National Library of Energy BETA

Sample records for multiple vulnerabilities platform

  1. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29,...

  2. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  3. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  4. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  5. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  6. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  7. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  8. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  9. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  10. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  11. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  12. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported...

  13. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT:...

  14. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  15. Robotic vehicle with multiple tracked mobility platforms

    DOE Patents [OSTI]

    Salton, Jonathan R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM); Garretson, Justin (Albuquerque, NM); Hayward, David R. (Wetmore, CO); Hobart, Clinton G. (Albuquerque, NM); Deuel, Jr., Jamieson K. (Albuquerque, NM)

    2012-07-24

    A robotic vehicle having two or more tracked mobility platforms that are mechanically linked together with a two-dimensional coupling, thereby forming a composite vehicle of increased mobility. The robotic vehicle is operative in hazardous environments and can be capable of semi-submersible operation. The robotic vehicle is capable of remote controlled operation via radio frequency and/or fiber optic communication link to a remote operator control unit. The tracks have a plurality of track-edge scallop cut-outs that allow the tracks to easily grab onto and roll across railroad tracks, especially when crossing the railroad tracks at an oblique angle.

  16. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by...

  17. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  18. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  19. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  20. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  1. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  2. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  3. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  4. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  5. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  6. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  7. Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms

    E-Print Network [OSTI]

    -MANET). Mobile communication with handheld devices, and IC-MANET communication in disaster scenarios in particResource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms Ekhiotz Jon not pay enough attention to measurable and reproducible indications of the mobile footprint including

  8. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  9. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  10. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    be used by certain political actors as a powerful instrumentto other relevant political actors in the executive andinteracting with other political actors in multiple arena

  11. Multicore platforms Scientific code optimisation Modelling basic routines Matrix multiplication Modelling and optimisation of scientific software

    E-Print Network [OSTI]

    Giménez, Domingo

    -core Ben: HP Superdome, cc-NUMA with 128 cores #12;Multicore platforms Scientific code optimisation

  12. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar through theVulnerabilities

  13. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  14. Poly(dimethylsiloxane) microchip-based immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform

    SciTech Connect (OSTI)

    Shao, Guocheng; Wang, Jun; Li, Zhaohui; Saraf, Laxmikant V.; Wang, Wanjun; Lin, Yuehe

    2011-09-20

    In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing platform with integrated pneumatic micro valves is described. The microchip was fabricated with multiple layer soft lithography technology. By controlling the activation status of corresponding valves, reagent flows in the microchannel network can be well manipulated so that immuno-reactions only take place at designated reaction zones (DRZs). Four DRZs are included in the prototype microchip. Since these DRZs are all isolated from each other by micro valves, cross contamination is prevented. Using the inner surface of the all-PDMS microchannel as immunoassay substrate, on-chip sandwich format solid phase immunoassay was performed to demonstrate the feasibility of this immuno-sensing platform. Mouse IgG and fluorescein isothiocyanate (FITC) were used as the model analyte and the signal reporter respectively. Only 10 ul sample is needed for the assay and low detection limit of 5 ng/ml (?33 pM) was achieved though low-cost polyclonal antibodies were used in our experiment for feasibility study only. The encouraging results from mouse IgG immunoassay proved the feasibility of our microchip design. With slight modification of the assay protocol, the same chip design can be used for multi-target detection and can provide a simple, cost-effective and integrated microchip solution for multiplex immunoassay applications.

  15. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security...

  16. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  17. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  18. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  19. V-180: IBM Application Manager For Smart Business Multiple Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (GSKit). 8) Multiple vulnerabilities are caused due to a bundled vulnerable version of Java. IMPACT: IBM Application Manager For Smart Business can be exploited by malicious...

  20. Data collection and management of a mobile sensor platform

    E-Print Network [OSTI]

    Rosenfeld, Abraham M

    2013-01-01

    This thesis explores the development of a platform to better collect and manage data from multiple senor inputs mounted on a car sensor platform. Specifically, focusing on the collection and synchronization of multiple ...

  1. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  2. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  3. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  6. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartment ofEnergy 094:

  7. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  8. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the...

  9. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  10. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  11. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  12. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  13. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  14. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  15. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  16. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose...

  17. Strategies for network platform evolution

    E-Print Network [OSTI]

    Shrivastava, Saujanya

    2012-01-01

    Managing a network platform business can be a complex preposition for the platform owner due to various intricacies that are associated with these platforms. These platforms have distinct users each having its own exclusive ...

  18. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  19. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  20. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  1. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  2. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  3. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  4. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  5. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  6. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695...

  8. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  9. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  10. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUraniumDepartment

  11. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric

  12. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting Attacks

  13. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting

  14. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site

  15. T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland 2012SystemSecurity Controls

  16. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks

  17. U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |

  18. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9: IBM Java

  19. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9:1: Oracle

  20. U-273: Multiple vulnerabilities have been reported in Wireshark |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks |

  1. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle Solaris Java

  2. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department of Energy

  3. V-097: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment of7:

  4. V-105: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google Chrome

  5. V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google

  6. V-111: Multiple vulnerabilities have been reported in Puppet | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Codeof

  7. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS BugsPath8:

  8. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS

  9. V-121: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOSFlaw Lets1:

  10. V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: AppleAttacks6: Mozilla

  11. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy

  12. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H AReactionDepartment35:

  13. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:2: Drupal

  14. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers|

  15. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  16. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  17. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  18. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  19. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  20. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  1. THE PLATFORMS ENABLING WIRELESS

    E-Print Network [OSTI]

    Scheuermann, Peter

    THE PLATFORMS ENABLING WIRELESS SENSOR NETWORKS By Jason Hill, Mike Horton, Ralph Kling always-on power requirements. Unlike cell phones and wireless laptops, periodic recharging is not possible for most wireless sensor net- works. In many cases, devices are placed in the field for years

  2. Service platform strategy : social networking and mobile service platform perspectives

    E-Print Network [OSTI]

    Yoo, Jang Hoon, S.M. Massachusetts Institute of Technology

    2011-01-01

    The significance of the service platform is increasing, while studies on this phenomenon remain scarce and insufficient. Most of the researches focus on products, market segmentation and how platform triggers innovation ...

  3. Mobility platform coupling device and method for coupling mobility platforms

    DOE Patents [OSTI]

    Shirey, David L. (Albuquerque, NM); Hayward, David R. (Albuquerque, NM); Buttz, James H. (Albuquerque, NM)

    2002-01-01

    A coupling device for connecting a first mobility platform to a second mobility platform in tandem. An example mobility platform is a robot. The coupling device has a loose link mode for normal steering conditions and a locking position, tight link mode for navigation across difficult terrain and across obstacles, for traversing chasms, and for navigating with a reduced footprint in tight steering conditions.

  4. Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell-cell

    E-Print Network [OSTI]

    Kenis, Paul J. A.

    Microfluidic platform for the study of intercellular communication via soluble factor-cell and cell are available today. Here, we report the design and validation of a microfluidic platform that enables (i) soluble molecule-cell and/or (ii) cell-cell paracrine signaling. In the microfluidic platform, multiple

  5. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  7. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  8. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  9. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  11. North Sea platforms revamped

    SciTech Connect (OSTI)

    O'Hare, J.

    1999-12-01

    Many of the early North Sea platforms are reaching their end-of-field life. Most are still equipped with their original drilling package. In a few cases the package has either been removed or decommissioned. The early installations were designed for much simpler and less demanding wells than the horizontal, extended-reach or designer wells common today. Extended-reach wells now can be drilled realistically from ageing platforms, without incurring massive capital expenditure. This can be achieved using the existing drilling package to the limit of its capabilities and supplementing where necessary with relatively minor upgrades or the use of temporary equipment. Drilling even a few more wells from existing platforms not only prolongs field life, it enables any surplus processing capacity to be made available to develop near-field potential with extended-reach drilling (ERD) or by tying back subsea satellite wells, or for processing third-party fluids. The paper describes well design, surface equipment, mud pumps, shakers and solids control equipment, drill cuttings disposal systems, derrick and hoisting system, top drive and drillstring, downhole equipment, well planning, casing wear, logistics, rig preparations, and ERD vs. subsea tie-backs.

  12. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  13. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  14. Universal Developer Platform for MachinePlatform for Machine

    E-Print Network [OSTI]

    1 Universal Developer Platform for MachinePlatform for Machine Control Applications Hansjoerg will need some things: · Senses · Means June 24-26, 2008 ETH Zurich #12;2 And for Machine Control? June 24 ETH Zurich Conclusion: big effort for things that have little to do with Machine Control Multi

  15. Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms

    E-Print Network [OSTI]

    Chen, Yu

    . The data security in cloud is one of the challenges to be addressed before the novel pay-as-you-go business: Cloud Computing, Data Integrity, Storage Security, Non-Repudiation. 1. Introduction Leading is accepted widely. One of the most impending tasks is the security of data storage in the cloud. As shown

  16. Energy Tracking Software Platform

    SciTech Connect (OSTI)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  17. Persistent Surveillance Using Multiple Unmanned Air Vehicles

    E-Print Network [OSTI]

    Stanford University

    require long endurance and unmanned aerial vehicles are a natural choice for the sensing platforms1 Persistent Surveillance Using Multiple Unmanned Air Vehicles Nikhil Nigam and Ilan Kroo. These are tested in a multiple unmanned air vehicle (UAV) simulation environment, developed for this program

  18. PlatformIndependentModel(PIM)and PlatformSpecificModel(PSM)for

    E-Print Network [OSTI]

    Suzuki, Jun

    PlatformIndependentModel(PIM)and PlatformSpecificModel(PSM)for Super Catalog. OMGAdoptedSpecification dtc/03-09-01 #12;#12;PlatformIndependentModel(PIM)and PlatformSpecificModel(PSM

  19. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  20. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  1. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  2. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  3. Serial siphon valving for centrifugal microfluidic platforms

    E-Print Network [OSTI]

    2010-01-01

    2006). 1.1 Valving on centrifugal micro?uidic platforms AsSerial siphon valving for centrifugal micro?uidic platformsThe advantages offered by centrifugal micro?uidic platforms

  4. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  5. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  6. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  7. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  8. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  9. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  10. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  11. Biomass Program 2007 Accomplishments - Thermochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details the accomplishments of the Biomass Program Thermochemical Conversion Platform in 2007.

  12. Biomass Program 2007 Accomplishments - Biochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details accomplishments of the Biomass Program Biochemical Conversion Platform accomplishments in 2007.

  13. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  14. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  15. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  16. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  17. 2009 Feedstocks Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program‘s Feedstock platform review meeting, held on April 8–10, 2009, at the Grand Hyatt Washington, Washington, D.C.

  18. 2009 Analysis Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Analysis platform review meeting, held on February 18, 2009, at the Marriott Residence Inn, National Harbor, Maryland.

  19. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  20. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  1. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  2. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  8. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  11. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  12. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  13. Platform failures : lessons for strategic management

    E-Print Network [OSTI]

    Vardhan, Harsh, S.M. Massachusetts Institute of Technology

    2015-01-01

    Most internet business models today are positioned as platforms that connect two or more groups of users. From online social networking to electronic retail, we find that multi-sided platforms are penetrating consumers' ...

