thomas (Cincinnati, OH); Nellian, Sankar (Mauldin, SC); Starkweather, John Howard (Sharonville, OH); Lupe, Douglas Arthur (Ballston Lake, NY)

2002-01-01T23:59:59.000Z

148

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

149

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

150

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

151

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

152

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

153

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

154

Unsteady Turbomachinery Computations Using Massively Parallel Platforms  

E-Print Network [OSTI]

Unsteady Turbomachinery Computations Using Massively Parallel Platforms Edwin van der Weide with the inherently unsteady nature of turbomachinery flows, due to the motion of the rotors, this means

Alonso, Juan J.

155

Economic Analysis of Policy Effects Analysis Platform  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Economic Analysis of Policy Effects Analysis Platform March 24, 2015 Jason Hansen, PhD Idaho National Laboratory This presentation does not contain any proprietary, confidential,...

156

Gizmo : mobile mesh network and sensor platform  

E-Print Network [OSTI]

10 Chapter 2: Cell Phone Enabled Platform ……………………………. 1247 Software …………………………………………………. 50 Cell Phone Wi-Fi & SIPsniffing algorithms, cell phone communication technology,

Rodriguez Molina, Javier

2008-01-01T23:59:59.000Z

157

U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

158

Platforms: Where the sensors are mounted.  

E-Print Network [OSTI]

over the Sahara On September 18, 1994. #12;14 The sensor detects solar radiation that has been absorbed1 Platforms: Where the sensors are mounted. Sensors: Instruments on the platforms. ETM+ AVIRIS GER 1500 #12;2 Passive Sensors · Aerial Cameras · Visible or Thermal Active Sensors · Microwave (Radar

Gilbes, Fernando

159

The OSIMIS Platform: Making OSI Management Simple  

E-Print Network [OSTI]

and SNMP [Pav93a] while a similar approach for integrating OSI management and the OMG CORBA frame- work1 The OSIMIS Platform: Making OSI Management Simple George Pavlou, Kevin McCarthy, Saleem Bhatti.ucl.ac.uk Abstract The OSIMIS (OSI Management Information Service) platform provides the foundation for the quick

Bhatti, Saleem N.

160

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

ESF Mine Power Center Platforms  

SciTech Connect (OSTI)

The purpose and objective of this analysis is to structurally evaluate the existing Exploratory Studies Facility (ESF) mine power center (MPC) support frames and to design service platforms that will attach to the MPC support frames. This analysis follows the Development Plan titled ''Produce Additional Design for Title 111 Evaluation Report'' (CRWMS M&O 1999a). This analysis satisfies design recommended in the ''Title III Evaluation Report for the Surface and Subsurface Power System'' (CRWMS M&O 1999b, Section 7.6) and concurred with in the ''System Safety Evaluation of Title 111 Evaluation Reports Recommended Work'' (Gwyn 1999, Section 10.1.1). This analysis does not constitute a level-3 deliverable, a level-4 milestone, or a supporting work product. This document is not being prepared in support of the Monitored Geologic Repository (MGR) Site Recommendation (SR), Environmental Impact Statement (EIS), or License Application (LA) and should not be cited as a reference in the MGR SR, EIS, or LA.

T.A. Misiak

2000-02-10T23:59:59.000Z

162

Polymer-based platform for microfluidic systems  

DOE Patents [OSTI]

A method of forming a polymer-based microfluidic system platform using network building blocks selected from a set of interconnectable network building blocks, such as wire, pins, blocks, and interconnects. The selected building blocks are interconnectably assembled and fixedly positioned in precise positions in a mold cavity of a mold frame to construct a three-dimensional model construction of a microfluidic flow path network preferably having meso-scale dimensions. A hardenable liquid, such as poly (dimethylsiloxane) is then introduced into the mold cavity and hardened to form a platform structure as well as to mold the microfluidic flow path network having channels, reservoirs and ports. Pre-fabricated elbows, T's and other joints are used to interconnect various building block elements together. After hardening the liquid the building blocks are removed from the platform structure to make available the channels, cavities and ports within the platform structure. Microdevices may be embedded within the cast polymer-based platform, or bonded to the platform structure subsequent to molding, to create an integrated microfluidic system. In this manner, the new microfluidic platform is versatile and capable of quickly generating prototype systems, and could easily be adapted to a manufacturing setting.

Benett, William (Livermore, CA); Krulevitch, Peter (Pleasanton, CA); Maghribi, Mariam (Livermore, CA); Hamilton, Julie (Tracy, CA); Rose, Klint (Boston, MA); Wang, Amy W. (Oakland, CA)

2009-10-13T23:59:59.000Z

163

Multiple piece turbine rotor blade  

DOE Patents [OSTI]

A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

Jones, Russell B; Fedock, John A

2013-05-21T23:59:59.000Z

164

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

165

Standard Energy Efficiency Data (SEED) Platform Homepage Screenshot...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Standard Energy Efficiency Data (SEED) Platform Homepage Screenshot Standard Energy Efficiency Data (SEED) Platform Homepage Screenshot Standard Energy Efficiency Data (SEED)...

166

An Analysis Platform for Multiscale Hydrogeologic Modeling with...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

An Analysis Platform for Multiscale Hydrogeologic Modeling with Emphasis on Hybrid Multiscale Methods. An Analysis Platform for Multiscale Hydrogeologic Modeling with Emphasis on...

167

An Integrated Platform for Engine Performance Simulations and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

An Integrated Platform for Engine Performance Simulations and Optimization under Diesel Conditions An Integrated Platform for Engine Performance Simulations and Optimization under...

168

Platform Architecture A Two-Level Optimization Approach  

E-Print Network [OSTI]

Introduction to Platform Architecture in Products VW Golf 2 -Automotive Platforming Example:A Two-Level Optimization Approach 3 -Discussion

de Weck, Olivier

2002-10-03T23:59:59.000Z

169

An Extensible Sensing and Control Platform for Building Energy...  

Office of Environmental Management (EM)

An Extensible Sensing and Control Platform for Building Energy Management An Extensible Sensing and Control Platform for Building Energy Management Lead Performer: Carnegie Mellon...

170

Making a Hybrid Microfluidic Platform Compatible for In Situ...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a Hybrid Microfluidic Platform Compatible for In Situ Imaging by Vacuum-Based Techniques. Making a Hybrid Microfluidic Platform Compatible for In Situ Imaging by Vacuum-Based...

171

Web Machines : a new platform for application construction and execution  

E-Print Network [OSTI]

In today's world, computer application platforms are becoming increasingly important in providing positive application end-user and developer experiences. While there are many successful application platforms available, ...

Bryant, Robert A., M. Eng. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

172

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

173

Open vs. closed Apple music distribution platform  

E-Print Network [OSTI]

In this thesis, based on the example case study of the Apple iTunes-iPods platform technology, two simple models are analyzed to gain a better understanding of open vs. closed business models as management and market ...

Aye, Thida, S.M. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

174

High index contrast platform for silicon photonics  

E-Print Network [OSTI]

This thesis focuses on silicon-based high index contrast (HIC) photonics. In addition to mature fiber optics or low index contrast (LIC) platform, which is often referred to as Planar Lightwave Cirrcuit (PLC) or Silica ...

Akiyama, Shoji, 1972-

2004-01-01T23:59:59.000Z

175

Linked data platform for web applications  

E-Print Network [OSTI]

Most of today's web applications are tightly coupled to proprietary server backends that store and control all user data. This thesis presents Linked Data as a decentralized web app platform, eliminating vendor lock-in, ...

Presbrey, Joe (Joseph Warren)

2014-01-01T23:59:59.000Z

176

Cloud Based Applications and Platforms (Presentation)  

SciTech Connect (OSTI)

Presentation to the Cloud Computing East 2014 Conference, where we are highlighting our cloud computing strategy, describing the platforms on the cloud (including Smartgrid.gov), and defining our process for implementing cloud based applications.

Brodt-Giles, D.

2014-05-15T23:59:59.000Z

177

Digital Construction Platform: A Compound Arm Approach  

E-Print Network [OSTI]

We introduce a novel large-scale Digital Construction Platform (DCP) for on-site sensing, analysis, and fabrication. The DCP is an in-progress research project consisting of a compound robotic arm system comprised of a ...

Spielberg, Nathan A.

2014-01-01T23:59:59.000Z

178

Cell Culture on MEMS Platforms: A Review  

E-Print Network [OSTI]

Microfabricated systems provide an excellent platform for the culture of cells, and are an extremely useful tool for the investigation of cellular responses to various stimuli. Advantages offered over traditional methods ...

Ni, Ming

179

Multiple Critical Vulnerabilities in Blackboard due to persistent Cross Site Scripting and Authorization bugs  

E-Print Network [OSTI]

and Authorization bugs Tung Tran ­ tunghack@gmail.com Alireza Saberi - saberi.alireza@gmail.com The current version

Sekar, R.

180

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: Apple QuickTime

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-597: WordPress Multiple Security Vulnerabilities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7: WordPress

182

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:|7: Adobeof

183

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian update

184

U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|

185

U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of

186

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed Hat

187

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment of

188

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService onApple

189

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar,Department of

190

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

191

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

192

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

193

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

194

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

195

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

196

T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service  

Broader source: Energy.gov [DOE]

This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

197

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

198

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

199

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

200

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

202

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

203

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

204

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

205

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

206

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

207

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

208

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

209

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

210

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

211

Pseudomonas fluorescens -A robust manufacturing platform  

E-Print Network [OSTI]

Pseudomonas fluorescens -A robust manufacturing platform Reprinted from July/August 2004 Speciality at efficient- ly transporting single chain antibodies and other mammalian-derived proteins. In addition production. Dowpharma, a contract manufacturing services unit of Dow Chemical, has developed a manufacturing

Lebendiker, Mario

212

Microfluidic Platforms for Capturing Circulating Tumor Cells  

E-Print Network [OSTI]

Microfluidic Platforms for Capturing Circulating Tumor Cells Sweta Gupta, Allison C. Baker-cost microfluidic device that can be used to isolate and capture circulating tumor cells (CTCs) from whole blood. The device was made from polydimethylsiloxane (PDMS) consisting of a microfluidic channel with microposts

Tang, William C

213

The Durham ELT adaptive optics simulation platform  

E-Print Network [OSTI]

Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

2006-11-09T23:59:59.000Z

214

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

215

Sandia National Laboratories: Study Compares Floating-Platform...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ClimateECEnergyStudy Compares Floating-Platform Options for Offshore Vertical-Axis Wind Turbines Study Compares Floating-Platform Options for Offshore Vertical-Axis Wind Turbines...

216

Characterizing System Level Energy Consumption in Mobile Computing Platforms  

E-Print Network [OSTI]

1 Characterizing System Level Energy Consumption in Mobile Computing Platforms Cintia B. Margi 1156 High Street Santa Cruz, CA 95064 Abstract--- This paper approaches energy consumption charac­ terization in mobile computing platforms by assessing energy con­ sumption of ''basic'' application

Obraczka, Katia

217

E-Print Network 3.0 - american platform based Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

changes based on the demands for them. Platform Host SymbioticSphere Environment Service Energy... platforms). Each applica- tion service and middleware platform is modeled...

218

2011 Biomass Program Platform Peer Review: Thermochemical Conversion...  

Broader source: Energy.gov (indexed) [DOE]

Thermochemical Conversion 2011 Biomass Program Platform Peer Review: Thermochemical Conversion "This document summarizes the recommendations and evaluations provided by an...

219

2011 Biomass Program Platform Peer Review: Integrated Biorefineries...  

Broader source: Energy.gov (indexed) [DOE]

Integrated Biorefineries 2011 Biomass Program Platform Peer Review: Integrated Biorefineries "This document summarizes the recommendations and evaluations provided by an...

220

Robot Work Platform for Large Hot Cell Deactivation  

SciTech Connect (OSTI)

The 324 Building, located at the Hanford Site near Richland, Washington, is being deactivated to meet state and federal cleanup commitments. The facility is currently in its third year of a nine-year project to complete deactivation and closure for long-term surveillance and maintenance. The 324 building contains large hot cells that were used for high-radiation, high-contamination chemical process development and demonstrations. A major obstacle for the 324 deactivation project is the inability to effectively perform deactivation tasks within highly radioactive, contaminated environments. Current strategies use inefficient, resource intensive technologies that significantly impact the cost and schedule for deactivation. To meet mandated cleanup commitments, there is a need to deploy rapid, more efficient remote/robot technologies to minimize worker exposure, accelerate work tasks, and eliminate the need for multiple specialized tool design and procurement efforts. This paper describes the functions and performance requirements for a crane-deployed remote/robot Work Platform possessing full access capabilities. The remote/robot Work Platform will deploy commercially available off-the-shelf tools and end effectors to support Project cleanup goals and reduce overall project risk and cost. The intent of this system is to maximize the use of off-the-shelf technologies that minimize additional new, unproven, or novel designs. This paper further describes procurement strategy, the selection process, the selected technology, and the current status of the procurement and lessons learned. Funding, in part, has been provided by the US Department of Energy, Office of Science and Technology, Deactivation and Decommissioning Focus Area.