  14. Pneumatic pumping in centrifugal microfluidic platforms

    E-Print Network [OSTI]

    Gorkin, Robert; Clime, Liviu; Madou, Marc; Kido, Horacio

    2010-01-01

    Reciprocating ?ow-based centrifugal micro?uidics mixer. RevSerial siphon valving for centrifugal micro?uidic platforms.PAPER Pneumatic pumping in centrifugal micro?uidic platforms

  15. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  16. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  17. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  18. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  19. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  20. Turbine engine airfoil and platform assembly

    DOE Patents [OSTI]

    Campbell, Christian X. (Oviedo, FL); James, Allister W. (Chuluota, FL); Morrison, Jay A. (Oviedo, FL)

    2012-07-31

    A turbine airfoil (22A) is formed by a first process using a first material. A platform (30A) is formed by a second process using a second material that may be different from the first material. The platform (30A) is assembled around a shank (23A) of the airfoil. One or more pins (36A) extend from the platform into holes (28) in the shank (23A). The platform may be formed in two portions (32A, 34A) and placed around the shank, enclosing it. The two platform portions may be bonded to each other. Alternately, the platform (30B) may be cast around the shank (23B) using a metal alloy with better castability than that of the blade and shank, which may be specialized for thermal tolerance. The pins (36A-36D) or holes for them do not extend to an outer surface (31) of the platform, avoiding stress concentrations.

  1. 2011 Biomass Program Platform Peer Review: Integrated Biorefineries...

    Office of Environmental Management (EM)

    2011 Biomass Program Platform Peer Review: Integrated Biorefineries 2011 Biomass Program Platform Peer Review: Integrated Biorefineries "This document summarizes the...

  2. Montgomery Modular Multiplication on ARM-NEON Revisited

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Montgomery Modular Multiplication on ARM-NEON Revisited Hwajeong Seo1 , Zhe Liu2 , Johann Großsch-based cryptosystems. The increased prevalence of SIMD-type instructions in commodity processors (e.g. Intel SSE, ARM modular multiplication on ARM-NEON platforms. Detailed benchmarking results obtained on an ARM Cortex-A9

  3. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  4. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  5. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  6. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  7. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  8. AmbiMax: Autonomous Energy Harvesting Platform for Multi-Supply Wireless Sensor Nodes

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    AmbiMax: Autonomous Energy Harvesting Platform for Multi-Supply Wireless Sensor Nodes Chulsung Park and a supercapacitor based energy storage system for wireless sensor nodes (WSN). Previous WSNs attempt to harvest of multiple energy harvesting sources including solar, wind, thermal, and vibration, each with a different

  9. Multiple piece turbine rotor blade

    DOE Patents [OSTI]

    Jones, Russell B; Fedock, John A

    2013-05-21

    A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

  10. A Dynamic Platform for Runtime Adaptation

    E-Print Network [OSTI]

    Pham, Hubert

    We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

  11. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  12. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  13. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  14. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  15. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  16. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  17. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  18. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  19. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  20. U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

  1. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  2. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  3. The NTP Experimental Platform for Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Tseng, Yu-Chee

    of three different sensor platforms: the III Zigbee Advanced Platform, the ITRI Sensor Platform platform, and the III ZigBee Advanced Platform [3], and can easily incorporate sensor systems developed protocols, such as Zigbee and IEEE 802.15.4, and to interoperate under common applications. More importantly

  4. Apparatus to position a microelectromechanical platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; Rodgers, Murray Steven

    2003-09-23

    The present invention comprises a microelectromechanical positioner to achieve substantially translational positioning of a platform without rotational motion, thereby maintaining a constant angular orientation of the platform during movement. A linkage mechanism of the positioner can comprise parallelogram linkages to constrain the rotational motion of the platform. Such linkages further can comprise flexural hinges or other turning joints at the linkage pivots to eliminate the need for rubbing surfaces. A plurality of the linkage mechanisms can be used to enable translational motion of the platform with two degrees of freedom. A variety of means can be used to actuate the positioner. Independent actuation of the anchor links of the linkage mechanisms with rotary electrostatic actuators can be used to provide controlled translational movement of the platform.

  5. U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities PLATFORM: IBM Tivoli Provisioning Manager Express for Software Distribution 4.x ABSTRACT:...

  6. Near maximum likelihood multiuser receivers for direct sequence code division multiple access 

    E-Print Network [OSTI]

    Sim, Hak Keong

    Wideband wireless access based on direct-sequence code-division multiple access (DS-CDMA) has been adopted for third-generation mobile communications systems. Hence, DS-CDMA downlink communications systems form the platform ...

  7. An Evaluation of Sensing Platforms Used for Sensor Network Research

    E-Print Network [OSTI]

    Kansas, University of

    An Evaluation of Sensing Platforms Used for Sensor Network Research Daniel T. Fokum, Dr. Victor S to complex sensor nodes; which include fully configured computers. Several of these platforms were evaluated ................................................................................................................. 2 3 Evaluation of Sensor Platforms

  8. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  9. ESF Mine Power Center Platforms

    SciTech Connect (OSTI)

    T.A. Misiak

    2000-02-10

    The purpose and objective of this analysis is to structurally evaluate the existing Exploratory Studies Facility (ESF) mine power center (MPC) support frames and to design service platforms that will attach to the MPC support frames. This analysis follows the Development Plan titled ''Produce Additional Design for Title 111 Evaluation Report'' (CRWMS M&O 1999a). This analysis satisfies design recommended in the ''Title III Evaluation Report for the Surface and Subsurface Power System'' (CRWMS M&O 1999b, Section 7.6) and concurred with in the ''System Safety Evaluation of Title 111 Evaluation Reports Recommended Work'' (Gwyn 1999, Section 10.1.1). This analysis does not constitute a level-3 deliverable, a level-4 milestone, or a supporting work product. This document is not being prepared in support of the Monitored Geologic Repository (MGR) Site Recommendation (SR), Environmental Impact Statement (EIS), or License Application (LA) and should not be cited as a reference in the MGR SR, EIS, or LA.

  10. Polymer-based platform for microfluidic systems

    DOE Patents [OSTI]

    Benett, William (Livermore, CA); Krulevitch, Peter (Pleasanton, CA); Maghribi, Mariam (Livermore, CA); Hamilton, Julie (Tracy, CA); Rose, Klint (Boston, MA); Wang, Amy W. (Oakland, CA)

    2009-10-13

    A method of forming a polymer-based microfluidic system platform using network building blocks selected from a set of interconnectable network building blocks, such as wire, pins, blocks, and interconnects. The selected building blocks are interconnectably assembled and fixedly positioned in precise positions in a mold cavity of a mold frame to construct a three-dimensional model construction of a microfluidic flow path network preferably having meso-scale dimensions. A hardenable liquid, such as poly (dimethylsiloxane) is then introduced into the mold cavity and hardened to form a platform structure as well as to mold the microfluidic flow path network having channels, reservoirs and ports. Pre-fabricated elbows, T's and other joints are used to interconnect various building block elements together. After hardening the liquid the building blocks are removed from the platform structure to make available the channels, cavities and ports within the platform structure. Microdevices may be embedded within the cast polymer-based platform, or bonded to the platform structure subsequent to molding, to create an integrated microfluidic system. In this manner, the new microfluidic platform is versatile and capable of quickly generating prototype systems, and could easily be adapted to a manufacturing setting.

  11. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    política: entre o autoritarismo e a democracia. Record, 2005o autoritarismo e a democracia. Record, 2005, p. 31 raised

  12. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUranium

  13. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization LooksRed

  14. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting AttacksDepartment of

  15. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of

  16. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of| Department

  17. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35: OracleEnergy|

  18. U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: Apple QuickTime

  19. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H

  20. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6: Adobe

  1. Commercial-Grade, Scalable Support and Training Services Platform...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services Platform Commercial-Grade, Scalable Support and Training Services Platform Lead Performer: Big Ladder Software - Denver, CO DOE Funding: 149,554 Cost Share: NA...

  2. Web Machines : a new platform for application construction and execution

    E-Print Network [OSTI]

    Bryant, Robert A., M. Eng. Massachusetts Institute of Technology

    2009-01-01

    In today's world, computer application platforms are becoming increasingly important in providing positive application end-user and developer experiences. While there are many successful application platforms available, ...

  3. Standard Energy Efficiency Data (SEED) Platform - 2014 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Data (SEED) Platform - 2014 BTO Peer Review Standard Energy Efficiency Data (SEED) Platform - 2014 BTO Peer Review Project Objective The Standard Energy Efficiency Data (SEED)...

  4. Methane and Methanotrophic Bacteria as a Biotechnological Platform...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Methane and Methanotrophic Bacteria as a Biotechnological Platform Methane and Methanotrophic Bacteria as a Biotechnological Platform Breakout Session 2-B: NewEmerging Pathways...

  5. Multilayer Platform for Ultra-Low-Loss Waveguide Applications

    E-Print Network [OSTI]

    2012-01-01

    1, 2012 Multilayer Platform for Ultra-Low-Loss Waveguidepreviously demonstrated ultra-low-loss technologies. Groupet al. : MULTILAYER PLATFORM FOR ULTRA-LOW-LOSS WAVEGUIDE

  6. Standard Energy Efficiency Database Platform - 2013 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Database Platform - 2013 BTO Peer Review Standard Energy Efficiency Database Platform - 2013 BTO Peer Review commlbldgs09prindle040313.pdf More Documents & Publications Buildings...

  7. Standard Energy Efficiency Data Platform | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Commercial Buildings Analysis Tools Standard Energy Efficiency Data Platform Standard Energy Efficiency Data Platform An error occurred. Try watching this video on...

  8. Adapting On-Site Electrical Generation Platforms for Producer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Adapting On-Site Electrical Generation Platforms for Producer Gas - Fact Sheet, April 2014 Adapting On-Site Electrical Generation Platforms for Producer Gas - Fact Sheet, April...

  9. An Integrated Platform for Engine Performance Simulations and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    An Integrated Platform for Engine Performance Simulations and Optimization under Diesel Conditions An Integrated Platform for Engine Performance Simulations and Optimization under...

  10. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  11. Multiple sclerosis genetics

    E-Print Network [OSTI]

    Cree, BAC

    2014-01-01

    recurrence rates in multiple sclerosis. Proc Natl Acad Sci Ualloantigen Ag 7a in multiple sclerosis. Lancet 2: 814. Yeosusceptibility locus for multiple sclerosis. Ann Neurol 61:

  12. Visualization of vibration experienced in offshore platforms

    E-Print Network [OSTI]

    Patrikalakis, Alexander Marinos Charles

    2010-01-01

    In this thesis, I design and evaluate methods to optimize the visualization of vortex-induced vibration (VIV) in marine risers. VIV is vibration experienced by marine risers in offshore drilling platforms due to ocean ...

  13. Serial siphon valving for centrifugal microfluidic platforms

    E-Print Network [OSTI]

    2010-01-01

    centrifugal pumping eliminates the need for large power supplies and/or pumpsCentrifugal micro?uidics is one such platform with many advantages over typical, pressure-pump

  14. Linked data platform for web applications

    E-Print Network [OSTI]

    Presbrey, Joe (Joseph Warren)

    2014-01-01

    Most of today's web applications are tightly coupled to proprietary server backends that store and control all user data. This thesis presents Linked Data as a decentralized web app platform, eliminating vendor lock-in, ...

  15. 2011 Biomass Program Platform Peer Review: Algae

    SciTech Connect (OSTI)

    Yang, Joyce

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Algae Platform Review meeting.

  16. Cloud Based Applications and Platforms (Presentation)

    SciTech Connect (OSTI)

    Brodt-Giles, D.

    2014-05-15

    Presentation to the Cloud Computing East 2014 Conference, where we are highlighting our cloud computing strategy, describing the platforms on the cloud (including Smartgrid.gov), and defining our process for implementing cloud based applications.

  17. Digital Construction Platform: A Compound Arm Approach

    E-Print Network [OSTI]

    Spielberg, Nathan A.

    2014-01-01

    We introduce a novel large-scale Digital Construction Platform (DCP) for on-site sensing, analysis, and fabrication. The DCP is an in-progress research project consisting of a compound robotic arm system comprised of a ...

  18. High index contrast platform for silicon photonics

    E-Print Network [OSTI]

    Akiyama, Shoji, 1972-

    2004-01-01

    This thesis focuses on silicon-based high index contrast (HIC) photonics. In addition to mature fiber optics or low index contrast (LIC) platform, which is often referred to as Planar Lightwave Cirrcuit (PLC) or Silica ...

  19. 2011 Biomass Program Platform Peer Review: Analysis

    SciTech Connect (OSTI)

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Analysis Platform Review meeting.

  20. 2011 Biomass Program Platform Peer Review: Sustainability

    SciTech Connect (OSTI)

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Sustainability Platform Review meeting.

  1. Cell Culture on MEMS Platforms: A Review

    E-Print Network [OSTI]

    Ni, Ming

    Microfabricated systems provide an excellent platform for the culture of cells, and are an extremely useful tool for the investigation of cellular responses to various stimuli. Advantages offered over traditional methods ...

  2. Platforms for Engineering Experimental Biomedical Systems

    E-Print Network [OSTI]

    Austin, Mark

    1 Platforms for Engineering Experimental Biomedical Systems Matthew Mosteller Institute for Systems, validation, and verification of systems for biomedical experiments in laboratory and clinical applications that enables formal validation and verification of biomedical devices. Looking forward, the capabilities

  3. 2011 Biomass Program Platform Peer Review: Feedstock

    SciTech Connect (OSTI)

    McCann, Laura

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Feedstock Platform Review meeting.

  4. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  5. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  6. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  7. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  8. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  9. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  10. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  11. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  12. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  13. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  14. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  15. Horizontally scaling dChache SRM with the Terracotta platform

    SciTech Connect (OSTI)

    Perelmutov, T.; Crawford, M.; Moibenko, A.; Oleynik, G.; /Fermilab

    2011-01-01

    The dCache disk caching file system has been chosen by a majority of LHC experiments Tier 1 centers for their data storage needs. It is also deployed at many Tier 2 centers. The Storage Resource Manager (SRM) is a standardized grid storage interface and a single point of remote entry into dCache, and hence is a critical component. SRM must scale to increasing transaction rates and remain resilient against changing usage patterns. The initial implementation of the SRM service in dCache suffered from an inability to support clustered deployment, and its performance was limited by the hardware of a single node. Using the Terracotta platform, we added the ability to horizontally scale the dCache SRM service to run on multiple nodes in a cluster configuration, coupled with network load balancing. This gives site administrators the ability to increase the performance and reliability of SRM service to face the ever-increasing requirements of LHC data handling. In this paper we will describe the previous limitations of the architecture SRM server and how the Terracotta platform allowed us to readily convert single node service into a highly scalable clustered application.

  16. Functional design criteria for standard hydrogen monitoring system portable platform

    SciTech Connect (OSTI)

    Schneider, T.C.

    1997-01-17

    Functional design description for a Standard-E cabinet arrangement Standard Hydrogen Monitoring System Portable Platform.

  17. Cooperative Vision Based Estimation and Tracking Using Multiple UAVs

    E-Print Network [OSTI]

    Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

  18. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  19. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  20. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  1. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  2. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  3. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  4. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  5. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  6. Traffic information computing platform for big data

    SciTech Connect (OSTI)

    Duan, Zongtao Li, Ying Zheng, Xibin Liu, Yan Dai, Jiting Kang, Jun

    2014-10-06

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  7. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  8. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  9. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  10. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  11. Vol 442|6 July 2006 Multiple introductions of H5N1 in Nigeria

    E-Print Network [OSTI]

    Cai, Long

    Vol 442|6 July 2006 37 Multiple introductions of H5N1 in Nigeria Phylogenetic analysis reveals- try farming industry is second only to oil production in Nigeria and is particularly vulnerable the two flight paths that link Nigeria with the south- ern Russian region and Europe, and with western

  12. 2009 Biochemical Conversion Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Biochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado.

  13. The Durham ELT adaptive optics simulation platform

    E-Print Network [OSTI]

    Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

    2006-11-09

    Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

  14. 2009 Integrated Biorefinery Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program‘s Integrated Biorefinery (IBR) platform review meeting, held on February 18–19, 2009, at the Westin National Harbor, National Harbor, Maryland.

  15. Pseudomonas fluorescens -A robust manufacturing platform

    E-Print Network [OSTI]

    Lebendiker, Mario

    Pseudomonas fluorescens -A robust manufacturing platform Reprinted from July/August 2004 Speciality at efficient- ly transporting single chain antibodies and other mammalian-derived proteins. In addition production. Dowpharma, a contract manufacturing services unit of Dow Chemical, has developed a manufacturing

  16. Microfluidic Platforms for Capturing Circulating Tumor Cells

    E-Print Network [OSTI]

    Tang, William C

    Microfluidic Platforms for Capturing Circulating Tumor Cells Sweta Gupta, Allison C. Baker-cost microfluidic device that can be used to isolate and capture circulating tumor cells (CTCs) from whole blood. The device was made from polydimethylsiloxane (PDMS) consisting of a microfluidic channel with microposts

  17. Yangzhong Tang Functional Genomics Platform@ Whitehead Institute

    E-Print Network [OSTI]

    Sabatini, David M.

    Yangzhong Tang Functional Genomics Platform@ Whitehead Institute June 1st, 2015 Entering the CRISPR-Cas9 Era #12;Outline · The Human Genome o Basics and timeline o Exponential increase in genomic data o How to use the big data for biological discoveries · Functional Genomics · CRISPR-Cas systems o

  18. 2009 Thermochemical Conversion Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Thermochemical Conversion platform review meeting, held on April 14-16, 2009, at the Sheraton Denver Downtown, Denver, Colorado.

  19. An Energy-Efficient Biomedical Signal Processing Platform

    E-Print Network [OSTI]

    Kwong, Joyce

    This paper presents an energy-efficient processing platform for wearable sensor nodes, designed to support diverse biological signals and algorithms. The platform features a 0.5V-1.0V 16b microcontroller, SRAM, and ...

  20. Failure to Launch: Critical Mass in Platform Businesses

    E-Print Network [OSTI]

    Evans, David S.

    Platform businesses add value by facilitating interactions between customers who are attracted in part by network externalities. Two-sided platform businesses with low costs of reversing participation status have become ...

  1. SERS diagnostic platforms, methods and systems microarrays, biosensors and biochips

    DOE Patents [OSTI]

    Vo-Dinh, Tuan (Knoxville, TN)

    2007-09-11

    A Raman integrated sensor system for the detection of targets including biotargets includes at least one sampling platform, at least one receptor probe disposed on the sampling platform, and an integrated circuit detector system communicably connected to the receptor. The sampling platform is preferably a Raman active surface-enhanced scattering (SERS) platform, wherein the Raman sensor is a SERS sensor. The receptors can include at least one protein receptor and at least one nucleic acid receptor.

  2. 2011 Biomass Program Platform Peer Review: Thermochemical Conversion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Thermochemical Conversion 2011 Biomass Program Platform Peer Review: Thermochemical Conversion "This document summarizes the recommendations and evaluations provided by an...

  3. Storage Exchange: A Global Trading Platform for Storage Services

    E-Print Network [OSTI]

    Melbourne, University of

    Storage Exchange: A Global Trading Platform for Storage Services Martin Placek and Rajkumar Buyya}@csse.unimelb.edu.au Abstract. The Storage Exchange (SX) is a new platform allowing stor- age to be treated as a tradeable resource. Organisations with varying storage requirements can use the SX platform to trade and exchange

  4. Storage Exchange: A Global Trading Platform for Storage Services

    E-Print Network [OSTI]

    Melbourne, University of

    Storage Exchange: A Global Trading Platform for Storage Services Martin Placek and Rajkumar Buyya,raj}@csse.unimelb.edu.au Abstract. The Storage Exchange (SX) is a new platform allowing stor- age to be treated as a tradeable resource. Organisations with varying storage requirements can use the SX platform to trade and exchange

  5. Control Theoretic Adaptive Monitoring Tools for the Android Platform

    E-Print Network [OSTI]

    Guirguis, Mina S. - Department of Computer Science, Texas State University

    Control Theoretic Adaptive Monitoring Tools for the Android Platform DAVID REYNOLDS Department the duty cycles of the monitors. Our models and results are validated on the Android platform through emulation and real implementation on the Nexus 7 tablet. I. INTRODUCTION Motivation: The Android platform

  6. PAYLOAD POINTING AND ACTIVE VIBRATION ISOLATION USING HEXAPOD PLATFORMS

    E-Print Network [OSTI]

    PAYLOAD POINTING AND ACTIVE VIBRATION ISOLATION USING HEXAPOD PLATFORMS Hong-Jen Chen* , Ronald M isolation techniques on hexapods at the Spacecraft Research and Design Center (SRDC) of Naval Postgraduate School (NPS). The center has two hexapod platforms: Ultra Quiet Platform (UQP) and Precision Pointing

  7. Platform Based Design for Automotive Sensor Conditioning

    E-Print Network [OSTI]

    Fanucci, L; Iozzi, F; Marino, C; Rocchi, A

    2011-01-01

    In this paper a general architecture suitable to interface several kinds of sensors for automotive applications is presented. A platform based design approach is pursued to improve system performance while minimizing time-to-market.. The platform is composed by an analog front-end and a digital section. The latter is based on a microcontroller core (8051 IP by Oregano) plus a set of dedicated hardware dedicated to the complex signal processing required for sensor conditioning. The microcontroller handles also the communication with external devices (as a PC) for data output and fast prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive applications. Measured performance results outperform current state-of-the-art commercial devices.

  8. CALIOPE and TAISIR airborne experiment platform

    SciTech Connect (OSTI)

    Chocol, C.J.