BITTEN, E.J.

2000-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

"Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors  

E-Print Network [OSTI]

"Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor be constructed and then attached to a platform that provides an aerial view of the landscape. "Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor

Frank, Thomas D.

222

Atlas: A Novel Kinematic Architecture for Six DOF Motion Platforms  

E-Print Network [OSTI]

Atlas: A Novel Kinematic Architecture for Six DOF Motion Platforms M.J.D. HAYES, R.G. LANGLOIS. This paper presents an overview of the Atlas platform: a novel six DOF motion platform architecture of the mechanism. The decoupling is accomplished by fixing a three DOF spherical orienting device, called the Atlas

Hayes, John

223

3-DIMENSIONAL COMPACT DISC (CD) MICROFLUIDIC PLATFORM Presented to the  

E-Print Network [OSTI]

3-DIMENSIONAL COMPACT DISC (CD) MICROFLUIDIC PLATFORM _______________ A Thesis Presented OF THE THESIS 3-Dimensional Compact Disc (CD) Microfluidic Platform by Nitin Edmund Harwood Master of Science in a compact disc (CD) microfluidics platform involving two or more layers. The traditional 2-Dimensional

Kassegne, Samuel Kinde

224

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

225

Platform Based Design for Automotive Sensor Conditioning  

E-Print Network [OSTI]

In this paper a general architecture suitable to interface several kinds of sensors for automotive applications is presented. A platform based design approach is pursued to improve system performance while minimizing time-to-market.. The platform is composed by an analog front-end and a digital section. The latter is based on a microcontroller core (8051 IP by Oregano) plus a set of dedicated hardware dedicated to the complex signal processing required for sensor conditioning. The microcontroller handles also the communication with external devices (as a PC) for data output and fast prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive applications. Measured performance results outperform current state-of-the-art commercial devices.

Fanucci, L; Iozzi, F; Marino, C; Rocchi, A

2011-01-01T23:59:59.000Z

226

Porting salinas to the windows platform.  

SciTech Connect (OSTI)

The ASC program has enabled significant development of high end engineering applications on massively parallel machines. There is a great benefit in providing these applications on the desktop of the analysts and designers, at least insofar as the small models may be run on these platforms, thus providing a tool set that spans the application needs. This effort documents the work of porting Salinas to the WINDOWS{trademark} platform. Selection of the tools required to compile, link, test and run Salinas in this environment is discussed. Significant problems encountered along the way are listed along with an estimation of the overall cost of the port. This report may serve as a baseline for streamlining further porting activities with other ASC codes.

Reese, Garth M.; Wilson, Christopher Riley

2006-06-01T23:59:59.000Z

227

EWEC 2006, Athens, The Anemos Wind Power Forecasting Platform Technology The Anemos Wind Power Forecasting Platform Technology -  

E-Print Network [OSTI]

EWEC 2006, Athens, The Anemos Wind Power Forecasting Platform Technology 1 The Anemos Wind Power a professional, flexible platform for operating wind power prediction models, laying the main focus on state models from all over Europe are able to work on this platform. Keywords: wind energy, wind power

Boyer, Edmond

228

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

229

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

230

Correlates of vulnerability among arthropod species threatened by invasive ants  

E-Print Network [OSTI]

declines and extinctions of native species worldwide.and even extinctions, of native species through variousG (2004) How species respond to multiple extinction threats.

Krushelnycky, Paul D.; Gillespie, Rosemary G.

2010-01-01T23:59:59.000Z

231

T-625: Opera Frameset Handling Memory Corruption Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

232

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

233

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

234

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

235

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

236

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

237

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

238

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

239

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

240

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

A Virtualized Computing Platform For Fusion Control Systems  

SciTech Connect (OSTI)

The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory is a stadium-sized facility that contains a 192-beam, 1.8-Megajoule, 500-Terawatt, ultraviolet laser system together with a 10-meter diameter target chamber with room for multiple experimental diagnostics. NIF is the world's largest and most energetic laser experimental system, providing a scientific center to study inertial confinement fusion (ICF) and matter at extreme energy densities and pressures. NIF's laser beams are designed to compress fusion targets to conditions required for thermonuclear burn, liberating more energy than required to initiate the fusion reactions. 2,500 servers, 400 network devices and 700 terabytes of networked attached storage provide the foundation for NIF's Integrated Computer Control System (ICCS) and Experimental Data Archive. This talk discusses the rationale & benefits for server virtualization in the context of an operational experimental facility, the requirements discovery process used by the NIF teams to establish evaluation criteria for virtualization alternatives, the processes and procedures defined to enable virtualization of servers in a timeframe that did not delay the execution of experimental campaigns and the lessons the NIF teams learned along the way. The virtualization architecture ultimately selected for ICCS is based on the Open Source Xen computing platform and 802.1Q open networking standards. The specific server and network configurations needed to ensure performance and high availability of the control system infrastructure will be discussed.

Frazier, T; Adams, P; Fisher, J; Talbot, A

2011-03-18T23:59:59.000Z

242

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

243

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

244

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

245

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

246

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

247

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

248

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Université de

249

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

250

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

251

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

252

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

253

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

254

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

255

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

256

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

257

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

258

VOLTTRON Lite: Integration Platform for the Transactional Network  

SciTech Connect (OSTI)

In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

2013-10-31T23:59:59.000Z

259

Knowledge Framework Implementation with Multiple Architectures - 13090  

SciTech Connect (OSTI)

Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami, FL 33174 (United States)] [Applied Research Center, Florida International University, Miami, FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)] [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

2013-07-01T23:59:59.000Z

260

2011 Biomass Program Platform Peer Review: Biochemical Conversion...  

Broader source: Energy.gov (indexed) [DOE]

Biochemical Conversion 2011 Biomass Program Platform Peer Review: Biochemical Conversion This document summarizes the recommendations and evaluations provided by an independent...

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Standard Energy Efficiency Data (SEED) Platform - 2014 BTO Peer...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Presentation More Documents & Publications Standard Energy Efficiency Database Platform - 2013 BTO Peer Review LBNL SEED: Why Open Source Overview LBNL SEED for Cities Overview...

262

VOLTTRONTM as an Open Source Platform for Energy Management Applicatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Virginia Tech VOLTTRON TM as an Open Source Platform for Energy Management Applications HVAC Controllers Lighting Controllers Lighting circuit(s) Plug load Controllers July 23,...

263

The Tariff Analysis Project: A Database and Analysis Platform...  

Open Energy Info (EERE)

Tariff Analysis Project: A Database and Analysis Platform for Electricity Tariffs Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Tariff Analysis Project: A Database...

264

Design of an omnidirectional and holonomic wheeled platform prototype  

SciTech Connect (OSTI)

This paper presents the concepts for a new family of wheeled platforms which feature full omnidirectionality with simultaneous and independent rotational and translational motion capabilities. We first describe the original orthogonal-wheels assembly'' on which these platforms are based and discuss how a combination of these assemblies is used to generate an omnidirectional capability. The design and control of a prototype platform developed to test and demonstrate the proposed concepts is then described, and experimental results illustrating the full omnidirectionality of the platform with decoupled rotational and translational degrees of freedom are presented. 15 refs., 9 figs.

Killough, S.M.; Pin, F.G.

1991-01-01T23:59:59.000Z

265

Multimodality Imaging with Silica-Based Targeted Nanoparticle Platforms  

SciTech Connect (OSTI)

Objectives: To synthesize and characterize a C-Dot silica-based nanoparticle containing 'clickable' groups for the subsequent attachment of targeting moieties (e.g., peptides) and multiple contrast agents (e.g., radionuclides with high specific activity) [1,2]. These new constructs will be tested in suitable tumor models in vitro and in vivo to ensure maintenance of target-specificity and high specific activity. Methods: Cy5 dye molecules are cross-linked to a silica precursor which is reacted to form a dye-rich core particle. This core is then encapsulated in a layer of pure silica to create the core-shell C-Dot (Figure 1) [2]. A 'click' chemistry approach has been used to functionalize the silica shell with radionuclides conferring high contrast and specific activity (e.g. 64Cu and 89Zr) and peptides for tumor targeting (e.g. cRGD and octreotate) [3]. Based on the selective Diels-Alder reaction between tetrazine and norbornene, the reaction is bioorthogonal, highyielding, rapid, and water-compatible. This radiolabeling approach has already been employed successfully with both short peptides (e.g. octreotate) and antibodies (e.g. trastuzumab) as model systems for the ultimate labeling of the nanoparticles [1]. Results: PEGylated C-Dots with a Cy5 core and labeled with tetrazine have been synthesized (d = 55 nm, zeta potential = -3 mV) reliably and reproducibly and have been shown to be stable under physiological conditions for up to 1 month. Characterization of the nanoparticles revealed that the immobilized Cy5 dye within the C-Dots exhibited fluorescence intensities over twice that of the fluorophore alone. The nanoparticles were successfully radiolabeled with Cu-64. Efforts toward the conjugation of targeting peptides (e.g. cRGD) are underway. In vitro stability, specificity, and uptake studies as well as in vivo imaging and biodistribution investigations will be presented. Conclusions: C-Dot silica-based nanoparticles offer a robust, versatile, and multi-functional platform to enhance in vivo detection sensitivity and non-invasively assay receptor expression/status of tumor cellular targets, including those of low abundance, using nuclear-NIR fluorescence imaging approaches [2]. Improvements in molecular diagnostics, refined by the availability of nanotechnology platforms, will be a key determinant in driving early-stage disease detection and prevention, ultimately leading to decreases in mortality.

Jason S. Lewis

2012-04-09T23:59:59.000Z

266

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

267

Platform Based Design for Automotive Sensor Conditioning L. Fanucci1  

E-Print Network [OSTI]

Platform Based Design for Automotive Sensor Conditioning L. Fanucci1 , A. Giambastiani2 , F. Iozzi3 kinds of sensors for automotive applications is presented. A platform based design approach is pursued prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive

Paris-Sud XI, Université de

268

Characterizing System Level Energy Consumption in Mobile Computing Platforms  

E-Print Network [OSTI]

1 Characterizing System Level Energy Consumption in Mobile Computing Platforms Cintia B. Margi 1156 High Street Santa Cruz, CA 95064 Abstract-- This paper approaches energy consumption charac- terization in mobile computing platforms by assessing energy con- sumption of "basic" application-level tasks

Obraczka, Katia

269

product platforms Marc H. Meyer, Olivier de Weck and Tucker  

E-Print Network [OSTI]

FIR ST PAG E PR O O FS wiem05025 product platforms Marc H. Meyer, Olivier de Weck and Tucker Marion across existing products as well as new market appli- cations (Meyer, Tertzakian, and Utterback, 1997). Designing, developing, and integrating ``product platforms'' is a tried and true practice for accomplishing

de Weck, Olivier L.

270

ATLAS: A NOVEL KINEMATIC ARCHITECTURE FOR SIX DOF MOTION PLATFORMS  

E-Print Network [OSTI]

ATLAS: A NOVEL KINEMATIC ARCHITECTURE FOR SIX DOF MOTION PLATFORMS M.J.D. HAYES Mechanical simulation required in many applications. This paper presents an overview of the Atlas platform: a novel six orienting device, called the Atlas sphere, on a gantry with three linear axes. The key to the design

Hayes, John

271

Microfluidics for biological analysis: Triumphs and hurdles of CD platforms  

E-Print Network [OSTI]

Microfluidics for biological analysis: Triumphs and hurdles of CD platforms JONATHAN SIEGRIST1 , R on microfluidic technologies has become extensive, particularly in regards to the develop- ment of sample. Centrifugal microfluidic platforms based on the compact-disc format are discussed, along with the advantages

Joshi, Yogesh Moreshwar

272

Software Platforms for Smart Building Ecosystems: Understanding the  

E-Print Network [OSTI]

Software Platforms for Smart Building Ecosystems: Understanding the Key Architectural-ready software platform for the smart building domain. We analyzed the type of contributors that may exist in a smart building ecosystem, the quality attributes that those roles are concerned with, and the key

273

Constructionism 2010 Robotic Educational Platform based on Ball Robots  

E-Print Network [OSTI]

Constructionism 2010 1 Robotic Educational Platform based on Ball Robots Zuzana Zajícková further on: we propose a creative and non-conventional platform, which goes beyond the traditional wheeled and entertaining educational experience. The idea of an autonomous ball robot is not new. Successful robots were

Petrovic, Pavel

274

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

275

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

276

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

277

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

278

FadE: whole genome methylation analysis for multiple sequencing platforms  

E-Print Network [OSTI]

and disease. Sodium bisulfite treatment (SBT) causes unmethylated cytosines to be sequenced as thymine, which to bases because single sequencing errors effect the down- stream sequence. We describe FadE, an algorithm describing its distribution at every reference cytosine. We sequenced two slides of human fibroblast cell

Chen, Ting

279

Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms  

E-Print Network [OSTI]

Yelick, and J. Demmel. Optimization of Sparse Matrix-Vectorand R. Vuduc. Sparsity: Optimization framework for sparseYelick. Memory hierarchy optimizations and bounds for sparse

Williams, Samuel

2009-01-01T23:59:59.000Z

280

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il :^

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Platform Independence Java Virtual Machine (JVM)  

E-Print Network [OSTI]

Utility to generate Web of documents 3 #12; Missing Pieces Efficient Compilers Now 1/30 speed of C++ Just Operating System Services File I/O Network I/O User Interface Multiple Threads Safety Byte Code Verifier Hello.html 11 #12; Java versus C Java is like C in low level syntax ... variables, arrays, expressions

Martin, Jonathan E.