    1994-07-01

    Between 1950 and 1970, scientific ballooning achieved many new objectives and made a substantial contribution to understanding near-earth and space environments. In 1986, the Lawrence Livermore National Laboratory (LLNL) began development of ballooning technology capable of addressing issues associated with precision tracking of ballistic missiles. In 1993, the Radar Ocean Imaging Project identified the need for a low altitude (1 km) airborne platform for its Radar system. These two technologies and experience base have been merged with the acquisition of government surplus Aerostats by Lawrence Livermore National Laboratory. The CALIOPE and TAISIR Programs can benefit directly from this technology by using the Aerostat as an experiment platform for measurements of the spill facility at NTS.

  9. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  10. The LEDA Platform Combinatorial and Geometric Computing

    E-Print Network [OSTI]

    Mehlhorn, Kurt

    ~iher** and Christian Uhrig*** Abstract. We give an overview of the LEDA platform for combinatorial and geometric in the text books of the area ([AtHJ83, Meh84, Tar83, CLR90, 0'R94, Woo93, Sed91, Kin90, van88, NH93 = (V, E), a node s G V, called the source, and a non-negative cost function on the edges cost : E -+ R

  11. Year 2 Report: Protein Function Prediction Platform

    SciTech Connect (OSTI)

    Zhou, C E

    2012-04-27

    Upon completion of our second year of development in a 3-year development cycle, we have completed a prototype protein structure-function annotation and function prediction system: Protein Function Prediction (PFP) platform (v.0.5). We have met our milestones for Years 1 and 2 and are positioned to continue development in completion of our original statement of work, or a reasonable modification thereof, in service to DTRA Programs involved in diagnostics and medical countermeasures research and development. The PFP platform is a multi-scale computational modeling system for protein structure-function annotation and function prediction. As of this writing, PFP is the only existing fully automated, high-throughput, multi-scale modeling, whole-proteome annotation platform, and represents a significant advance in the field of genome annotation (Fig. 1). PFP modules perform protein functional annotations at the sequence, systems biology, protein structure, and atomistic levels of biological complexity (Fig. 2). Because these approaches provide orthogonal means of characterizing proteins and suggesting protein function, PFP processing maximizes the protein functional information that can currently be gained by computational means. Comprehensive annotation of pathogen genomes is essential for bio-defense applications in pathogen characterization, threat assessment, and medical countermeasure design and development in that it can short-cut the time and effort required to select and characterize protein biomarkers.

  12. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2013-07-01

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  13. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  14. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  15. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  16. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  17. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  18. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  19. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  20. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  1. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  2. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  3. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  4. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  5. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  6. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  7. Building a Community-Focused Data Platform

    SciTech Connect (OSTI)

    Turk, Matthew J.; Warren, Michael S.; Skillman, Samuel W.

    2014-06-10

    The National Data Service (NDS) presents a broad-reaching vision of integrating discovery, publishing, and sharing of data. Metcalfe's Law states that the value of a network increases with the number of connections in the network, not the number of nodes. The NDS must develop and steward connections not only between data, as is in its vision statement, but between individuals as well. We propose that this be accomplished by explicitly developing it as a platform on which data exploration can be constructed by individual researchers.

  8. Analytical laboratory and mobile sampling platform

    SciTech Connect (OSTI)

    Stetzenbach, K.; Smiecinski, A.

    1996-04-30

    This is the final report for the Analytical Laboratory and Mobile Sampling Platform project. This report contains only major findings and conclusions resulting from this project. Detailed reports of all activities performed for this project were provided to the Project Office every quarter since the beginning of the project. This report contains water chemistry data for samples collected in the Nevada section of Death Valley National Park (Triangle Area Springs), Nevada Test Site springs, Pahranagat Valley springs, Nevada Test Site wells, Spring Mountain springs and Crater Flat and Amargosa Valley wells.

  9. Climate Finance Options Platform | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,Coal Technologies Place:StandardsFinance Options Platform Jump

  10. China Low Carbon Platform | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County,Camilla,Thermal GradientChateau TebeauFuelsLow Carbon Platform Jump

  11. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  12. Platform Design forPlatform Design for Customizable Products withCustomizable Products with

    E-Print Network [OSTI]

    (MPa) Volume (m^3) Market Demand (random) How can I handle this complex demand scenario? S2 S320 30 VPlatform Design forPlatform Design for Customizable Products withCustomizable Products with Non of Technology Atlanta, Georgia DETC2004/DTM-57469 Proceedings of DETC'04 ASME 2004 Design Engineering Technical

  13. New Phase-Integral Method Platform Function

    E-Print Network [OSTI]

    S. Yngve; B. Thidé

    2009-12-30

    The phase-integral method (PIM) is an asymptotic method of the geometrical optics or semi-classical type for solving approximately, but in many cases very accurately, a wide class of differential equations in physics. Unlike the related (J)WKB method, the higher-order corrections in the PIM can be generated from a generic, unspecified base function, providing added symmetry and flexibility. However, with the conventional approach of using the next-to-lowest (third) order correction to the integrand in the phase integral as a platform for calculating higher (fifth, seventh, ninth,...) order corrections, the higher-order calculations very often become quite complicated. We therefore introduce a new platform function, which considerably simplifies the calculation of the third-order contribution for a wide range of problems. We also present directly integrable conditions for the phase integral, which so far seem to have gone unnoticed. For a large number of observables, our analysis makes a clearer distinction between physical and, in a sense, unphysical contributions.

  14. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  15. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  16. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  17. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  18. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  19. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  20. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  1. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  2. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  3. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  4. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  5. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  6. VOLTTRON Lite: Integration Platform for the Transactional Network

    SciTech Connect (OSTI)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  7. Mechanically latchable tiltable platform for forming micromirrors and micromirror arrays

    DOE Patents [OSTI]

    Garcia, Ernest J. (Albuquerque, NM); Polosky, Marc A. (Tijeras, NM); Sleefe, Gerard E. (Cedar Crest, NM)

    2006-12-12

    A microelectromechanical (MEM) apparatus is disclosed which includes a platform that can be electrostatically tilted from being parallel to a substrate on which the platform to being tilted at an angle of 1 20 degrees with respect to the substrate. Once the platform has been tilted to a maximum angle of tilt, the platform can be locked in position using an electrostatically-operable latching mechanism which engages a tab protruding below the platform. The platform has a light-reflective upper surface which can be optionally coated to provide an enhanced reflectivity and form a micromirror. An array of such micromirrors can be formed on a common substrate for applications including optical switching (e.g. for fiber optic communications), optical information processing, image projection displays or non-volatile optical memories.

  8. Vibration Model Validation for Linear Collider Detector Platforms

    SciTech Connect (OSTI)

    Bertsche, Kirk; Amann, J.W.; Markiewicz, T.W.; Oriunno, M.; Weidemann, A.; White, G.; /SLAC

    2012-05-16

    The ILC and CLIC reference designs incorporate reinforced-concrete platforms underneath the detectors so that the two detectors can each be moved onto and off of the beamline in a Push-Pull configuration. These platforms could potentially amplify ground vibrations, which would reduce luminosity. In this paper we compare vibration models to experimental data on reinforced concrete structures, estimate the impact on luminosity, and summarize implications for the design of a reinforced concrete platform for the ILC or CLIC detectors.

  9. Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms

    E-Print Network [OSTI]

    Williams, Samuel

    2009-01-01

    Yelick, and J. Demmel. Optimization of Sparse Matrix-Vectorand R. Vuduc. Sparsity: Optimization framework for sparseYelick. Memory hierarchy optimizations and bounds for sparse

  10. Dynamic analysis of multiple-body floating platforms coupled with mooring lines and risers 

    E-Print Network [OSTI]

    Kim, Young-Bok

    2004-09-30

    is included in Morison's drag force formula. In case of FPSO, the wind and current forces are generated using the respective coefficients given in the OCIMF data sheet. A finite element method is derived for the long elastic element of an arbitrary shape...

  11. Microbial Fuel Cells in a Microfluidic Platform | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Microbial Fuel Cells in a Microfluidic Platform Microbial fuel cells have gained popularity as a viable, environmentally friendly alternative to batteries, once a few challenges...

  12. SCOR WG meeting November 2000 Innovative platform & deployment approaches

    E-Print Network [OSTI]

    Griffiths, Gwyn

    SCOR WG meeting November 2000 Innovative platform & deployment approaches: Challenges, potential 14 Sub Scotia Öbiomass(tonnes) missions 193-195 mission 196 AUV & Scotia biomass comparison

  13. Outage Performance of Double Stratospheric Platforms Diversity Systems

    E-Print Network [OSTI]

    Gesbert, David

    /stratospheric platforms (HAPs) are either airships or planes that operate in the stratosphere, 17-22km above the ground [1

  14. Sandia Energy - Study Compares Floating-Platform Options for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Study Compares Floating-Platform Options for Offshore Vertical-Axis Wind Turbines Home Renewable Energy Energy Partnership News Wind Energy News & Events Study Compares...

  15. Software platform for integrated water quality decision support systems

    E-Print Network [OSTI]

    Software platform for integrated water quality decision support systems P. Cianchi*, S. Marsili Processing) modules with limited computing capacity. Defining agents as a self contained software program

  16. Design and Control of a Ship Motion Simulation Platform from...

    Office of Scientific and Technical Information (OSTI)

    Article: Design and Control of a Ship Motion Simulation Platform from an Energy Efficiency Perspective Citation Details In-Document Search Title: Design and Control of a Ship...

  17. Design and Optimization of a Biochemical Production Platform...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Review Eric J. Steen, Ph.D. Lygos, Inc. DESIGN & OPTIMIZATION OF A BIOCHEMICAL PRODUCTION PLATFORM WITH BIOSENSOR-GUIDED SYNTHETIC EVOLUTION 2 CELLULOSIC SUGARS MALONYL-COA...

  18. 2011 Biomass Program Platform Peer Review: Biochemical Conversion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biochemical Conversion 2011 Biomass Program Platform Peer Review: Biochemical Conversion This document summarizes the recommendations and evaluations provided by an independent...

  19. Towards Building a Blog Preservation Platform

    E-Print Network [OSTI]

    Kasioumis, Nikos; Kalb, Hendrik

    2013-01-01

    Social media content and user participation has increased dramatically since the advent of Web 2.0. Blogs have become relevant to every aspect of business and personal life. Nevertheless, we do not have the right tools to aggregate and preserve blog content correctly, as well as to manage blog archives effectively. Given the rising importance of blogs, it is crucial to build systems to facilitate blog preservation, safeguarding an essential part of our heritage that will prove valuable for current and future generations. In this paper, we present our work in progress towards building a novel blog preservation platform featuring robust digital preservation, management and dissemination facilities for blogs. This work is part of the BlogForever project which is aiming to make an impact to the theory and practice of blog preservation by creating guidelines and software that any individual or organization could use to preserve their blogs.

  20. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  1. Multiple mass solvers

    E-Print Network [OSTI]

    B. Jegerlehner

    1997-08-29

    We present a general method to construct multiple mass solvers from standard algorithms. As an example, the BiCGstab-M algorithm is derived.

  2. The Mars Hopper: a radioisotope powered, impulse driven, long-range, long-lived mobile platform for exploration of Mars

    SciTech Connect (OSTI)

    Steven D. Howe; Robert C. O'Brien; William Taitano; Doug Crawford; Nathan Jerred; Spencer Cooley; John Crapeau; Steve Hansen; Andrew Klein; James Werner

    2011-02-01

    Planetary exploration mission requirements are becoming more demanding. Due to the increasing cost, the missions that provide mobile platforms that can acquire data at multiple locations are becoming more attractive. Wheeled vehicles such as the MER rovers have proven extremely capable but have very limited range and cannot traverse rugged terrain. Flying vehicles such as balloons and airplanes have been proposed but are problematic due to the very thin atmospheric pressure and the strong, dusty winds present on Mars. The Center for Space Nuclear Research has designed an instrumented platform that can acquire detailed data at hundreds of locations during its lifetime - a Mars Hopper. The Mars Hopper concept utilizes energy from radioisotopic decay in a manner different from any existing radioisotopic power sources—as a thermal capacitor. By accumulating the heat from radioisotopic decay for long periods, the power of the source can be dramatically increased for short periods. The platform will be able to "hop" from one location to the next every 5-7 days with a separation of 5-10 km per hop. Preliminary designs show a platform that weighs around 52 kgs unfueled which is the condition at deployment. Consequently, several platforms may be deployed on a single launch from Earth. With sufficient lifetime, the entire surface of Mars can be mapped in detail by a couple dozen platforms. In addition, Hoppers can collect samples from all over the planet, including gorges, mountains and crevasses, and deliver them to a central location for eventual pick-up by a Mars Sample Return mission. The status of the Mars Hopper development project at the CSNR is discussed.

  3. An Open and Integrated Management Platform for Wireless Sensor Networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    such as heterogeneity, limited bandwidth and energy constraints, WSN management and monitoring architectures need to and management platform, and OpenRSM, an open source integrated remote systems and network management platform. The proposed system architecture can support several levels of integration (infrastructure management

  4. Microfluidics for biological analysis: Triumphs and hurdles of CD platforms

    E-Print Network [OSTI]

    Giri, Ranjit K.

    Microfluidics for biological analysis: Triumphs and hurdles of CD platforms JONATHAN SIEGRIST1 , R on microfluidic technologies has become extensive, particularly in regards to the develop- ment of sample. Centrifugal microfluidic platforms based on the compact-disc format are discussed, along with the advantages

  5. A Java Middleware Platform for Resource-Aware Distributed Applications

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

  6. OSCAR Compiler Controlled Multicore Power Reduction on Android Platform

    E-Print Network [OSTI]

    Kasahara, Hironori

    OSCAR Compiler Controlled Multicore Power Reduction on Android Platform Hideo Yamamoto1 , Tomohiro Automatic Parallelizing Compiler on an Android platform with the newly developed precise power measurement con- trol, power reduction, multicore processor, Android, WFI #12;2 H. Yamamoto et al. 1 Introduction

  7. System Level Platform Modeling for System-on-Chip

    E-Print Network [OSTI]

    is needed. In this project, SoC performance estimation techniques are explored, focusing on processor for a given application. To do so, however, fast and accurate estimation of each design's performance-based platforms. A flex- ible methodology, the SoC Platform Architecture Model (SPAM), is developed for specifying

  8. A MODELING APPROACH FOR LOCATING LOGISTICS PLATFORMS FOR FAST PARCEL

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 29 A MODELING APPROACH FOR LOCATING LOGISTICS PLATFORMS FOR FAST PARCEL DELIVERY IN URBAN AREAS for optimizing, in a sustainable way (i.e. economical, eco-friendly and societal), the location of logistics has a logistics platform right in its centre (ARENC: 41362 m2 of warehouses and offices

  9. Software Platforms for Smart Building Ecosystems: Understanding the

    E-Print Network [OSTI]

    Software Platforms for Smart Building Ecosystems: Understanding the Key Architectural-ready software platform for the smart building domain. We analyzed the type of contributors that may exist in a smart building ecosystem, the quality attributes that those roles are concerned with, and the key

  10. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W. (Tracy, CA)

    1994-01-01

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  11. DOE Hybrid and Electric Vehicle Test Platform

    SciTech Connect (OSTI)

    Gao, Yimin [Advanced Vehicle Research Center, Danville, VA (United States)

    2012-03-31

    Based on the contract NT-42790 to the Department of Energy, “Plug-in Hybrid Ethanol Research Platform”, Advanced Vehicle Research Center (AVRC) Virginia has successfully developed the phase I electric drive train research platform which has been named as Laboratory Rapid Application Testbed (LabRAT). In phase II, LabRAT is to be upgraded into plug-in hybrid research platform, which will be capable of testing power systems for electric vehicles, and plug-in hybrid electric vehicles running on conventional as well as alternative fuels. LabRAT is configured as a rolling testbed with plentiful space for installing various component configurations. Component connections are modularized for flexibility and are easily replaced for testing various mechanisms. LabRAT is designed and built as a full functional vehicle chassis with a steering system, brake system and four wheel suspension. The rear drive axle offers maximum flexibility with a quickly changeable gear ratio final drive to accommodate different motor speed requirements. The electric drive system includes an electric motor which is mechanically connected to the rear axle through an integrated speed/torque sensor. Initially, a 100 kW UQM motor and corresponding UQM motor controller is used which can be easily replaced with another motor/controller combination. A lithium iron phosphate (LiFePO4) battery pack is installed, which consists of 108 cells of 100 AH capacity, giving the total energy capacity of 32.5 kWh. Correspondingly, a fully functional battery management system (BMS) is installed to perform battery cell operation monitoring, cell voltage balancing, and reporting battery real time operating parameters to vehicle controller. An advanced vehicle controller ECU is installed for controlling the drive train. The vehicle controller ECU receives traction or braking torque command from driver through accelerator and brake pedal position sensors and battery operating signals from the BMS through CAN BUS, and then generates motor torque command (traction or braking) to the motor controller based on the control algorithm software embedded in the vehicle controller ECU. The vehicle controller ECU is a re-programmable electronic control unit. Any control algorithm software developed can be easily downloaded to vehicle controller ECU to test any newly developed control strategy. The flexibility of the control system significantly enhances the practical applicability of the LabRAT. A new test methodology has been developed for the LabRAT simulating any vehicles running on road with different weights from compact passenger car to light duty truck on an AC or eddy current dynamometers without much effort for modification of the system. LabRAT is equipped with a fully functional data acquisition system supplied by CyberMetrix. The measurement points along the drive train are DC electric power between battery pack and motor controller input, AC electric power between motor controller and electric motor, mechanical power between motor and rear axle. The data acquisition system is designed with more capability than current requirements in order to meet the requirements for phase II.

  12. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  13. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  14. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  15. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  16. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  17. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  18. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  19. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  20. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  1. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  2. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  3. An Estimation and Simulation Framework for Energy Efficient Design using Platform FPGAs

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    An Estimation and Simulation Framework for Energy Efficient Design using Platform FPGAs Sumit an estimation and simulation framework for energy efficient application design using platform FPGAs. This framework integrates various widely used simulators available for platform FPGAs, allows specification

  4. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  5. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  6. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  7. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  8. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  9. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  10. The SMART Platform: early experience enabling substitutable applications for electronic health records

    E-Print Network [OSTI]

    Murphy, Shawn N.

    Objective The Substitutable Medical Applications, Reusable Technologies (SMART) Platforms project seeks to develop a health information technology platform with substitutable applications (apps) constructed around core ...

  11. Platforms and Methods for In Situ Characterization of Li-ion...

    Office of Scientific and Technical Information (OSTI)

    Platforms and Methods for In Situ Characterization of Li-ion Battery Materials. Citation Details In-Document Search Title: Platforms and Methods for In Situ Characterization of...

  12. Tracking Provenance in ORNL's Flexible Research Platforms

    SciTech Connect (OSTI)

    Hensley, Zachary P; Sanyal, Jibonananda; New, Joshua Ryan

    2013-08-01

    Provenance is dened as information about the origin of objects, a concept that applies to both physical and digital objects and often overlaps both. The use of provenance in systems designed for research is an important but forgotten feature. Provenance allows for proper and exact tracking of information, its use, its lineage, its derivations and other metadata that are important for correctly adhering to the scien- tic method. In our project's prescribed use of provenance, researchers can determine detailed information about the use of sensor data in their experiments on ORNL's Flexible Research Platforms (FRPs). Our project's provenance system, Provenance Data Management System (ProvDMS), tracks information starting with the creation of information by an FRP sensor. The system determines station information, sensor information, and sensor channel information. The system allows researchers to derive generations of experiments from the sensor data and tracks their hierarchical flow. Key points can be seen in the history of the information as part of the information's workflow. The concept of provenance and its usage in science is relatively new and while used in other cases around the world, our project's provenance diers in a key area. To keep track of provenance, most systems must be designed or redesigned around the new provenance system. Our system is designed as a cohesive but sepa- rate entity and allows for researchers to continue using their own methods of analysis without being constrained in their ways in order to track the provenance. We have designed ProvDMS using a lightweight provenance library, Core Provenance Library (CPL) v.6 In addition to keeping track of sensor data experiments and its provenance, ProvDMS also provides a web-enabled visualization of the inheritance.

  13. Motivation for the Transaction-Based Reference Platform

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Motivation for the Transaction-Based Reference Platform Or How I learned to Stop Worrying and Love Transactions George Hernandez Pacific Northwest National Lab July 23-24, 2015...

  14. Design of miniature floating platform for marginal fields

    E-Print Network [OSTI]

    Miao, Sha, S.M. Massachusetts Institute of Technology

    2013-01-01

    This thesis presents the design of a novel type of miniature floating offshore platforms with a heave plate attached at the keel, suitable for developing deep-water marginal fields. This design features a small displacement, ...

  15. Design and implementation of an automated battery management platform

    E-Print Network [OSTI]

    Toksoz, Tuna

    2012-01-01

    This thesis describes the design and the implementation of the hardware platform for automated battery management with battery changing/charging capability for autonomous UAV missions with persistency requirement that ...

  16. Development and optimization of high-throughput zebrafish screening platform

    E-Print Network [OSTI]

    Koo, Bryan Kyo

    2010-01-01

    The high-throughput zebrafish screening platform is a revolutionary tool that enables subcellular precision in vivo whole animal screening of Danio Rerio. It can perform laser surgery and/or imaging in less than twenty ...

  17. An architectural selection framework for data fusion in sensor platforms

    E-Print Network [OSTI]

    Mirza, Atif R

    2007-01-01

    The role of data fusion in sensor platforms is becoming increasingly important in various domains of science, technology and business. Fusion pertains to the merging or integration of information towards an enhanced level ...

  18. A platform based approach for embedded systems software development

    E-Print Network [OSTI]

    Seth, Deepak

    2006-01-01

    A platform based approach for product development allows companies to eliminate redundancies, efficiently utilize its resources and provide products for a wider market. The basic idea is to develop and share key components ...