282

The Mars Hopper: a radioisotope powered, impulse driven, long-range, long-lived mobile platform for exploration of Mars  

SciTech Connect (OSTI)

Planetary exploration mission requirements are becoming more demanding. Due to the increasing cost, the missions that provide mobile platforms that can acquire data at multiple locations are becoming more attractive. Wheeled vehicles such as the MER rovers have proven extremely capable but have very limited range and cannot traverse rugged terrain. Flying vehicles such as balloons and airplanes have been proposed but are problematic due to the very thin atmospheric pressure and the strong, dusty winds present on Mars. The Center for Space Nuclear Research has designed an instrumented platform that can acquire detailed data at hundreds of locations during its lifetime - a Mars Hopper. The Mars Hopper concept utilizes energy from radioisotopic decay in a manner different from any existing radioisotopic power sources—as a thermal capacitor. By accumulating the heat from radioisotopic decay for long periods, the power of the source can be dramatically increased for short periods. The platform will be able to "hop" from one location to the next every 5-7 days with a separation of 5-10 km per hop. Preliminary designs show a platform that weighs around 52 kgs unfueled which is the condition at deployment. Consequently, several platforms may be deployed on a single launch from Earth. With sufficient lifetime, the entire surface of Mars can be mapped in detail by a couple dozen platforms. In addition, Hoppers can collect samples from all over the planet, including gorges, mountains and crevasses, and deliver them to a central location for eventual pick-up by a Mars Sample Return mission. The status of the Mars Hopper development project at the CSNR is discussed.

Steven D. Howe; Robert C. O'Brien; William Taitano; Doug Crawford; Nathan Jerred; Spencer Cooley; John Crapeau; Steve Hansen; Andrew Klein; James Werner

2011-02-01T23:59:59.000Z

283

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

284

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

285

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

286

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

287

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

288

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, Herbert E.

289

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

290

Autonomous biomorphic robots as platforms for sensors  

SciTech Connect (OSTI)

The idea of building autonomous robots that can carry out complex and nonrepetitive tasks is an old one, so far unrealized in any meaningful hardware. Tilden has shown recently that there are simple, processor-free solutions to building autonomous mobile machines that continuously adapt to unknown and hostile environments, are designed primarily to survive, and are extremely resistant to damage. These devices use smart mechanics and simple (low component count) electronic neuron control structures having the functionality of biological organisms from simple invertebrates to sophisticated members of the insect and crab family. These devices are paradigms for the development of autonomous machines that can carry out directed goals. The machine then becomes a robust survivalist platform that can carry sensors or instruments. These autonomous roving machines, now in an early stage of development (several proof-of-concept prototype walkers have been built), can be developed so that they are inexpensive, robust, and versatile carriers for a variety of instrument packages. Applications are immediate and many, in areas as diverse as prosthetics, medicine, space, construction, nanoscience, defense, remote sensing, environmental cleanup, and biotechnology.

Tilden, M.; Hasslacher, B.; Mainieri, R.; Moses, J.

1996-10-01T23:59:59.000Z

291

Tectonic synthesis of the northern Arabian platform  

SciTech Connect (OSTI)

The creation and destruction of Tethys oceans from the early Mesozoic to the present has created a complex suture zone along the Zagros/Bitlus trend. The fundamental interactions are between the Arabian and Euasian plates, but several microplates trapped between the major plates further complicate the tectonic fabric of the region. On the west, the Arabian plate slides past the African plate and the Sinai microplate along the Levant fault. The Palmyrides are related to a bend in this plate boundary and are not an offset extension of the Syrian arc. As Arabia penetrates Eurasia the Anatolian block is escaping to the west along the northern (right-lateral) and eastern (left-lateral) faults. Convergence of the Eurasian and Arabian plates resulted in ophiolite abduction (Late Cretaceous), followed by continent-continent collision (Miocene to present). The zone of collision is marked by the Bitlis-Zagrosa suture. Structural features associated with the collision include overthrusting, impactogens, and complexly folded and faulted mountain systems. Intensity and complexity of structuring decreases southward into open long-wavelength folds on the Arabian Platform. The fortuitous combination of rich source rocks, abundant reservoir rocks with primary and fracture porosity, and numerous trapping structures make this an extraordinary prolific hydrocarbon province. A structural and lithologic interpretation of 53 contiguous Landsat Multispectral Scanner scenes covering all of Syria, Iraq, and Kuwait, and portions of Turkey, Iran, Jordan, Lebanon, and Saudi Arabia has provided insights into the tectonic history of this area and its hydrocarbon accumulation.

Everett, J.R.; Russell, O.R.; Stasxkowski, R.J.; Loyd, S.P.; Tabbutt, V.M. (Earth Satellite Corp., Chevy Chase, MD (USA)); Dolan, P.; Stein, A. (Dolan and Associates, Richmond (England)); Scott, J. (Petroleum Geological Analysis, Ltd., Reading (England))

1990-05-01T23:59:59.000Z

292

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

293

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

294

Volttron: An Agent Platform for the Smart Grid  

SciTech Connect (OSTI)

VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

2013-05-06T23:59:59.000Z

295

Tracking Provenance in ORNL's Flexible Research Platforms  

SciTech Connect (OSTI)

Provenance is dened as information about the origin of objects, a concept that applies to both physical and digital objects and often overlaps both. The use of provenance in systems designed for research is an important but forgotten feature. Provenance allows for proper and exact tracking of information, its use, its lineage, its derivations and other metadata that are important for correctly adhering to the scien- tic method. In our project's prescribed use of provenance, researchers can determine detailed information about the use of sensor data in their experiments on ORNL's Flexible Research Platforms (FRPs). Our project's provenance system, Provenance Data Management System (ProvDMS), tracks information starting with the creation of information by an FRP sensor. The system determines station information, sensor information, and sensor channel information. The system allows researchers to derive generations of experiments from the sensor data and tracks their hierarchical flow. Key points can be seen in the history of the information as part of the information's workflow. The concept of provenance and its usage in science is relatively new and while used in other cases around the world, our project's provenance diers in a key area. To keep track of provenance, most systems must be designed or redesigned around the new provenance system. Our system is designed as a cohesive but sepa- rate entity and allows for researchers to continue using their own methods of analysis without being constrained in their ways in order to track the provenance. We have designed ProvDMS using a lightweight provenance library, Core Provenance Library (CPL) v.6 In addition to keeping track of sensor data experiments and its provenance, ProvDMS also provides a web-enabled visualization of the inheritance.

Hensley, Zachary P [ORNL; Sanyal, Jibonananda [ORNL; New, Joshua Ryan [ORNL

2013-08-01T23:59:59.000Z

296

Seafloor anchoring for platforms in the Messina Strait  

E-Print Network [OSTI]

The importance of properly designing and selecting an anchor is key to reliable techniques for floating offshore platforms including power generation from marine currents. Numerous studies have demonstrated how the uplift ...

Manno, Antonioluca

2010-01-01T23:59:59.000Z

297

An architectural selection framework for data fusion in sensor platforms  

E-Print Network [OSTI]

The role of data fusion in sensor platforms is becoming increasingly important in various domains of science, technology and business. Fusion pertains to the merging or integration of information towards an enhanced level ...

Mirza, Atif R

2007-01-01T23:59:59.000Z

298

Design and implementation of an automated battery management platform  

E-Print Network [OSTI]

This thesis describes the design and the implementation of the hardware platform for automated battery management with battery changing/charging capability for autonomous UAV missions with persistency requirement that ...

Toksoz, Tuna

2012-01-01T23:59:59.000Z

299

Acoustic classification of buried objects with mobile sonar platforms  

E-Print Network [OSTI]

In this thesis, the use of highly mobile sonar platforms is investigated for the purpose of acoustically classifying compact objects on or below the seabed. The extension of existing strategies, including synthetic aperture ...

Edwards, Joseph Richard, 1971-

2006-01-01T23:59:59.000Z

300

Fluidics platform and method for sample preparation and analysis  

DOE Patents [OSTI]

Herein provided are fluidics platform and method for sample preparation and analysis. The fluidics platform is capable of analyzing DNA from blood samples using amplification assays such as polymerase-chain-reaction assays and loop-mediated-isothermal-amplification assays. The fluidics platform can also be used for other types of assays and analyzes. In some embodiments, a sample in a sealed tube can be inserted directly. The following isolation, detection, and analyzes can be performed without a user's intervention. The disclosed platform may also comprises a sample preparation system with a magnetic actuator, a heater, and an air-drying mechanism, and fluid manipulation processes for extraction, washing, elution, assay assembly, assay detection, and cleaning after reactions and between samples.

Benner, W. Henry; Dzenitis, John M.; Bennet, William J.; Baker, Brian R.

2014-08-19T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Communication centric platforms for future high data intensive applications   

E-Print Network [OSTI]

The notion of platform based design is considered as a viable solution to boost the design productivity by favouring reuse design methodology. With the scaling down of device feature size and scaling up of design complexity, ...

Ahmad, Balal

302

Seletos 1 COMPARING NATIVE AND CROSS-PLATFORM DEVELOPMENT TABLET  

E-Print Network [OSTI]

like animations, touch sensors, button interaction and sound output all help to hold the attention..............................................................................................4 2 Background.1.1 Multi-Platform Development Environment.................................6 2.2 Autism Background

Miles, Will

303

A Knowledge Management Platform for Documentation of Case Reports in  

E-Print Network [OSTI]

A Knowledge Management Platform for Documentation of Case Reports in Pharmacovigilance Florence systematic reviews are needed, there is little guidance on how systematic documentation of drug adverse documentation of pharmacovigilance case reports for the pharmaceutical industry and regulatory authorities

Paris-Sud XI, Université de

304

MICRO AND NANO SCIENCE PLATFORM Annual Report 2010  

E-Print Network [OSTI]

contributing to the development of novel technology in this area. The Platform is stra- tegically directed hierarchical levels. Especially, SMEs should stronger benefit from ETH strengths. #12;4 Future innovations need

Sandoghdar, Vahid

305

VOLTTRON: An Agent Execution Platform for the Electric Power System  

SciTech Connect (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

306

Platform-independent method for computer aided schematic drawings  

DOE Patents [OSTI]

A CAD/CAM method is disclosed for a computer system to capture and interchange schematic drawing and associated design information. The schematic drawing and design information are stored in an extensible, platform-independent format.

Vell, Jeffrey L. (Slingerlands, NY); Siganporia, Darius M. (Clifton Park, NY); Levy, Arthur J. (Fort Lauderdale, FL)

2012-02-14T23:59:59.000Z

307

Architecture, Platforms and Integration Information Services and Technology  

E-Print Network [OSTI]

Architecture, Platforms and Integration Information Services and Technology March 1, 2013 Bill Jon Broshious Systems Integration & Architecture George Atala Joel Henderson Lito Tejada Bernard Wong Tamer Sakr Developer Toolkit Karin Bliman Mary Washburn Enterprise Architecture Consulting Russell

Walker, Matthew P.

308

Development and optimization of high-throughput zebrafish screening platform  

E-Print Network [OSTI]

The high-throughput zebrafish screening platform is a revolutionary tool that enables subcellular precision in vivo whole animal screening of Danio Rerio. It can perform laser surgery and/or imaging in less than twenty ...

Koo, Bryan Kyo

2010-01-01T23:59:59.000Z

309

Responses of an articulated loading platform in waves and currents  

E-Print Network [OSTI]

The responses of an articulated loading platform (ALP) in regular and irregular unidirectional waves (with or without currents) are investigated both in frequency and time domain. The first- and second-order wave diffraction radiation are solved...

Ran, Zhihuang

1993-01-01T23:59:59.000Z

310

Development of a microfluidic platform for integrated DNA sequencing protocols  

E-Print Network [OSTI]

This thesis describes the design and development of a microfluidic platform to reduce costs and improve the quality of in the DNA sequencing methodology currently implemented at the Broad Institute in Cambridge, Massachusetts. ...

Kumar, Mayank, S.M. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

311

A Functional Test Platform for the Community Land Model  

SciTech Connect (OSTI)

A functional test platform is presented to create direct linkages between site measurements and the process-based ecosystem model within the Community Earth System Models (CESM). The platform consists of three major parts: 1) interactive user interfaces, 2) functional test model and 3) observational datasets. It provides much needed integration interfaces for both field experimentalists and ecosystem modelers to improve the model s representation of ecosystem processes within the CESM framework without large software overhead.