  19. A Complete Microfluidic Screening Platform for Rational Protein Crystallization

    E-Print Network [OSTI]

    Hansen, Carl L.

    A Complete Microfluidic Screening Platform for Rational Protein Crystallization Billy T. C. Lau integration, and low reagent consumption, microfluidic devices have emerged as viable technologies for protein crystallization. Current microfluidic crystallization technologies have focused on two separate strategies: one

  20. Development of a microfluidic platform for integrated DNA sequencing protocols

    E-Print Network [OSTI]

    Kumar, Mayank, S.M. Massachusetts Institute of Technology

    2007-01-01

    This thesis describes the design and development of a microfluidic platform to reduce costs and improve the quality of in the DNA sequencing methodology currently implemented at the Broad Institute in Cambridge, Massachusetts. ...

  1. Platform-independent method for computer aided schematic drawings

    DOE Patents [OSTI]

    Vell, Jeffrey L. (Slingerlands, NY); Siganporia, Darius M. (Clifton Park, NY); Levy, Arthur J. (Fort Lauderdale, FL)

    2012-02-14

    A CAD/CAM method is disclosed for a computer system to capture and interchange schematic drawing and associated design information. The schematic drawing and design information are stored in an extensible, platform-independent format.

  2. Standard Energy Efficiency Data (SEED) Platform Homepage Screenshot

    Broader source: Energy.gov [DOE]

    The Standard Energy Efficiency Data (SEED) Platform™ is an open source software application that helps organizations easily manage data on the energy performance of large groups of buildings. This is a screenshot of the application homepage.

  3. Acoustic classification of buried objects with mobile sonar platforms

    E-Print Network [OSTI]

    Edwards, Joseph Richard, 1971-

    2006-01-01

    In this thesis, the use of highly mobile sonar platforms is investigated for the purpose of acoustically classifying compact objects on or below the seabed. The extension of existing strategies, including synthetic aperture ...

  4. Communication centric platforms for future high data intensive applications 

    E-Print Network [OSTI]

    Ahmad, Balal

    The notion of platform based design is considered as a viable solution to boost the design productivity by favouring reuse design methodology. With the scaling down of device feature size and scaling up of design complexity, ...

  5. Analyzing and Detecting Malicious Activities in Emerging Communication Platforms 

    E-Print Network [OSTI]

    Yang, Chao

    2014-06-05

    and smartphone platforms, and to develop effective and efficient defense approaches against those malicious activities. Firstly, this dissertation performs an empirical analysis of the cyber criminal ecosystem on a large-scale online social networking website...

  6. Membrane Vesicles as a Vaccine Platform For Salmonella 

    E-Print Network [OSTI]

    Hinkley, Megan L

    2012-07-11

    . Current vesicle vaccine platforms include inactivated, non-replicating, or synthetic liposomes which do not produce a robust immune response because they lack foreign distinctness and complexity. Membrane vesicles (MVs), released in a conserved process...

  7. 2011 Biomass Program Platform Peer Review: Integrated Biorefineries...

    Broader source: Energy.gov (indexed) [DOE]

    provided by an independent external panel of experts at the U.S. Department of Energy Biomass Programs Integrated Biorefinery Platform Review meeting, held on February 1...3,...

  8. Fluidics platform and method for sample preparation and analysis

    DOE Patents [OSTI]

    Benner, W. Henry; Dzenitis, John M.; Bennet, William J.; Baker, Brian R.

    2014-08-19

    Herein provided are fluidics platform and method for sample preparation and analysis. The fluidics platform is capable of analyzing DNA from blood samples using amplification assays such as polymerase-chain-reaction assays and loop-mediated-isothermal-amplification assays. The fluidics platform can also be used for other types of assays and analyzes. In some embodiments, a sample in a sealed tube can be inserted directly. The following isolation, detection, and analyzes can be performed without a user's intervention. The disclosed platform may also comprises a sample preparation system with a magnetic actuator, a heater, and an air-drying mechanism, and fluid manipulation processes for extraction, washing, elution, assay assembly, assay detection, and cleaning after reactions and between samples.

  9. Platform project management : optimizing product development by actively managing commonality

    E-Print Network [OSTI]

    Pinillos Montaño, Raúl

    2011-01-01

    Product platforms have proved to be an effective strategy for designing and manufacturing products in companies that provide different products for different customer needs. By designing common parts and creating product ...

  10. Seafloor anchoring for platforms in the Messina Strait

    E-Print Network [OSTI]

    Manno, Antonioluca

    2010-01-01

    The importance of properly designing and selecting an anchor is key to reliable techniques for floating offshore platforms including power generation from marine currents. Numerous studies have demonstrated how the uplift ...

  11. Mini: A Minimal Platform Comparable to Jini for Ubiquitous Computing

    E-Print Network [OSTI]

    Lenders, Vincent

    Mini: A Minimal Platform Comparable to Jini for Ubiquitous Computing Polly Huang, Vincent Lenders, Philipp Minnig, and Mario Widmer ETH Z¨urich, Z¨urich ZH 8092, Switzerland, {huang, lenders

  12. 2011 Biomass Program Platform Peer Review: Biochemical Conversion

    SciTech Connect (OSTI)

    Pezzullo, Leslie

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Biochemical Conversion Platform Review meeting.

  13. 2011 Biomass Program Platform Peer Review. Thermochemical Conversion

    SciTech Connect (OSTI)

    Grabowski, Paul E.

    2012-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2011 U.S. Department of Energy Biomass Program’s Thermochemical Conversion Platform Review meeting.

  14. FOURIER TRANSFORM MULTIPLE QUANTUM NMR

    E-Print Network [OSTI]

    Drobny, G.

    2011-01-01

    of transition observed in Fourier transform multiple quantumDecember 18-19, 1979 FOURIER TRANSFORM MULTIPLE QUANTUM NMRof London, December 1978. FOURIER TRANSFO~~ MULTIPLE QUANTUM

  15. A Platform for Implementing Secure Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Farkas, Gyula; Haller, Piroska

    2010-01-01

    We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the Ethernet layer. Within our platform we use a new security protocol that we designed to ensure mutual authentication between nodes and a secure key exchange. The correctness of the proposed security protocol is ensured by Guttman's authentication tests.

  16. A Functional Test Platform for the Community Land Model

    SciTech Connect (OSTI)

    Xu, Yang [ORNL] [ORNL; Thornton, Peter E [ORNL] [ORNL; King, Anthony Wayne [ORNL] [ORNL; Steed, Chad A [ORNL] [ORNL; Gu, Lianhong [ORNL] [ORNL; Schuchart, Joseph [ORNL] [ORNL

    2014-01-01

    A functional test platform is presented to create direct linkages between site measurements and the process-based ecosystem model within the Community Earth System Models (CESM). The platform consists of three major parts: 1) interactive user interfaces, 2) functional test model and 3) observational datasets. It provides much needed integration interfaces for both field experimentalists and ecosystem modelers to improve the model s representation of ecosystem processes within the CESM framework without large software overhead.

  17. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, Jr., Harry K. (Birmingham, MI)

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  18. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  19. Shasta/Mustique subsea equipment platform interface and operability

    SciTech Connect (OSTI)

    Jefferies, A.T.; Loegering, C.; Steib, D.; Schlater, D.

    1996-12-31

    The economic benefits of all inclusive systems engineering approach is now recognized in the offshore industry. Nowhere is this more evident than in the area of deepwater subsea tiebacks to existing facilities. This type of development requires effective management of the interfaces between personnel on the existing facility and the new project team, the interfaces between the new subsea facilities and the existing platform, and the interface of the new operating procedures with the existing platform daily routine. A second factor in the economic viability of many of these projects is the need to minimize operating costs by avoiding the need for subsea system repair intervention. An operability analysis focusing on the subsea system and platform interface engineering was used on the Hardy projects to address the concerns with the potential for interventions. With minimum operating costs as a primary goal, Hardy encouraged participation from both host platform operating groups from the outset of both projects. This cooperation was critical since both projects were planned to more than double the throughput for both host platforms without adding platform operating personnel. The approach of operator involvement also ensured a safe, reliable, and economic transition between the installation and operating phases of the developments.

  20. Blade platform seal for ceramic/metal rotor assembly

    DOE Patents [OSTI]

    Wertz, John L. (Indianapolis, IN)

    1982-01-01

    A combination ceramic and metal turbine rotor for use in high temperature gas turbine engines includes a metal rotor disc having a rim with a plurality of circumferentially spaced blade root retention slots therein to receive a plurality of ceramic blades, each including side platform segments thereon and a dovetail configured root slidably received in one of the slots. Adjacent ones of the platform segments including edge portions thereon closely spaced when the blades are assembled to form expansion gaps in an annular flow surface for gas passage through the blades and wherein the assembly further includes a plurality of unitary seal members on the rotor connected to its rim and each including a plurality of spaced, axially extending, flexible fingers that underlie and conform to the edge portions of the platform segments and which are operative at turbine operating temperatures and speeds to distribute loading on the platform segments as the fingers are seated against the underside of the blade platforms to seal the gaps without undesirably stressing thin web ceramic sections of the platform.

  1. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  2. Fast matrix multiplication is stable

    E-Print Network [OSTI]

    Demmel, James; Holtz, Olga; Kleinberg, Robert; Dumitriu, Ioana

    2007-01-01

    Raz. On the complexity of matrix product. SIAM J. Comput. ,of fast algorithms for matrix multiplication. Num. Math. ,and Shmuel Winograd. Matrix multiplication via arithmetic

  3. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  4. Space qualified nanosatellite electronics platform for photon pair experiments

    E-Print Network [OSTI]

    Cliff Cheng; Rakhitha Chandrasekara; Yue Chuan Tan; Alexander Ling

    2015-05-25

    We report the design and implementation of a complete electronics platform for conducting a quantum optics experiment that will be operated on board a 1U CubeSat (a 10 x 10 x 10 cm satellite). The quantum optics experiment is designed to produce polarization-entangled photon pairs using non-linear optical crystals and requires opto-electronic components such as a pump laser, single photon detectors and liquid crystal based polarization rotators in addition to passive optical elements. The platform provides mechanical support for the optical assembly. It also communicates autonomously with the host satellite to provide experiment data for transmission to a ground station. A limited number of commands can be transmitted from ground to the platform enabling it to switch experimental modes. This platform requires less than 1.5W for all operations, and is space qualified. The implementation of this electronics platform is a major step on the road to operating quantum communication experiments using nanosatellites.

  5. Coiled tubing deployed ESP on the Auk platform

    SciTech Connect (OSTI)

    Stewart, D.W.; Watkins, P.; Holtslag, R.J.; Hudson, A.; Wee, P.Y.; McCleery, B.

    1996-12-31

    In March 1995, what is believed to be the world`s first offshore coiled tubing deployed electrical submersible pump (ESP) was successfully commissioned in well AA-03S1 on Shell U.K. Exploration and Production (Shell Expro) Auk platform in the United Kingdom`s Central North Sea. The ESP provides a new and important method of artificial lift for the 21 year old Auk platform, which hitherto had relied upon downhole hydraulic jet pumps to lift approximately half of the platform`s oil production. The coiled tubing deployment proved the viability of performing future workovers with or without the assistance or indeed the presence of a drilling package. The novel completion design successfully catered to the wide variety of customer requirements; Well Engineering for a rigless workover, Petroleum Engineering for reservoir access and Facilities Engineering for a specified flowline height. The experience gained during this project will be a valuable input in determining the future artificial lift strategy for this platform and for other prospects in terms of performance, reliability and operating costs.