Xu, Yang [ORNL] [ORNL; Thornton, Peter E [ORNL] [ORNL; King, Anthony Wayne [ORNL] [ORNL; Steed, Chad A [ORNL] [ORNL; Gu, Lianhong [ORNL] [ORNL; Schuchart, Joseph [ORNL] [ORNL

2014-01-01T23:59:59.000Z

312

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple |Department of Energy

313

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthenticationEnergy

314

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of

315

Blade platform seal for ceramic/metal rotor assembly  

DOE Patents [OSTI]

A combination ceramic and metal turbine rotor for use in high temperature gas turbine engines includes a metal rotor disc having a rim with a plurality of circumferentially spaced blade root retention slots therein to receive a plurality of ceramic blades, each including side platform segments thereon and a dovetail configured root slidably received in one of the slots. Adjacent ones of the platform segments including edge portions thereon closely spaced when the blades are assembled to form expansion gaps in an annular flow surface for gas passage through the blades and wherein the assembly further includes a plurality of unitary seal members on the rotor connected to its rim and each including a plurality of spaced, axially extending, flexible fingers that underlie and conform to the edge portions of the platform segments and which are operative at turbine operating temperatures and speeds to distribute loading on the platform segments as the fingers are seated against the underside of the blade platforms to seal the gaps without undesirably stressing thin web ceramic sections of the platform.

Wertz, John L. (Indianapolis, IN)

1982-01-01T23:59:59.000Z

316

Mission-Critical Platform for Online Transaction Processing (OLTP) SQL Server 2008 Mission-Critical Platform for OLTP Data Solutions  

E-Print Network [OSTI]

Mission-Critical Platform for Online Transaction Processing (OLTP) SQL Server 2008 Mission Data Collector to troubleshoot and tune SQL Server 2008 instances. Help ensure compliance 2008 high- performance query processing engine for industry leading performance and scalability. Define

Bernstein, Phil

317

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #23, April-June 2009  

SciTech Connect (OSTI)

April to June, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

Schell, D.

2009-08-01T23:59:59.000Z

318

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #24, July-September 2009  

SciTech Connect (OSTI)

July to September, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

Schell, D.

2009-10-01T23:59:59.000Z

319

Temperature measurement in the Intel Efraim Rotem Mobile Platform Group, Intel corporation  

E-Print Network [OSTI]

, Intel corporation Jim Hermerding ­ Mobile platform Group, Intel corporation Cohen Aviad - Microprocessor

Paris-Sud XI, Université de

320

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #22, January - March 2009  

SciTech Connect (OSTI)

January to March, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

Not Available

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #20, July-September 2008  

SciTech Connect (OSTI)

July to September, 2008 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

Schell, D. J.

2008-12-01T23:59:59.000Z

322

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #25, October - December 2009  

SciTech Connect (OSTI)

October to December, 2009 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter.

Schell, D.

2010-01-01T23:59:59.000Z

323

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

324

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

Alger, T.W.

1994-09-06T23:59:59.000Z

325

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

326

Modular turbine airfoil and platform assembly with independent root teeth  

DOE Patents [OSTI]

A turbine airfoil (22E-H) extends from a shank (23E-H). A platform (30E-H) brackets or surrounds a first portion of the shank (23E-H). Opposed teeth (33, 35) extend laterally from the platform (30E-H) to engage respective slots (50) in a disk. Opposed teeth (25, 27) extend laterally from a second portion of the shank (29) that extends below the platform (30E-H) to engage other slots (52) in the disk. Thus the platform (30E-H) and the shank (23E-H) independently support their own centrifugal loads via their respective teeth. The platform may be formed in two portions (32E-H, 34E-H), that are bonded to each other at matching end-walls (37) and/or via pins (36G) passing through the shank (23E-H). Coolant channels (41, 43) may pass through the shank beside the pins (36G).

Campbell, Christian X; Davies, Daniel O; Eng, Darryl

2013-07-30T23:59:59.000Z

327

Dolomitization by ground-water flow systems in carbonate platforms  

SciTech Connect (OSTI)

Dolomite occurs throughout the subsurface of modern carbonate platforms such as the Bahamas. Groundwater flow systems must be responsible for delivery of reactants needed for dolomitization. Reflux, freshwater lens flows, and thermal convection are large-scale flow systems that may be widespread in active platforms. The author has evaluated some aspects of the dynamics and characteristics of these processes with ground-water flow theory and by scaled sandbox experiments. Reflux is not restricted to hypersaline brines, but can occur with bankwaters of only slightly elevated salinity such as those found on the Bahama Banks today (42%). The lack of evaporites in a stratigraphic section, therefore, does not rule out the possibility that reflux may have operated. Flows associated with freshwater lenses include flow in the lens, in the mixing zone, and in the seawater beneath and offshore of the lens. Upward transfer of seawater through the platform margins occurs when surrounding cold ocean water migrates into the platform and is heated. This type of thermal convection (Kohout convection) has been studied by Francis Kohout in south Florida. The ranges of mass flux of magnesium in these processes are all comparable and are all sufficient to account for young dolomites beneath modern platforms. Each process yields dolomitized zones of characteristic shape and location and perhaps may be distinguishable in ancient rocks. The concepts presented here may have application to exploration for dolomite reservoirs in the Gulf Coast and elsewhere.

Simms, M.

1984-09-01T23:59:59.000Z

328

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

329

The role of redundancy in jacket-type offshore platforms  

E-Print Network [OSTI]

THE ROLE OF REDUNDANCY IN L7ACKET-TYPE OFFSHORE PLATFORMS A Thesis by J ' NINA ELAINE WOMB LE Submitted to the Office of Graduate Studies of Texas AiIM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE... December 1988 Major Subject: Civil Engineering THE ROLE OF REDUNDANCY IN JACKET-TYPE OFFSHORE PLATFORMS A Thesis by J'NINA ELAINE WOMDLE Approved as to sty1e and content by: James K. on, Jr. (Chair o ommittee) erry L, Kohutek (Member) arry A...

Womble, J'nina Elaine

2012-06-07T23:59:59.000Z

330

A High-Altitude, Station-Keeping Astronomical Platform  

E-Print Network [OSTI]

Several commercial telecommunication ventures together with a well funded US military program make it a likely possibility that an autonomous, high-altitude, light-than-air (LTA) vehicle which could maneuver and station-keep for weeks to many months will be a reality in a few years. Here I outline how this technology could be used to develop a high-altitude astronomical observing platform which could return high-resolution optical data rivaling those from space-based platforms but at a fraction of the cost.

Robert A. Fesen

2006-06-15T23:59:59.000Z

331

A High-Altitude, Station-Keeping Astronomical Platform  

E-Print Network [OSTI]

Several commercial telecommunication ventures together with a well funded US military program make it a likely possibility that an autonomous, high-altitude, light-than-air (LTA) vehicle which could maneuver and station-keep for weeks to many months will be a reality in a few years. Here I outline how this technology could be used to develop a high-altitude astronomical observing platform which could return high-resolution optical data rivaling those from space-based platforms but at a fraction of the cost.

Fesen, R A

2006-01-01T23:59:59.000Z

332

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

333

A Multiple Procedure DDT  

E-Print Network [OSTI]

This Memo. Describes a version of DDT used as the command level of the A.I. Group PDP-6 Time Sharing System (ITS). Special features include capability to handle multiple jobs, ability to stop open read or write references ...

Knight, Thomas

1968-01-01T23:59:59.000Z

334

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

335

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

336

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

337

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

338

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

339

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

340

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

342

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

343

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

344

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

345

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

346

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

347

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

348

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

349

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Université de

350

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

351

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

352

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

353

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

354

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

355

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

356

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

357

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

358

Environmental Tracers for Determining Water Resource Vulnerability to Climate Change  

SciTech Connect (OSTI)

Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

Singleton, M

2009-07-08T23:59:59.000Z

359

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

360

Multiple stage multiple filter hydrate store  

DOE Patents [OSTI]

An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

Bjorkman, H.K. Jr.

1983-05-31T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Solar: An Open Platform for Context-Aware Mobile Applications  

E-Print Network [OSTI]

Solar: An Open Platform for Context-Aware Mobile Applications Guanling Chen and David Kotz Dept the user state and the physical and computational environ- ment in which they run. Solar is a middleware into the in- frastructure, Solar allows applications to run on thin mo- bile clients more effectively

Kotz, David

362

A Mobile Social Network on ESP: an Egocentric Social Platform  

E-Print Network [OSTI]

competition and innovation as well. This paper proposes an open system called the Egocentric Social Plat- formA Mobile Social Network on ESP: an Egocentric Social Platform T. J. Purtell Ian Vo Monica S. Lam,ianvo,lam@cs.stanford.edu} Abstract. Social networks today are social intranets: the entire social graph and all the information

Straight, Aaron

363

Title: Experimental Platform for Novel Distributed Microgrids Control Solutions  

E-Print Network [OSTI]

Title: Experimental Platform for Novel Distributed Microgrids Control Solutions Principal Investigator: Wenxin Liu Sponsor: U.S. Department of Defense Office of Naval Research Summary: Microgrid can, and can operate autonomously without connecting to power grid. The microgrid concept is a big step toward

Johnson, Eric E.

364

Matched Public PUF: Ultra Low Energy Security Platform  

E-Print Network [OSTI]

Matched Public PUF: Ultra Low Energy Security Platform Saro Meguerdichian and Miodrag Potkonjak that cannot be matched with any third such module. Each device enables rapid, low-energy computation of ultra and energy costs and enables a majority of security protocols to be completed in a single or a few clock

Potkonjak, Miodrag

365

ORIGINAL PAPER Flexible product platforms: framework and case study  

E-Print Network [OSTI]

a platform design process in response to such future uncertainty. The process consists of seven iterative demand, and speci- fication changes. We show how embedding flexibility suppresses change propagation customers through high product variety. This demanded a corresponding decrease in development time

de Weck, Olivier L.

366

Measuring air pollution using a mobile, bicycle-based platform  

E-Print Network [OSTI]

Measuring air pollution using a mobile, bicycle-based platform Steve Hankey University-walkability Physical activity Air pollution 2 #12;Approach: Mobile, bicycle-based sampling Air pollution measurements.5BlackCarbon Low PollutionHigh Pollution Franklin Ave S, 130,000 pt/cc 8th St S, 19.8 µg/m3 Franklin Ave

Minnesota, University of

367

Secure Embedded Platform for Networked Automotive M. Gomathisankaran  

E-Print Network [OSTI]

Secure Embedded Platform for Networked Automotive Systems M. Gomathisankaran Dept. of Computer University of North Texas 1 Introduction Modern automotive systems contain numerous electronic sensors automotive systems, is a challenge for our generation. Our focus in this position paper is on the security

Rajkumar, Ragunathan "Raj"

368

INTERACTION PLATFORM-ORIENTED PERSPECTIVE IN DESIGNING NOVEL APPLICATIONS  

E-Print Network [OSTI]

of exploring possible exploitation of new technologies and subsequent invention of novel usage scenarios. Smeaton CLARITY: Centre for Sensor Web Technologies Dublin City University, Ireland The lack of HCI computational technologies. These include new media platforms such as mobiles, interactive TV, tabletops

Lee, Hyowon

369

Design Document for Control Dewar and Vacuum Pump Platforms  

SciTech Connect (OSTI)

This engineering note documents the design of the control dewar and vacuum pump platform that is to be installed on the D-Zero detector. It's purpose is twofold. Firstly it is a summary and repository of the final design calculations of the structure. Secondly, it documents that design follows the American Institute of Steel Construction (AISC) manual and applicable OSHA requirements with respect to walking working surfaces. The information contained in the main body of this note is supported by raw calculations included as the appendix. The platform is a truss type frame strucrure constructed primarily of rectangular steel tubing. The upper platform is for support of the control dewar (cryogenic/electrical interface for the solenoid), visible light photon counter (VLPC) cryogenic bayonet can, and infrequently, personnel during the connection and disconnection of the detector to building services. Figure 1 shows a layout of the structure as mounted on the detector and with the installed equipment. The connection of the platform to the detector is not conventional. Two main booms cantilever the structure to a location outside of the detector. The mounting location and support booms allow for the uninhibited motion of the detector components.

Rucinksi, R.; /Fermilab

1997-08-27T23:59:59.000Z

370

INERTIAL MEASUREMENT UNIT CALIBRATION PLATFORM John J. Hall  

E-Print Network [OSTI]

in the angular roll, pitch, and yaw motions. Vertical motion is also included to test the systems are developing an electromechanical system for the calibration of an inertial measurement unit (IMU) using global positioning system (GPS) antennas. The GPS antennas and IMU are mounted to a common platform to be oriented

Williams II, Robert L.