  6. D0 Cryogenic System Superconducting Solenoid Platform I/O

    SciTech Connect (OSTI)

    Markley, D.; /Fermilab

    1997-10-09

    The Dzero detector is scheduled for a major upgrade between 1996 and 1999. This note describes the specifications and configuration of the physical Input/Output devices and instrumentation of the 2 Tesla Superconducting Solenoid. The Solenoid and the VLPC cryostats both reside on the detector platform and are cooled by the Dzero Helium Refrigerator. The cryogenic process control s for these two components will be an extension of the TI565 programmable logic controller system used for other Dzero cryogenic controls. Two Input/Output Bases will be installed on the Dzero detector platform near the cryo corner. These I/O bases will handle all the sensor input and process control output devices from the Solenoid and VLPC cryostats. Having the I/O bases installed on the detector platform makes the connecting cabl ing to the platform much easier . All the instruments are wired directly to the I/O base. The bases have only one communications network cabl e that must be routed off the platform to the South side of the Dzero building.

  7. Modular turbine airfoil and platform assembly with independent root teeth

    DOE Patents [OSTI]

    Campbell, Christian X; Davies, Daniel O; Eng, Darryl

    2013-07-30

    A turbine airfoil (22E-H) extends from a shank (23E-H). A platform (30E-H) brackets or surrounds a first portion of the shank (23E-H). Opposed teeth (33, 35) extend laterally from the platform (30E-H) to engage respective slots (50) in a disk. Opposed teeth (25, 27) extend laterally from a second portion of the shank (29) that extends below the platform (30E-H) to engage other slots (52) in the disk. Thus the platform (30E-H) and the shank (23E-H) independently support their own centrifugal loads via their respective teeth. The platform may be formed in two portions (32E-H, 34E-H), that are bonded to each other at matching end-walls (37) and/or via pins (36G) passing through the shank (23E-H). Coolant channels (41, 43) may pass through the shank beside the pins (36G).

  8. Kilovoltage Rotational External Beam Radiotherapy on a Breast Computed Tomography Platform: A Feasibility Study

    SciTech Connect (OSTI)

    Prionas, Nicolas D.; McKenney, Sarah E. [Department of Radiology, University of California, Davis, Medical Center, Sacramento, California (United States)] [Department of Radiology, University of California, Davis, Medical Center, Sacramento, California (United States); Stern, Robin L. [Department of Radiation Oncology, University of California, Davis, Medical Center, Sacramento, California (United States)] [Department of Radiation Oncology, University of California, Davis, Medical Center, Sacramento, California (United States); Boone, John M., E-mail: jmboone@ucdavis.edu [Department of Radiology, University of California, Davis, Medical Center, Sacramento, California (United States)

    2012-10-01

    Purpose: To demonstrate the feasibility of a dedicated breast computed tomography (bCT) platform to deliver rotational kilovoltage (kV) external beam radiotherapy (RT) for partial breast irradiation, whole breast irradiation, and dose painting. Methods and Materials: Rotational kV-external beam RT using the geometry of a prototype bCT platform was evaluated using a Monte Carlo simulator. A point source emitting 178 keV photons (approximating a 320-kVp spectrum with 4-mm copper filtration) was rotated around a 14-cm voxelized polyethylene disk (0.1 cm tall) or cylinder (9 cm tall) to simulate primary and primary plus scattered photon interactions, respectively. Simulations were also performed using voxelized bCT patient images. Beam collimation was varied in the x-y plane (1-14 cm) and in the z-direction (0.1-10 cm). Dose painting for multiple foci, line, and ring distributions was demonstrated using multiple rotations with varying beam collimation. Simulations using the scanner's native hardware (120 kVp filtered by 0.2-mm copper) were validated experimentally. Results: As the x-y collimator was narrowed, the two-dimensional dose profiles shifted from a cupped profile with a high edge dose to an increasingly peaked central dose distribution with a sharp dose falloff. Using a 1-cm beam, the cylinder edge dose was <7% of the dose deposition at the cylinder center. Simulations using 120-kVp X-rays showed distributions similar to the experimental measurements. A homogeneous dose distribution (<2.5% dose fluctuation) with a 20% decrease in dose deposition at the cylinder edge (i.e., skin sparing) was demonstrated by weighted summation of four dose profiles using different collimation widths. Simulations using patient bCT images demonstrated the potential for treatment planning and image-guided RT. Conclusions: Rotational kV-external beam RT for partial breast irradiation, dose painting, and whole breast irradiation with skin sparing is feasible on a bCT platform with the potential for high-resolution image-guided RT.

  9. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  10. Cross-platform validation and analysis environment for particle physics

    E-Print Network [OSTI]

    S. V. Chekanov; I. Pogrebnyak; D. Wilbern

    2015-10-20

    A multi-platform validation and analysis framework for public Monte Carlo simulation for high-energy particle collisions is discussed. The front-end of this framework uses the Python programming language, while the back-end is written in Java, which provides a multi-platform environment that can be run from a web browser and can easily be deployed at the grid sites. The analysis package includes all major software tools used in high-energy physics, such as Lorentz vectors, jet algorithms, histogram packages, graphic canvases, and tools for providing data access. This multi-platform software suite, designed to minimize OS-specific maintenance and deployment time, is used for online validation of Monte Carlo event samples through a web interface.

  11. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  12. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  13. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  14. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  15. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  16. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  17. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  18. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  19. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  20. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  1. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  2. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  3. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  4. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  5. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  6. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  7. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  8. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  9. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  11. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  12. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect (OSTI)

    Singleton, M

    2009-07-08

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

  13. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  14. Home Energy Management as a Service over Networking Platforms

    E-Print Network [OSTI]

    Al Faruque, Mohammad Abdullah

    pattern, for instance, the U.S. state of California mandated Zero Net Energy buildings by 2020 Zero Net Energy (ZNE) buildings by 2020 [2]. Also, the U.S. Department of Energy (DOE) BuildingHome Energy Management as a Service over Networking Platforms Korosh Vatanparvar, Quan Chau

  15. Biomass Program 2007 Peer Review - Integrated Biorefinery Platform Summary

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Integrated Biorefinery Platform Review held on August 13-15, 2007 in Golden, Colorado.

  16. Wireless Industrial Monitoring and Control using a Smart Sensor Platform

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Wireless Industrial Monitoring and Control using a Smart Sensor Platform Harish Ramamurthy, B. S/RF link specific firmware modules `over-the-air'. Sample implementations for industrial applications attention of the industry on account of reduced costs, better power management, ease in maintenance

  17. A Collaborative Web Service Platform for AEC Supply Chain

    E-Print Network [OSTI]

    Stanford University

    A Collaborative Web Service Platform for AEC Supply Chain Chin-Pang Jack Cheng*§ , Kincho H. Law ubiquitous and online information grows, the web services model has emerged as a promising approach: AEC supply chain; information sharing; online collaboration; web services model; service- oriented

  18. Reusable plasmonic substrates fabricated by interference lithography: a platform for

    E-Print Network [OSTI]

    Dalang, Robert C.

    steps only, lithographic patterning followed by metal evaporation. Both processes may be performed over open a powerful platform within an analytical tool and in particular for systematic SERS studies repeated cycles of use.[10] Substrate reusability has previously been reported with the use of random

  19. Cell Host & Microbe A Plant Phosphoswitch Platform Repeatedly

    E-Print Network [OSTI]

    Dangl, Jeff

    Cell Host & Microbe Article A Plant Phosphoswitch Platform Repeatedly Targeted by Type III Effector://dx.doi.org/10.1016/j.chom.2014.09.004 SUMMARY Plants detect microbes via two functionally intercon- nected tiers plasma-membrane-tethered pro- tein RIN4 negatively regulates microbe-associated molecular pattern (MAMP

  20. Structural health monitoring sensor development for the Imote2 platform

    E-Print Network [OSTI]

    Spencer Jr., B.F.

    Structural health monitoring sensor development for the Imote2 platform Jennifer A. Rice*a and B motivated researchers to seek effective methods for real-time structural health monitoring (SHM that is necessary to successfully implement SHM algorithms. Keywords: Structural health monitoring, smart sensor

  1. Changes in Pilot Control Behaviour across Stewart Platform Motion Systems

    E-Print Network [OSTI]

    Changes in Pilot Control Behaviour across Stewart Platform Motion Systems F. M. Nieuwenhuizen1,2, H system bandwidth has a significant effect on performance and control behaviour. Participants barely use of Korea Low-cost motion systems have been proposed for certain training tasks that would otherwise

  2. ORIGINAL PAPER Flexible product platforms: framework and case study

    E-Print Network [OSTI]

    de Weck, Olivier L.

    and manufacturing strategies. Two of the more successful strategies were the lean manufacturing strategy (Womack et (Sanderson and Uzumeri 1997). Manufacturers were forced to seek more efficient and flexible product design al. 1991) and the product platform strategy (Meyer and Lehnerd 1997; Bremmer 1999). The lean

  3. FUTURE POWER GRID INITIATIVE An Intelligent Agent Platform

    E-Print Network [OSTI]

    FUTURE POWER GRID INITIATIVE VOLTTRONTM : An Intelligent Agent Platform for the Smart Grid Two-way Power Flows n Decentralized Control To Support Micro-Grids And Islanding n Enable Load, not developed past simulation, and/or do not fit the requirements of the power grid. VOLTTRON has become

  4. Solar: An Open Platform for Context-Aware Mobile Applications

    E-Print Network [OSTI]

    Kotz, David

    Solar: An Open Platform for Context-Aware Mobile Applications Guanling Chen and David Kotz Dept the user state and the physical and computational environ- ment in which they run. Solar is a middleware into the in- frastructure, Solar allows applications to run on thin mo- bile clients more effectively

  5. Hydra: A Platform for Survivable and Secure Data Storage Systems

    E-Print Network [OSTI]

    Xu, Lihao

    Hydra: A Platform for Survivable and Secure Data Storage Systems Lihao Xu Dept. of Computer Science are devel- oping for highly survivable and secure data storage systems that distribute information over on user data. We also explore Hydra's applications in survivable and secure data storage systems

  6. Graph processing platforms at scale: practices and experiences

    SciTech Connect (OSTI)

    Lim, Seung-Hwan; Lee, Sangkeun; Brown, Tyler C; Sukumar, Sreenivas R; Ganesh, Gautam

    2015-01-01

    Graph analysis unveils hidden associations of data in many phenomena and artifacts, such as road network, social networks, genomic information, and scientific collaboration. Unfortunately, a wide diversity in the characteristics of graphs and graph operations make it challenging to find a right combination of tools and implementation of algorithms to discover desired knowledge from the target data set. This study presents an extensive empirical study of three representative graph processing platforms: Pegasus, GraphX, and Urika. Each system represents a combination of options in data model, processing paradigm, and infrastructure. We benchmarked each platform using three popular graph operations, degree distribution, connected components, and PageRank over a variety of real-world graphs. Our experiments show that each graph processing platform shows different strength, depending the type of graph operations. While Urika performs the best in non-iterative operations like degree distribution, GraphX outputforms iterative operations like connected components and PageRank. In addition, we discuss challenges to optimize the performance of each platform over large scale real world graphs.