371

A Methodology for Energy Efficient Application Synthesis Using Platform FPGAs  

E-Print Network [OSTI]

Cs (System- on-a-Chip) and configurable SoCs (CSoCs). Examples of such de- vices are OMAP processors [11] and Triscend CSoCs [12]. The var- ious components on platform FPGAs are immersed in multi-million gate of the software programs. For general purpose SoCs and CSoCs, such communication channels between processors

Prasanna, Viktor K.

372

Hydrothermal Dolomites in the Early Albian (Cretaceous) Platform Carbonates  

E-Print Network [OSTI]

Hydrothermal Dolomites in the Early Albian (Cretaceous) Platform Carbonates (NW Spain): Nature carbonates de la plate-forme albienne précoce (Crétacé; NO de l'Espagne): nature et origine des dolomies et trouvent dans les carbonates albiens, déposés dans le bassin Basque-Cantabrique suite à une subsidence

Paris-Sud XI, Université de

373

Fluorescent Sensors for Zn2+ Based on a Fluorescein Platform  

E-Print Network [OSTI]

Fluorescent Sensors for Zn2+ Based on a Fluorescein Platform: Synthesis, Properties fluorescent sensors for Zn2+ that utilize fluorescein as a reporting group, Zinpyr-1 and Zinpyr-2, have been. Both Zinpyr sensors have excitation and emission wavelengths in the visible range (500 nm

Tsien, Roger Y.

374

TROPIC: Transactional Resource Orchestration Platform In the Cloud  

E-Print Network [OSTI]

TROPIC: Transactional Resource Orchestration Platform In the Cloud Changbin Liu, Yun Mao*, Xu Chen ­ InfrastructureasaService (IaaS) Cloud · Provide cloud infrastructure services: virtual machines (VMs), virtual block devices, VPNs · Widely adopted, e.g. Amazon Elastic Compute Cloud (EC2) ­ Cloud resource

Plotkin, Joshua B.

375

Towards CORBAbased Enterprise Management: Managing CORBAbased Systems with SNMP Platforms  

E-Print Network [OSTI]

of different management architectures. The aim of the work described in this paper con­ sists in helping1 Towards CORBA­based Enterprise Management: Managing CORBA­based Systems with SNMP Platforms, CA, USA, November 1998 Abstract--- Apart from the well established OSI/TMN and Internet management

376

Multicore Platforms for Scientific Computing: Cell BE and NVIDIA Tesla  

E-Print Network [OSTI]

Multicore Platforms for Scientific Computing: Cell BE and NVIDIA Tesla J. Fern´andez, M.E. Acacio Tesla computing solutions. The former is a re- cent heterogeneous chip-multiprocessor (CMP) architecture, multicore, Cell BE, NVIDIA Tesla, CUDA 1 Introduction Nowadays, multicore architectures are omnipresent

Acacio, Manuel

377

A SIP-based Home Automation Platform: an Experimental Study  

E-Print Network [OSTI]

A SIP-based Home Automation Platform: an Experimental Study Benjamin Bertran, Charles Consel INRIA automation applications that consist of heterogeneous, distributed entities. We describe how SIP fulfills the requirements of home automation; we present the resulting architecture of a home automation system; and, we

Boyer, Edmond

378

An analysis and hypothesis generation platform for heterogeneous cancer  

E-Print Network [OSTI]

An analysis and hypothesis generation platform for heterogeneous cancer databases. Philip Roy QUINLAN a,1, Alastair THOMPSON a and Chris REED b a Dundee Cancer Centre, University of Dundee, Ninewells Hospital, Dundee b School of Computing, University of Dundee, Dundee Abstract. The field of cancer research

Reed, Chris

379

Plans and Aspirations for Sensor and Platform Development  

E-Print Network [OSTI]

. Am., 281(1), 1999 For a hydrogen-oxygen fuel cell Hydrocycle® fuel cell from Manhattan Scientific #12 Engines Fuel Cells Courtesy Webb Research Corp. (top) & Dr C Eriksen, U. Washington (centre & bottom Requirements Driven Open Standards Low Drag shapes Adv. Secondary Cells Fuel Cells Identifying Platform

Griffiths, Gwyn

380

A Knowledge Management Platform for Infrastructure Performance Modeling  

E-Print Network [OSTI]

Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability, utilization, evaluation and selection of performance models. Thus, the objective of the study is to build the capabilities of their own models. The platform advances infrastructure performance modeling because analysts

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A New Motorcycle Simulator Platform: Mechatronics Design, Dynamics Modeling  

E-Print Network [OSTI]

A New Motorcycle Simulator Platform: Mechatronics Design, Dynamics Modeling and Control L. Nehaoua of these techniques to other simulators (cars and motorcycles) is possible but not direct. Indeed, the dynamics motorcycle driving simulators were build. The first prototype was developed by Honda in 1988

Paris-Sud XI, Université de

382

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

383

A Probabilistic Deformation Demand Model and Fragility Estimates for Asymmetric Offshore Jacket Platforms  

E-Print Network [OSTI]

Interest in evaluating the performance and safety of offshore oil and gas platforms has been expanding due to the growing world energy supply and recent offshore catastrophes. In order to accurately assess the reliability of an offshore platform...

Fallon, Michael Brooks

2012-11-12T23:59:59.000Z

384

Costing commonality : evaluating the impact of platform divergence on internal investment returns  

E-Print Network [OSTI]

Platforming has become an important means of cost-sharing among industrial products. However, recent research has shown that many firms face systemic downward pressure on commonality, with the result that many platforms ...

Cameron, Bruce G. (Bruce Gregory)

2011-01-01T23:59:59.000Z

385

E-Print Network 3.0 - all-terrain mobile platform Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mobile platform Search Powered by Explorit Topic List Advanced Search Sample search results for: all-terrain mobile platform Page: << < 1 2 3 4 5 > >> 1 Susanne Boll, Universitt...

386

Benefits and applications of commonality and platforming in the oil and gas industry  

E-Print Network [OSTI]

Platforming, the sharing of parts, processes, knowledge, and technologies, across products and projects has proven to be an effective way for firms to reduce their costs. While platforming is now common in many consumer ...

Rajwani, Shakeel

2014-01-01T23:59:59.000Z

387

Highly configurable platforms for embedded computing systems Frank Vahida,*, Roman Lyseckya  

E-Print Network [OSTI]

Highly configurable platforms for embedded computing systems Frank Vahida,*, Roman Lyseckya 92521, USA Abstract Platform chips, which are pre-designed chips possessing numerous processors energy; Cache; Hardware/software partitioning; Architecture tuning 1. Introduction Integrated circuit (IC

Vahid, Frank

388

Refactored M13 Bacteriophage as a Platform for Tumor Cell Imaging and Drug Delivery  

E-Print Network [OSTI]

M13 bacteriophage is a well-characterized platform for peptide display. The utility of the M13 display platform is derived from the ability to encode phage protein fusions with display peptides at the genomic level. However, ...

Ghosh, Debadyuti

389

OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction Validation (OPPSDIV) OTEC Cold Water Pipe-Platform Sub-System Dynamic Interaction Validation (OPPSDIV) OTEC Cold Water...

390

DOCUMENTATION, DEPLOYMENT AND EXTENSION OF A VERSATILE AND RAPIDLY RECONFIGURABLE UAV GNC RESEARCH PLATFORM  

E-Print Network [OSTI]

Available UAV Reseach Platforms . . . . . . . . . . . . . .Free and Open Source Software UAV Systems . . . . . . . . .Cruz Low-cost UAV GNC System . . . . . . . . . . . . . . . .

Toepke, Samuel Lee

2012-01-01T23:59:59.000Z

391

On the Importance of Bandwidth Control Mechanisms for Scheduling on Large Scale Heterogeneous Platforms  

E-Print Network [OSTI]

on platforms like BOINC [1] or Folding@home [18]. These tasks will be processed by slave nodes, whose both

Paris-Sud XI, Université de

392

National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #9, October-December 2005  

SciTech Connect (OSTI)

Volume 9 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

Schell, D. J.

2006-01-01T23:59:59.000Z

393

National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #10, January-March 2006  

SciTech Connect (OSTI)

Volume 10 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

Not Available

2006-04-01T23:59:59.000Z

394

National Bioenergy Center Biochemical Platform Process Integration Project: Quarterly Update #18, January-March 2008  

SciTech Connect (OSTI)

January-March, 2008 edition of the quarterly update for the National Bioenergy Center's Biochemical Platform Integration Project.

Schell, D.

2008-04-01T23:59:59.000Z

395

National Bioenergy Center Sugar Platform Integration Project: Quarterly Update #12, July-September 2006  

SciTech Connect (OSTI)

Volume 12 of a quarterly newsletter that describes the activities of the National Bioenergy Center's Sugar Platform Integration Project.

Schell, D.

2006-10-01T23:59:59.000Z

396

National Bioenergy Center Biochemical Platform Integration Project: Quarterly Update #21, October - December 2008  

SciTech Connect (OSTI)

October to December, 2008 edition of the National Bioenergy Center?s Biochemical Platform Integration Project quarterly newsletter.

Schell, D.

2009-01-01T23:59:59.000Z

397

ATLAS MOTION PLATFORM MECANUM WHEEL JACOBIAN IN THE VELOCITY AND STATIC FORCE DOMAINS  

E-Print Network [OSTI]

ATLAS MOTION PLATFORM MECANUM WHEEL JACOBIAN IN THE VELOCITY AND STATIC FORCE DOMAINS Jonathan J applications. Atlas is a six degree of freedom vehicle op- erating training simulator motion platform where and static force Jacobians; normal forces. JACOBIAN DES ROUES MECANUM DU PLATFORME DE MOTION ATLAS DANS LES

Hayes, John

398

The Architecture of the Nehalem Processor Nehalem-EP SMP Platforms  

E-Print Network [OSTI]

The Architecture of the Nehalem Processor and Nehalem-EP SMP Platforms Michael E. Thomadakis, Ph technology. Nehalem micro-architectures and system platforms employ a number of state-of-the-art technologies of interest. This report discusses technical details of the Nehalem µ-architecture and platforms

399

API Blender: A Uniform Interface to Social Platform APIs Georges Gouriten  

E-Print Network [OSTI]

Web, API, REST, data integration 1. INTRODUCTION Interacting with platforms like Facebook, YoutubeAPI Blender: A Uniform Interface to Social Platform APIs Georges Gouriten Institut Télécom; Télécom one social Web platform, which implies studying the related API specifications. These are often only

Senellart, Pierre

400

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Polycrystal Plasticity -Multiple Slip"  

E-Print Network [OSTI]

Polycrystal Plasticity - Multiple Slip" 27-750 Texture, Microstructure & Anisotropy A.D. Rollett;2 Objective" The objective of this lecture is to show how plastic deformation in polycrystals requires of Los Alamos polycrystal plasticity, LApp; also the Viscoplastic Selfconsistent code, VPSC; also

Rollett, Anthony D.

402

Simulator platform for fast reactor operation and safety technology demonstration  

SciTech Connect (OSTI)

A simulator platform for visualization and demonstration of innovative concepts in fast reactor technology is described. The objective is to make more accessible the workings of fast reactor technology innovations and to do so in a human factors environment that uses state-of-the art visualization technologies. In this work the computer codes in use at Argonne National Laboratory (ANL) for the design of fast reactor systems are being integrated to run on this platform. This includes linking reactor systems codes with mechanical structures codes and using advanced graphics to depict the thermo-hydraulic-structure interactions that give rise to an inherently safe response to upsets. It also includes visualization of mechanical systems operation including advanced concepts that make use of robotics for operations, in-service inspection, and maintenance.

Vilim, R. B.; Park, Y. S.; Grandy, C.; Belch, H.; Dworzanski, P.; Misterka, J. (Nuclear Engineering Division)

2012-07-30T23:59:59.000Z

403

A microfluidic platform for high-throughput multiplexed protein quantitation  

E-Print Network [OSTI]

We present a high-throughput microfluidic platform capable of quantitating up to 384 biomarkers in 4 distinct samples by immunoassay. The microfluidic device contains 384 unit cells, which can be individually programmed with pairs of capture and detection antibody. Samples are quantitated in each unit cell by four independent MITOMI detection areas, allowing four samples to be analyzed in parallel for a total of 1,536 assays per device. We show that the device can be pre-assembled and stored for weeks at elevated temperature and we performed proof-of-concept experiments simultaneously quantitating IL-6, IL-1\\b{eta}, TNF-{\\alpha}, PSA, and GFP. Finally, we show that the platform can be used to identify functional antibody combinations by screening 64 antibody combinations requiring up to 384 unique assays per device.

Volpetti, Francesca; Maerkl, Sebastian

2014-01-01T23:59:59.000Z

404

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

405

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

406

Development of a Very Dense Liquid Cooled Compute Platform  

SciTech Connect (OSTI)

The objective of this project was to design and develop a prototype very energy efficient high density compute platform with 100% pumped refrigerant liquid cooling using commodity components and high volume manufacturing techniques. Testing at SLAC has indicated that we achieved a DCIE of 0.93 against our original goal of 0.85. This number includes both cooling and power supply and was achieved employing some of the highest wattage processors available.

Hughes, Phillip N.; Lipp, Robert J.

2013-12-10T23:59:59.000Z

407

LEDSGP/about/regional-platforms | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools <Platform

408

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

409

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

410

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

411

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

412

REopt: A Platform for Energy System Integration and Optimization: Preprint  

SciTech Connect (OSTI)

REopt is NREL's energy planning platform offering concurrent, multi-technology integration and optimization capabilities to help clients meet their cost savings and energy performance goals. The REopt platform provides techno-economic decision-support analysis throughout the energy planning process, from agency-level screening and macro planning to project development to energy asset operation. REopt employs an integrated approach to optimizing a site?s energy costs by considering electricity and thermal consumption, resource availability, complex tariff structures including time-of-use, demand and sell-back rates, incentives, net-metering, and interconnection limits. Formulated as a mixed integer linear program, REopt recommends an optimally-sized mix of conventional and renewable energy, and energy storage technologies; estimates the net present value associated with implementing those technologies; and provides the cost-optimal dispatch strategy for operating them at maximum economic efficiency. The REopt platform can be customized to address a variety of energy optimization scenarios including policy, microgrid, and operational energy applications. This paper presents the REopt techno-economic model along with two examples of recently completed analysis projects.

Simpkins, T.; Cutler, D.; Anderson, K.; Olis, D.; Elgqvist, E.; Callahan, M.; Walker, A.

2014-08-01T23:59:59.000Z

413

Lightweight Integrated Optical Sensor for Atmospheric Measurements on Mobile Platforms  

SciTech Connect (OSTI)

The goal of the Phase I program was to develop a novel open path sensor platform technology based on integration of semiconductor waveguides with efficient optoelectronic components on a monolithic platform. The successful Phase I effort resulted in demonstration of a novel optical resonator structure based on semiconductor high contrast gratings (HCGs) that will enable implementation of an ultra-compact, low-power gas sensor suitable for use on mobile platforms. Extensive numerical modeling was performed to design a device optimized for measuring CO2 at a wavelength for which a laser was available for proof of concept. Devices were fabricated and tested to match the target wavelength, angle, and operating temperature. This demonstration is the first implementation of HCGs at the wavelengths of interest and shows the flexibility of the proposed architecture for gas sensing applications. The measured cavity Q was lower than anticipated due to fabrication process challenges. The PSI and UC Berkeley team has identified solutions to these challenges and will produce optimized devices in a Phase II program where a prototype sensor will be fabricated and tested.

Parameswaran, Krishnan R. [Physical Sciences Inc.

2013-12-02T23:59:59.000Z

414

The ASSESS (Analytic System and Software for Evaluating Safeguards and Security) Outsider module with multiple analyses  

SciTech Connect (OSTI)

The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) includes modules for analyzing vulnerabilities against outsider and insider adversaries. The ASSESS Outsider Analysis Module has been upgraded to allow for defining, analyzing, and displaying the results of multiple analyses. Once a set of threat definitions have been defined in one Outsider file, they can be readily copied to other Outsider files. This multiple analysis, or batch, mode of operation provides an efficient way of covering the standard DOE outsider threat spectrum. A new approach for coupling the probability of interruption, P(I), values and values calculated by the ASSESS Neutralization module has been implemented in Outsider and is described. An enhanced capability for printing results of these multiple analyses is also included in the upgraded Outside module. 7 refs., 7 figs., 1 tab.

Snell, M.K.; Winblad, A.E. (Sandia National Labs., Albuquerque, NM (USA)); Bingham, B.; Key, B.; Walker, S. (Science and Engineering Associates, Inc., Albuquerque, NM (USA))

1990-01-01T23:59:59.000Z

415

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

416

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

417

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

418

Application and Removal of Strippable Coatings via Remote Platform - 13133  

SciTech Connect (OSTI)

Florida International University's (FIU's) Applied Research Center is currently supporting the Department of Energy (DOE) Environmental Management Office of D and D and Facility Engineering program. FIU is supporting DOE's initiative to improve safety, reduce technical risks, and limit uncertainty within D and D operations by identifying technologies suitable to meet specific facility D and D requirements, assessing the readiness of those technologies for field deployment, and conducting feasibility studies and technology demonstrations of selected technologies and working with technology vendors to optimize the design of their current technologies to accomplish dangerous and demanding tasks during D and D operations. To meet one identified technology gap challenge for a technology to remotely apply strippable coatings, fixatives and decontamination gels, FIU identified and performed an initial demonstration of an innovative remote fixative sprayer platform from International Climbing Machines (ICM). The selected technology was demonstrated spraying fixative products at the hot cell mockup facility at the Applied Research Center at FIU in November 2008 under cold (non-radioactive) conditions. The remotely controlled platform was remotely operated and entered the facility and sprayed a fixative onto horizontal and vertical surfaces. Based on the initial FIU demonstration and the specific technical requirements identified at the DOE facilities, a follow-up demonstration was expanded to include strippable coatings and a decontamination gel, which was demonstrated in June 2010 at the ICM facility in Ithaca, NY. This second technology evaluation documented the ability of the remote system to spray the selected products on vertical stainless steel and concrete surfaces to a height of 3 meters (10 feet) and to achieve sufficient coverage and product thickness to promote the ability to peel/remove the strippable coatings and decontamination gel. The next challenge was to determine if a remote platform could be used to remove the strippable coatings and decontamination gels. In 2012, FIU worked with the technology provider, ICM, to conduct feasibility and trade studies to identify the requirements for the remote removal of strippable coatings or decontamination gels using the existing remote controlled platform. (authors)

Shoffner, P.; Lagos, L. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami, FL 33174 (United States)] [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami, FL 33174 (United States); Maggio, S. [International Climbing Machine, 630 Elmira Road, Ithaca, NY 14850 (United States)] [International Climbing Machine, 630 Elmira Road, Ithaca, NY 14850 (United States)

2013-07-01T23:59:59.000Z

419

Monitoring system including an electronic sensor platform and an interrogation transceiver  

DOE Patents [OSTI]

A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.

Kinzel, Robert L.; Sheets, Larry R.

2003-09-23T23:59:59.000Z

420

Multiple capillary biochemical analyzer  

DOE Patents [OSTI]

A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

Dovichi, N.J.; Zhang, J.Z.

1995-08-08T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

422

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

423

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

424

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

425

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

426

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

427

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

428

Distributed mobile platforms and applications for intelligent transportation systems  

E-Print Network [OSTI]

Smartphones are pervasive, and possess powerful processors, multi-faceted sensing, and multiple radios. However, networked mobile apps still typically use a client-server programming model, sending all shared data queries ...

Gao, Jason Hao

2013-01-01T23:59:59.000Z

429

Cyrenaican platform: structure, stratigraphy, and exploration play concepts  

SciTech Connect (OSTI)

The structural and stratigraphic history of the Cyrenaican platform of eastern Libya is closely related to that of both the Sirte basin and the Western Desert of Egypt. At the end of the Paleozoic Hercynian orogeny, this area comprised the eastern end of the Sirte arch, the precursor of the Sirte basin. When the arch collapsed in the mid-Cretaceous, initiating the Sirte basin, the Cyrenaican area remained relatively high. A northwest-southeast trending high, the Gabboub arch, formed on the platform in the early Mesozoic, dividing the region into three areas: the high itself, a deep on the southwestern flank related to the Sirte basin, and a deep on the northeastern flank, which plunges into the offshore and appears to relate to the downwarped offshore area of the Western Desert of Egypt. Sediments of every age, except Triassic, are found in Cyrenaica. Paleozoic sediments are composed primarily of quartzitic sandstones and shales with lesser amounts of limestone, dolomites, and anhydrites. Mesozoic sediments are a mixture of clastics and carbonates. Cenozoic sediments are predominantly limestones, dolomites, and anhydrites with some sandstones and shales. Environments of deposition range from continental to deep marine. The Cyrenaican area has not been heavily explored and, until recently, no commercial hydrocarbons were found. Drilling on surface structures of some of the first wells in Libya resulted in one Devonian gas well. A reported 5600 BOPD Cretaceous discovery offshore Benghazi in mid-1984 demonstrates that hydrocarbon potential exists where thick sediments have been preserved.

Ross, C.M.; Zegaar, M.N.

1985-02-01T23:59:59.000Z

430

An integrated security framework for GOSS power grid analytics platform  

SciTech Connect (OSTI)

In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

2014-06-23T23:59:59.000Z

431

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

432

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

433

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability   

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

434

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

435

An Estimation and Simulation Framework for Energy Efficient Design using Platform FPGAs  

E-Print Network [OSTI]

An Estimation and Simulation Framework for Energy Efficient Design using Platform FPGAs Sumit modeling technique, domain specific modeling, and a methodology for energy-efficient design of application

Prasanna, Viktor K.

436

E-Print Network 3.0 - alliances simulation platform Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and analysis tool capable of analyzing floating platform concepts for offshore wind turbines. The new modeling... dynamic simulation tool will enable the development of...

437

System level design of power distribution network for mobile computing platforms.  

E-Print Network [OSTI]

??Providing a reliable power distribution network (PDN) is a critical design challenge for mobile system on chip platforms. A well-designed power distribution network should be… (more)

Shayan Arani, Amirali

2011-01-01T23:59:59.000Z

438

E-Print Network 3.0 - automated microarray platform Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

They performed on both platforms triplicate measure- ments for samples from two... mining, an improved statistical treat- ment of ... Source: Leuven, Katholieke Universiteit,...

439

Structure and dynamics of the microbial communities underlying the carboxylate platform for biofuel production  

E-Print Network [OSTI]

carboxylate platform for biofuel production E.B. Hollisterbiomass conversion and biofuel production. Keywords: mixedbiomass conversion and biofuel production. Materials and

Hollister, E.B.

2012-01-01T23:59:59.000Z

440

The development and application of an integrated functional genomics platform in Desulfovibrio desulfuricans G20  

E-Print Network [OSTI]

integrated functional genomics data will be used to build aan integrated functional genomics platform in Desulfovibrioand Environmental Research, Genomics:GTL program through

Deutschbauer, Adam

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

E-Print Network 3.0 - array sensing platform Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in remote sensing applications, where... on a lightweight satellite platform. Even though common approaches for low sidelobe arrays implement a Chebyshev... Beam-Shaping of Planar...

442

Annotated Bibliography: Fisheries Species and Oil/Gas Platforms Offshore California  

E-Print Network [OSTI]

which associate with oil and gas platforms offshoredamaging consequence of oil and gas development. The studycollection was done by oil and gas company personnel who

MBC Applied Environmental Sciences

1987-01-01T23:59:59.000Z

443

Advanced Sorbents as a Versatile Platform for Gas Separation  

SciTech Connect (OSTI)

The program objective was to develop materials and processes for industrial gas separations to reduce energy use and enable waste reduction. The approach chosen combined novel oxygen selective adsorbents and pressure swing adsorption (PSA) processes. Preliminary materials development and process simulation results indicated that oxygen selective adsorbents could provide a versatile platform for industrial gas separations. If fully successful, this new technology offered the potential for reducing the cost of producing nitrogen/oxygen co-products, high purity nitrogen, argon, and possibly oxygen. The potential energy savings for the gas separations are appreciable, but the end users are the main beneficiaries. Lowering the cost of industrial gases expands their use in applications that can employ them for reducing energy consumption and emissions.

Neil Stephenson

2003-09-30T23:59:59.000Z

444

SGP Cloud and Land Surface Interaction Campaign (CLASIC): Measurement Platforms  

SciTech Connect (OSTI)

The Cloud and Land Surface Interaction Campaign (CLASIC) will be conducted from June 8 to June 30, 2007, at the U.S. Department of Energy’s Atmospheric Radiation Measurement (ARM) Climate Research Facility (ACRF) Southern Great Plains (SGP) site. Data will be collected using eight aircraft equipped with a variety of specialized sensors, four specially instrumented surface sites, and two prototype surface radar systems. The architecture of CLASIC includes a high-altitude surveillance aircraft and enhanced vertical thermodynamic and wind profile measurements that will characterize the synoptic scale structure of the clouds and the land surface within the ACRF SGP site. Mesoscale and microscale structures will be sampled with a variety of aircraft, surface, and radar observations. An overview of the measurement platforms that will be used during the CLASIC are described in this report. The coordination of measurements, especially as it relates to aircraft flight plans, will be discussed in the CLASIC Implementation Plan.

MA Miller; R Avissar; LK Berg; SA Edgerton; ML Fischer; TJ Jackson; B. Kustas; PJ Lamb; G McFarquhar; Q Min; B Schmid; MS Torn; DD Tuner

2007-06-01T23:59:59.000Z

445

Evaluation of the Tellabs 1150 GPON multiservice access platform.  

SciTech Connect (OSTI)

For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

Brenkosh, Joseph Peter; Wolf, Jimmie V.

2014-11-01T23:59:59.000Z

446

Quantitative Comparison of the Responses of Three Floating Platforms  

SciTech Connect (OSTI)

This report presents a comprehensive dynamic-response analysis of three offshore floating wind turbine concepts. Models were composed of one 5-MW turbine supported on land and three 5-MW turbines located offshore on a tension leg platform, a spar buoy, and a barge. A loads and stability analysis adhering to the procedures of international design standards was performed for each model using the fully coupled time-domain aero-hydro-servo-elastic design code FAST with AeroDyn and HydroDyn. The concepts are compared based on the calculated ultimate loads, fatigue loads, and instabilities. The results of this analysis will help resolve the fundamental design trade-offs between the floating-system concepts.

Jonkman, J.; Matha, D.

2010-03-01T23:59:59.000Z

447

Energy-Aware Task Partitioning on Heterogeneous Multiprocessor Platforms  

E-Print Network [OSTI]

Efficient task partitioning plays a crucial role in achieving high performance at multiprocessor plat forms. This paper addresses the problem of energy-aware static partitioning of periodic real-time tasks on heterogeneous multiprocessor platforms. A Particle Swarm Optimization variant based on Min-min technique for task partitioning is proposed. The proposed approach aims to minimize the overall energy consumption, meanwhile avoid deadline violations. An energy-aware cost function is proposed to be considered in the proposed approach. Extensive simulations and comparisons are conducted in order to validate the effectiveness of the proposed technique. The achieved results demonstrate that the proposed partitioning scheme significantly surpasses previous approaches in terms of both number of iterations and energy savings.

Saad, Elsayed; Shalan, Mohamed; Elewi, Abdullah

2012-01-01T23:59:59.000Z

448

Technical Basis of Scaling Relationships for the Pretreatment Engineering Platform  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory has been tasked by Bechtel National Inc. (BNI) on the River Protection Project-Waste Treatment Plant (RPP-WTP) project to perform research and development activities. The Pretreatment Engineering Platform (PEP) is being designed and constructed as part of a plan to respond to an issue raised by the WTP External Flowsheet Review Team (EFRT) entitled “Undemonstrated Leaching Processes” and numbered M12. The PEP replicates the WTP leaching process using prototypic equipment and control strategies. The approach for scaling PEP performance data to predict WTP performance is critical to the successful resolution of the EFRT issue. This report describes the recommended PEP scaling approach, PEP data interpretation and provides recommendations on test conduct and data requirements.

Kuhn, William L.; Arm, Stuart T.; Huckaby, James L.; Kurath, Dean E.; Rassat, Scot D.

2008-07-15T23:59:59.000Z

449

Hazard Analysis for the Pretreatment Engineering Platform (PEP)  

SciTech Connect (OSTI)

The Pretreatment Engineering Platform (PEP) is designed to perform a demonstration on an engineering scale to confirm the Hanford Waste Treatment Plant Pretreatment Facility (PTF) leaching and filtration process equipment design and sludge treatment process. The system will use scaled prototypic equipment to demonstrate sludge water wash, caustic leaching, oxidative leaching, and filtration. Unit operations to be tested include pumping, solids washing, chemical reagent addition and blending, heating, cooling, leaching, filtration, and filter cleaning. In addition, the PEP will evaluate potential design changes to the ultrafiltration process system equipment to potentially enhance leaching and filtration performance as well as overall pretreatment throughput. The skid-mounted system will be installed and operated in the Processing Development Laboratory-West at Pacific Northwest National Laboratory (PNNL) in Richland, Washington.

Sullivan, Robin S.; Geeting, John GH; Lawrence, Wesley E.; Young, Jonathan

2008-07-10T23:59:59.000Z

450

Pretreatment Engineering Platform Phase 1 Final Test Report  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory (PNNL) was tasked by Bechtel National Inc. (BNI) on the River Protection Project, Hanford Tank Waste Treatment and Immobilization Plant (RPP-WTP) project to conduct testing to demonstrate the performance of the WTP Pretreatment Facility (PTF) leaching and ultrafiltration processes at an engineering-scale. In addition to the demonstration, the testing was to address specific technical issues identified in Issue Response Plan for Implementation of External Flowsheet Review Team (EFRT) Recommendations - M12, Undemonstrated Leaching Processes.( ) Testing was conducted in a 1/4.5-scale mock-up of the PTF ultrafiltration system, the Pretreatment Engineering Platform (PEP). Parallel laboratory testing was conducted in various PNNL laboratories to allow direct comparison of process performance at an engineering-scale and a laboratory-scale. This report presents and discusses the results of those tests.

Kurath, Dean E.; Hanson, Brady D.; Minette, Michael J.; Baldwin, David L.; Rapko, Brian M.; Mahoney, Lenna A.; Schonewill, Philip P.; Daniel, Richard C.; Eslinger, Paul W.; Huckaby, James L.; Billing, Justin M.; Sundar, Parameshwaran S.; Josephson, Gary B.; Toth, James J.; Yokuda, Satoru T.; Baer, Ellen BK; Barnes, Steven M.; Golovich, Elizabeth C.; Rassat, Scot D.; Brown, Christopher F.; Geeting, John GH; Sevigny, Gary J.; Casella, Amanda J.; Bontha, Jagannadha R.; Aaberg, Rosanne L.; Aker, Pamela M.; Guzman-Leong, Consuelo E.; Kimura, Marcia L.; Sundaram, S. K.; Pires, Richard P.; Wells, Beric E.; Bredt, Ofelia P.

2009-12-23T23:59:59.000Z

451

Alginate based 3D hydrogels as an in vitro co-culture model platform for the toxicity screening of new chemical entities  

SciTech Connect (OSTI)

Prediction of human response to potential therapeutic drugs is through conventional methods of in vitro cell culture assays and expensive in vivo animal testing. Alternatives to animal testing require sophisticated in vitro model systems that must replicate in vivo like function for reliable testing applications. Advancements in biomaterials have enabled the development of three-dimensional (3D) cell encapsulated hydrogels as in vitro drug screening tissue model systems. In this study, we have developed an in vitro platform to enable high density 3D culture of liver cells combined with a monolayer growth of target breast cancer cell line (MCF-7) in a static environment as a representative example of screening drug compounds for hepatotoxicity and drug efficacy. Alginate hydrogels encapsulated with serial cell densities of HepG2 cells (10{sup 5}-10{sup 8} cells/ml) are supported by a porous poly-carbonate disc platform and co-cultured with MCF-7 cells within standard cell culture plates during a 3 day study period. The clearance rates of drug transformation by HepG2 cells are measured using a coumarin based pro-drug. The platform was used to test for HepG2 cytotoxicity 50% (CT{sub 50}) using commercially available drugs which further correlated well with published in vivo LD{sub 50} values. The developed test platform allowed us to evaluate drug dose concentrations to predict hepatotoxicity and its effect on the target cells. The in vitro 3D co-culture platform provides a scalable and flexible approach to test multiple-cell types in a hybrid setting within standard cell culture plates which may open up novel 3D in vitro culture techniques to screen new chemical entity compounds. - Graphical abstract: Display Omitted Highlights: > A porous support disc design to support the culture of desired cells in 3D hydrogels. > Demonstrated the co-culture of two cell types within standard cell-culture plates. > A scalable, low cost approach to toxicity screening involving multiple cell types.

Lan, Shih-Feng [University of Oklahoma Bioengineering Center, University of Oklahoma, Norman, OK 73019 (United States); Starly, Binil, E-mail: starlyb@ou.edu [University of Oklahoma Bioengineering Center, University of Oklahoma, Norman, OK 73019 (United States); School of Industrial Engineering, University of Oklahoma, Norman, OK 73019 (United States)

2011-10-01T23:59:59.000Z

452

A Parallel SoftwarePlatform for Solving Problems of Partial Differential Equations  

E-Print Network [OSTI]

A Parallel Software­Platform for Solving Problems of Partial Differential Equations using of this work is the development of a parallel software­platform for solving partial differential equation methods, various FE and FV discretizations, dynamic load balancing, mapping and grid partitioning. Some

Wieners, Christian

453

An hybrid ensemble based approach for process parameter estimation in offshore oil platforms  

E-Print Network [OSTI]

An hybrid ensemble based approach for process parameter estimation in offshore oil platforms Piero in offshore oil platforms. In particular, the difference between the theoretical value of the valve flow on real measurements performed on a number of similar offshore choke valves. 1. Introduction In this paper

Paris-Sud XI, Université de

454

An e-Learning Platform for SME Manager Upgrade and its Evolution Toward a Distributed  

E-Print Network [OSTI]

An e-Learning Platform for SME Manager Upgrade and its Evolution Toward a Distributed Training and the evaluation of an innovative e-learning platform for manager upgrade in Small and Medium Enterprises (SME but it is more and more true for Small and Medium Enterprises (SME) that often don't have a well defined

Paris-Sud XI, Université de

455

A Simple and Effective Hardware-in-the-Loop Simulation Platform for Urban Electric Vehicles  

E-Print Network [OSTI]

A Simple and Effective Hardware-in-the-Loop Simulation Platform for Urban Electric Vehicles B-in-the-loop simulation of urban electric vehicles. The proposed platform, which is expected to be used for electric is coupled to DC machine-based load torque emulator taking into account the electric vehicle mechanics

Paris-Sud XI, Université de

456

OpenMSI: A High-Performance Web-Based Platform for Mass Spectrometry Imaging  

E-Print Network [OSTI]

OpenMSI: A High-Performance Web-Based Platform for Mass Spectrometry Imaging Oliver RĂĽbel, AnnetteMSI: A High-Performance Web-Based Platform for Mass Spectrometry Imaging Oliver Rubel,* Annette Greiner. Acknowledgements: This work was supported by and used resources of the National Energy Research Scientific

457

Towards the Use of Collaborative Virtual Environments to Crew Unmanned Oil Platforms  

E-Print Network [OSTI]

due to the impossibility of human access or, as is the case of offshore oil platforms, a business challenge to reduce costs and risks. In the case of oil & gas industry, there is still the aggravation462 Towards the Use of Collaborative Virtual Environments to Crew Unmanned Oil Platforms Hugo Fuks

Barbosa, Alberto

458

ATLAS MOTION PLATFORM MECANUM WHEEL JACOBIAN IN THE VELOCITY AND STATIC FORCE DOMAINS  

E-Print Network [OSTI]

ATLAS MOTION PLATFORM MECANUM WHEEL JACOBIAN IN THE VELOCITY AND STATIC FORCE DOMAINS Jonathan J. Atlas is a six degree of freedom vehicle op- erating training simulator motion platform where orienting force Jacobians; normal forces. MATRICE JACOBIENNE DES ROUES MECANUM SIMULATOUR DE MOUVEMENT ATLAS DANS

Hayes, John

459

Raven IITM: Open Platform for Surgical Robotics Research H. Hawkeye King1  

E-Print Network [OSTI]

of Cartesian motion and grasping [6]. A unique feature of the tool is a wrist design that eliminates cableRaven IITM: Open Platform for Surgical Robotics Research H. Hawkeye King1 , Lei Cheng1 , Philip In this paper we present a new platform for surgical robotics research: the Raven IITM. The goal of this work

Rosen, Jacob

460

Mapping pipeline skeletons onto heterogeneous platforms Anne Benoit and Yves Robert  

E-Print Network [OSTI]

Mapping pipeline skeletons onto heterogeneous platforms Anne Benoit and Yves Robert January 2007 mapping of the application. In this paper, we discuss the mapping of pipeline skeletons onto different, Fully Heterogeneous platforms. We assume that a pipeline stage must be mapped on a single processor

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A digital platform for marketing communications in the mobile and social media space  

E-Print Network [OSTI]

A digital platform for marketing communications in the mobile and social media space Otto Petrovic media. Keywords: digital marketing platform, mobile advertising, social media marketing, mobile of communications via mobile messaging with numerous other digital media, e.g. mobile websites, mobile clients for i

Boyer, Edmond

462

ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS  

E-Print Network [OSTI]

ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS Except where School Engineering #12;ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS of the Requirements for the Degree of Doctor of Philosophy Auburn, Alabama August 9, 2008 #12;iii ENERGY-EFFICIENT

Qin, Xiao

463

Mercury: A Wearable Sensor Network Platform for High-fidelity Motion Analysis  

E-Print Network [OSTI]

Mercury: A Wearable Sensor Network Platform for High-fidelity Motion Analysis Konrad Lorincz, Bor This paper describes Mercury, a wearable, wireless sen- sor platform for motion analysis of patients being to previous systems intended for short-term use in a laboratory, Mercury is designed to sup- port long

Chen, Yiling

464

Real Time Biomedical Data Streaming Platform (RIMES): a data-intensive virtual environment  

E-Print Network [OSTI]

Real Time Biomedical Data Streaming Platform (RIMES): a data-intensive virtual environment Kejun@ucsd.edu Abstract - In this paper we present Real tIme bioMEdical data Streaming platform (RIMES), a data of California, San Diego. RIMES extends scientists' desktops to biomedical grid computation resources and mass

Schulze, JĂĽrgen P.

465

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

466

Sublethal Oxygen–Glucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygen–glucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 24–48 hr after sublethal oxygen–glucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

467

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

468

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

469

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

470

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

471

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

472

Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia  

E-Print Network [OSTI]

seismic data and information from several wells across the region were used to map all Wonocolo platforms across the study area. Five growth phases are recognizable in the platforms, based on seismic facies analysis and internal seismic...

Adhyaksawan, Rahadian

2002-01-01T23:59:59.000Z

473

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 29, 2013...

474

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

475

A hardware overview of the RHIC LLRF platform  

SciTech Connect (OSTI)

The RHIC Low Level RF (LLRF) platform is a flexible, modular system designed around a carrier board with six XMC daughter sites. The carrier board features a Xilinx FPGA with an embedded, hard core Power PC that is remotely reconfigurable. It serves as a front end computer (FEC) that interfaces with the RHIC control system. The carrier provides high speed serial data paths to each daughter site and between daughter sites as well as four generic external fiber optic links. It also distributes low noise clocks and serial data links to all daughter sites and monitors temperature, voltage and current. To date, two XMC cards have been designed: a four channel high speed ADC and a four channel high speed DAC. The new LLRF hardware was used to replace the old RHIC LLRF system for the 2009 run. For the 2010 run, the RHIC RF system operation was dramatically changed with the introduction of accelerating both beams in a new, common cavity instead of each ring having independent cavities. The flexibility of the new system was beneficial in allowing the low level system to be adapted to support this new configuration. This hardware was also used in 2009 to provide LLRF for the newly commissioned Electron Beam Ion Source.

Hayes, T.; Smith, K.S.

2011-03-28T23:59:59.000Z

476

Bitumen accumulation in Grosmont platform complex, Upper Devonian, Alberta, Canada  

SciTech Connect (OSTI)

The Upper Devonian Grosmont Formation, a broad carbonate platform complex in Alberta, Canada, contains an estimated 300 billion bbl of bitumen. It has been suggested that these vast reserves are related to Lower Cretaceous Athabasca oil sands. Detailed gas chromatographic-mass spectrometric studies of a wide range of biologic marker compounds confirm this suggestion. The Grosmont Formation contains bitumen of similar maturity and source to the Athabasca deposit, but it has been subjected to a greater degree of biodegradation and water washing, possibly as a result of its reservoir rock characteristics. The difference in the degree of biodegradation is manifested by the absence of bicyclic terpanes and by the reduced concentrations of the C/sub 30/ and the 22R epimers of the extended hopanes in the Grosmont bitumen. Also, the greater degree of water washing of the Grosmont bitumen is inferred from the observed distribution of the bicyclic, tricyclic, and tetracyclic terpenoid sulfides, which shows a characteristic loss of the lower molecular weight members in the carbonate bitumen. The correlation established here between the two deposits suggests that if the precursor oil has indeed undergone long-distance migration, the Paleozoic carbonates could have acted as a path for migration. Finally, the observed distribution of steranes in the Grosmont bitumen corresponds to the suggestion that the Mannville Group shales were not the major source rocks of the oil-sand and carbonate bitumen accumulations of northern Alberta. 11 figures, 6 tables.

Hoffmann, C.F.; Strausz, O.P.

1986-09-01T23:59:59.000Z

477

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

478

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

, unidentified causes may have led to the fluctuation. A widely accepted approach for modeling multiple hypotheses is to employ a probabilistic revision process (Winterfeldt and Edwards 1986; Winkler and Hays 1975; Luce and Raiffa, 1957). Probability theory...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

479

V-047: IBM Lotus Foundation Multiple Cross Site Scripting | Department...  

Broader source: Energy.gov (indexed) [DOE]

the malicious data is being viewed. 2) An error exists within the bundled version of PHP. IMPACT: Two vulnerabilities have been reported in IBM Lotus Foundations Start, which...

480

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "multiple vulnerabilities platform" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

482

Interactive Supercomputing’s Star-P Platform  

SciTech Connect (OSTI)

The thesis of this extended abstract is simple. High productivity comes from high level infrastructures. To measure this, we introduce a methodology that goes beyond the tradition of timing software in serial and tuned parallel modes. We perform a classroom productivity study involving 29 students who have written a homework exercise in a low level language (MPI message passing) and a high level language (Star-P with MATLAB client). Our conclusions indicate what perhaps should be of little surprise: (1) the high level language is always far easier on the students than the low level language. (2) The early versions of the high level language perform inadequately compared to the tuned low level language, but later versions substantially catch up. Asymptotically, the analogy must hold that message passing is to high level language parallel programming as assembler is to high level environments such as MATLAB, Mathematica, Maple, or even Python. We follow the Kepner method that correctly realizes that traditional speedup numbers without some discussion of the human cost of reaching these numbers can fail to reflect the true human productivity cost of high performance computing. Traditional data compares low level message passing with serial computation. With the benefit of a high level language system in place, in our case Star-P running with MATLAB client, and with the benefit of a large data pool: 29 students, each running the same code ten times on three evolutions of the same platform, we can methodically demonstrate the productivity gains. To date we are not aware of any high level system as extensive and interoperable as Star-P, nor are we aware of an experiment of this kind performed with this volume of data.

Edelman, Alan; Husbands, Parry; Leibman, Steve

2006-09-19T23:59:59.000Z

483

New prospects in Cambrian platform orthoquartzites in Poland  

SciTech Connect (OSTI)

Middle Cambrian orthoquartzites produce oil in two small fields northwest of Gdansk, Poland; few developed offshore discoveries exist in the southeastern Baltic Sea. This joint Polish-German study on these poorly porous sandstones is aimed at delineating areas of better reservoir quality development and thus of future prospects. In the Polish part of the East European platform, Cambrian deposits exist in four geologic provinces (Lublin slope, Podiassle depression, Warsaw synclinorium, Baltic syneclise). In these areas, the Cambrian, which in part is more than 500 m thick, has been buried to depths between 300 and approximately 6000 m. The Middle Cambrian orthoquartzitic sandstones represent a shallow-marine sequences with interbedded claystones. Their porosities range form 2 to 8%, and oil production is improved by natural fractures. A major source rock for the oil accumulations is represented by Upper Cambrian black shales (TOC values, 3-13%; thickness approximately 1-10 m in northern onshore Baltic syneclise, up to 50 m in southern Scania, Sweden). The Middle Cambrian shales show low TOC contents (average, 0.3-0.6%) and a thickness of approximately 200 m. Despite their low organic content, they also could have been contributed to the reservoired oil because both black shales show maturities within the oil window and both contain an oil-prone algal kerogen. Therefore, in the northeast Polish oil province the restricted pore volume of the orthoquartzites and not the source rock parameters represents the major limiting factor for larger oil accumulations. Future prospects will be difficult to predict because the occurrence of traps might be much more controlled by diagenesis than by (tectonic) structures.

Labecki, J.; Weil, W. (Polish Oil and Gas Co., Warsaw (Poland)); Schleicher, M.; Kulke, H.; Koester, J. (Univ. of Clausthal, Clausthal-Zellerfeld (West Germany))

1991-08-01T23:59:59.000Z

484

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

485

Degradable polymeric nano-films and particles as delivery platforms for vaccines and immunotherapeutics  

E-Print Network [OSTI]

Degradable polymeric materials provide opportunities for the development of improved vaccines and immunotherapies by acting as platforms that facilitate the delivery of molecules to appropriate tissue and cellular locations ...

Su, Xingfang

2012-01-01T23:59:59.000Z

486

Further development of an in-pipe leak detection sensor's mobility platform  

E-Print Network [OSTI]

Water leakage is a major global problem and smaller sized leaks are difficult to find despite their prevalence in most water distribution systems. Previous attempts to develop a mobility platform for a sensor in use in ...

Moore, Frederick M

2013-01-01T23:59:59.000Z

487

Searching for Expertise using the Terrier Platform Craig Macdonald, Iadh Ounis  

E-Print Network [OSTI]

Searching for Expertise using the Terrier Platform Craig Macdonald, Iadh Ounis Department the relevance of documents in classical retrieval. 2. REFERENCES [1] C. Macdonald, V. Plachouras, B. He, and I

Jose, Joemon M.

488

Response-Time Minimization of Automotive-Inspired Dataflows on Multicore Platforms  

E-Print Network [OSTI]

Response-Time Minimization of Automotive-Inspired Dataflows on Multicore Platforms Glenn A Abstract Dataflow software architectures are prevalent in prototypes of advanced automotive systems guarantees in these systems. Many existing automotive prototypes ensure such constraints through over

Anderson, James

489

The Conservation & Renewable Energy Collaboratory (CREC) is CTI's platform for collaboration with industry and  

E-Print Network [OSTI]

Purpose The Conservation & Renewable Energy Collaboratory (CREC) is CTI's platform for collaboration with industry and other partners on research and education related to renew- able energy Development & Training · Environmental Technology · Water Management Conservation & Renewable Energy

McGraw, Kevin J.

490

Micro-algae come of age as a platform for recombinant protein production  

E-Print Network [OSTI]

et al. 2008), chlorophyta alga Ulva pertusa Table 1 Recentprotein production in algae Expression level achieved010-0326-5 REVIEW Micro-algae come of age as a platform for

Specht, Elizabeth; Miyake-Stoner, Shigeki; Mayfield, Stephen

2010-01-01T23:59:59.000Z

491

MIT GEOblog: a platform for digital annotation of space for collective community based digital story telling  

E-Print Network [OSTI]

This paper focuses on guidelines in designing platforms for collective, location-sensitive user generated content, built upon a system that allows for locating mobile subjects within the space. The process of conceptual ...

Nabian, Nashid

492

Unified communications : convergence of platforms and strategies of two software vendors  

E-Print Network [OSTI]

Unified Communications: Convergence of Platforms and Strategies of Two Software Vendors by Muhammad Zia Hydari ABSTRACT Unified communication (UC) is the convergence of various modes of communication - voice telephony, ...

Hydari, Muhammad Zia

2008-01-01T23:59:59.000Z

493

APBF-DEC NOx Adsorber/DPF Project: SUV/Pick-Up Platform  

Broader source: Energy.gov (indexed) [DOE]

Status Principal Investigators: Cynthia Webb Phillip Weber DEER August 25, 2003 APBF-DEC NOx AdsorberDPF Project: SUVPick-Up Platform Program Goals Objectives Light-Duty SUV ...

494

City-Car : optimizing vehicle and urban efficiencies through a shared adaptive platform  

E-Print Network [OSTI]

Research focused on developing an innovative, yet simple automobile platform that maximizes its efficiency through shared convenience. Work was initially put into studying both current vehicles and urban architecture, in ...

Lark, William, 1981-

2005-01-01T23:59:59.000Z

495

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform  

E-Print Network [OSTI]

- performance computing platform for large-scale mathematical models. Traditional computing architecture cannot hybrid computing architecture for the simulation and evaluation of large-scale associative neural memory models. The proposed architecture achieves very high computing and communication performances

Qiu, Qinru

496

Forensic DNA Standards for Next Generation Sequencing Platforms ( 7th Annual SFAF Meeting, 2012)  

ScienceCinema (OSTI)

Peter Vallone on "Forensic DNA Standards for Next Generation Sequencing Platforms" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

Vallone, Peter [NIST

2013-03-22T23:59:59.000Z

497

National Bioenergy Center--Biochemical Platform Integration Project: Quarterly Update, Fall 2010  

SciTech Connect (OSTI)

Fall 2010 edition of the National Bioenergy Center's Biochemical Platform Integration Project quarterly newsletter. Issue topics: rapid analysis models for compositional analysis of intermediate process streams; engineered arabinose-fermenting Zymomonas mobilis strain.

Schell, D.

2010-12-01T23:59:59.000Z

498

The Mars Gravity Biosatellite as an innovative partial gravity research platform  

E-Print Network [OSTI]

The Mars Gravity Biosatellite is an unprecedented independent spaceflight platform for gravitational biology research. With a projected first launch after 2010, the low Earth orbit satellite will support a cohort of fifteen ...

Fulford-Jones, Thaddeus R. F

2008-01-01T23:59:59.000Z

499

The Creation of a low-cost, reliable platform for mobile robotics research  

E-Print Network [OSTI]

This work documents the planning process, design, fabrication, and integration of a low-cost robot designed for research on the problem of life-long robot mapping. The robotics platform used is the iRobot Create. This robot ...

Gilbert, Taylor Harrison

2011-01-01T23:59:59.000Z

500

Building a semi-autonomous sociable robot platform for robust interpersonal telecommunication  

E-Print Network [OSTI]

This thesis presents the design of a software platform for the Huggable project. The Huggable is a new kind of robotic companion being developed at the MIT Media Lab for health care, education, entertainment and social ...

Toscano, Robert Lopez

2008-01-01T23:59:59.000Z