  7. The Energy Landscape Library A Platform for Generic Algorithms

    E-Print Network [OSTI]

    Will, Sebastian

    Will , and Rolf Backofen Bioinformatics, University Freiburg, Germany Abstract. The study of energy landscapesThe Energy Landscape Library A Platform for Generic Algorithms Martin Mann , Sebastian the Energy Landscape Library (ELL) that allows such a model-independent formulation of generic algorithms

  8. The Energy Landscape Library -a Platform for Generic Algorithms

    E-Print Network [OSTI]

    Will, Sebastian

    The Energy Landscape Library - a Platform for Generic Algorithms The Energy Landscape Library for Bioinformatics Georges-K¨ohler-Allee 106 · 79110 Freiburg · Germany {mmann The study of energy landscapes of biopolymers and their models is an important field in bioinformatics [1, 2

  9. Digital Fingerprints for Low-Cost Platforms using MEMS sensors

    E-Print Network [OSTI]

    Schaumont, Patrick

    Digital Fingerprints for Low-Cost Platforms using MEMS sensors Aydin Aysu, Nahid Farhady Ghalaty. In this paper, we target a commonly used MEMS sensor, an accelerometer, and utilize its process variations electrostatic impulse and its inherent offset values. Our results revealed that MEMS sensors could be used

  10. Biomass Program 2007 Program Peer Review - Thermochemical Conversion Platform Summary

    SciTech Connect (OSTI)

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Biomass Program Peer Review for the Thermochemical Platform, held on July 9th and 10th in Golden, Colorado.

  11. An analysis and hypothesis generation platform for heterogeneous cancer

    E-Print Network [OSTI]

    Reed, Chris

    An analysis and hypothesis generation platform for heterogeneous cancer databases. Philip Roy QUINLAN a,1, Alastair THOMPSON a and Chris REED b a Dundee Cancer Centre, University of Dundee, Ninewells Hospital, Dundee b School of Computing, University of Dundee, Dundee Abstract. The field of cancer research

  12. Multicore Platforms for Scientific Computing: Cell BE and NVIDIA Tesla

    E-Print Network [OSTI]

    Acacio, Manuel

    Multicore Platforms for Scientific Computing: Cell BE and NVIDIA Tesla J. Fern´andez, M.E. Acacio Tesla computing solutions. The former is a re- cent heterogeneous chip-multiprocessor (CMP) architecture, multicore, Cell BE, NVIDIA Tesla, CUDA 1 Introduction Nowadays, multicore architectures are omnipresent

  13. A Heterogeneous Animated Platform for Educational Participatory Simulations

    E-Print Network [OSTI]

    Tomlinson, Bill

    by populations of 3D animated virtual creatures. When a human participant brings one of the mobile devices (a as an educational tool. Keywords: Human-Computer Interaction, Handheld/Mobile Devices, Virtual/3D EnvironmentsA Heterogeneous Animated Platform for Educational Participatory Simulations Bill Tomlinson ACE

  14. CloudMan: A Platform for Portable Cloud Manufacturing Services

    E-Print Network [OSTI]

    Dustdar, Schahram

    CloudMan: A Platform for Portable Cloud Manufacturing Services Soheil Qanbari, Samira Mahdi Zadeh Education (BIHE), Iran soroush.vedaeei@bihe.org Abstract--Cloud manufacturing refers to "as a Service" pro- duction model that exploits an on-demand access to a distributed pool of diversified manufacturing

  15. Secure Embedded Platform for Networked Automotive M. Gomathisankaran

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Secure Embedded Platform for Networked Automotive Systems M. Gomathisankaran Dept. of Computer University of North Texas 1 Introduction Modern automotive systems contain numerous electronic sensors automotive systems, is a challenge for our generation. Our focus in this position paper is on the security

  16. Measuring air pollution using a mobile, bicycle-based platform

    E-Print Network [OSTI]

    Minnesota, University of

    Measuring air pollution using a mobile, bicycle-based platform Steve Hankey University-walkability Physical activity Air pollution 2 #12;Approach: Mobile, bicycle-based sampling Air pollution measurements;Results: Exposure by mode 11 #12;Next steps: Land-use regression model Air pollution measurements LUR

  17. Design Document for Control Dewar and Vacuum Pump Platforms

    SciTech Connect (OSTI)

    Rucinksi, R.; /Fermilab

    1997-08-27

    This engineering note documents the design of the control dewar and vacuum pump platform that is to be installed on the D-Zero detector. It's purpose is twofold. Firstly it is a summary and repository of the final design calculations of the structure. Secondly, it documents that design follows the American Institute of Steel Construction (AISC) manual and applicable OSHA requirements with respect to walking working surfaces. The information contained in the main body of this note is supported by raw calculations included as the appendix. The platform is a truss type frame strucrure constructed primarily of rectangular steel tubing. The upper platform is for support of the control dewar (cryogenic/electrical interface for the solenoid), visible light photon counter (VLPC) cryogenic bayonet can, and infrequently, personnel during the connection and disconnection of the detector to building services. Figure 1 shows a layout of the structure as mounted on the detector and with the installed equipment. The connection of the platform to the detector is not conventional. Two main booms cantilever the structure to a location outside of the detector. The mounting location and support booms allow for the uninhibited motion of the detector components.

  18. Neuro-Mechanical Entrainment in a Bipedal Robotic Walking Platform

    E-Print Network [OSTI]

    Demiris, Yiannis

    Neuro-Mechanical Entrainment in a Bipedal Robotic Walking Platform Paschalis Veskos* and Yiannis of the robot and was capable of generating waveforms with the correct frequency and phase so as to entrain exploitation of the global natural dynamics. This is verified by its operation in absence of entrainment, where

  19. Network Architecture Testbeds as Platforms for Ubiquitous Computing

    E-Print Network [OSTI]

    Roscoe, Timothy

    Network Architecture Testbeds as Platforms for Ubiquitous Computing By Timothy Roscoe EH Z¨urich, Switzerland Distributed Systems research, and in particular Ubiquitous Computing, has tra- ditionally assumed architecture, and also outline a radically different view of networking for Ubiquitous Computing

  20. Matched Public PUF: Ultra Low Energy Security Platform

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Matched Public PUF: Ultra Low Energy Security Platform Saro Meguerdichian and Miodrag Potkonjak and energy costs and enables a majority of security protocols to be completed in a single or a few clock an ultimately low energy and low latency security approach that enables the device to operate in hostile

  1. Biomass Program 2007 Program Peer Review - Feedstock Platform Summary

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document discloses the comments provided by a review panel at the U.S. Department of Energy Office of the Biomass Program Peer Review held on November 15-16, 2007 in Baltimore, MD and the Feedstock Platform Portfolio Peer Review held on August 21st through 23rd in Washington D.C.

  2. Lexicalized ontology for a business rules management platform

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    logic languages. Supporting them in their management of the knowledge needed to write these rules is oneLexicalized ontology for a business rules management platform: An automotive use case Nouha Omrane industrial domain experts to preserve the connection between textual sources and formal- ized business rules

  3. Managing Product Variety inManaging Product Variety in the Design of Platforms forthe Design of Platforms for

    E-Print Network [OSTI]

    (MPa) Volume (m^3) Market Demand (random) How can I handle this complex demand scenario? Average ProfitManaging Product Variety inManaging Product Variety in the Design of Platforms forthe Design principles for designing product architectures that facilitate the production of customized products

  4. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, Norman J. (Edmonton, CA); Zhang, Jian Z. (Edmonton, CA)

    1995-01-01

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibres to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands.

  5. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  6. System design and architecture of an online, adaptive, and personalized learning platform

    E-Print Network [OSTI]

    Shaw, Cole J. (Cole Jim)

    2013-01-01

    The author proposes that personalized learning can be brought to traditional and nontraditional learners through a new type of asynchronous learning platform called Guided Learning Pathways (GLP). The GLP platform allows ...

  7. Costing commonality : evaluating the impact of platform divergence on internal investment returns

    E-Print Network [OSTI]

    Cameron, Bruce G. (Bruce Gregory)

    2011-01-01

    Platforming has become an important means of cost-sharing among industrial products. However, recent research has shown that many firms face systemic downward pressure on commonality, with the result that many platforms ...

  8. Benefits and applications of commonality and platforming in the oil and gas industry

    E-Print Network [OSTI]

    Rajwani, Shakeel

    2014-01-01

    Platforming, the sharing of parts, processes, knowledge, and technologies, across products and projects has proven to be an effective way for firms to reduce their costs. While platforming is now common in many consumer ...

  9. SocialCircuits : a platform for measuring social interaction using smartphones

    E-Print Network [OSTI]

    Chronis, lolanthe (lolanthe K.)

    2010-01-01

    SocialCircuits is a platform capable of measuring the face-to-face and phone-based communication network of a real-world community. This platform uses commodity mobile phones to measure social ties between individuals, and ...

  10. Characterization of Miocene-Pliocene carbonate platforms, southern Southwest Palawan Basin, Philippines 

    E-Print Network [OSTI]

    Sta. Ana, Ma. Corazon Victor

    2009-06-02

    Isolated carbonate platforms and buildups of the Likas Formation provide a long record of carbonate sedimentation in the southern end of the Southwest Palawan Basin. While most carbonate platforms terminated in early Miocene and middle Miocene time...

  11. DOCUMENTATION, DEPLOYMENT AND EXTENSION OF A VERSATILE AND RAPIDLY RECONFIGURABLE UAV GNC RESEARCH PLATFORM

    E-Print Network [OSTI]

    Toepke, Samuel Lee

    2012-01-01

    Available UAV Reseach Platforms . . . . . . . . . . . . . .Free and Open Source Software UAV Systems . . . . . . . . .Cruz Low-cost UAV GNC System . . . . . . . . . . . . . . . .

  12. AutoGrid - Turning Big Data Into Power with the Energy Data Platform and Apps

    SciTech Connect (OSTI)

    Narayan, Amit; Dresselhuys, Eric; Kulp, Yann; Buseman, Greg; Piette, Mary Ann; Tang, Andrew; Dailey, Karla; Knudsen, Chris

    2014-03-25

    AutoGrid personnel discuss how they are turning big data into power with the energy data platform and apps.

  13. Genetics of primary progressive multiple sclerosis

    E-Print Network [OSTI]

    Cree, BAC

    2014-01-01

    for association with multiple sclerosis in a N. Irish casepolymorphisms and multiple sclerosis in Northern Ireland. Jclinical course of multiple sclerosis. Neurology 68: 376–

  14. Lectin complement activation pathway in multiple sclerosis

    E-Print Network [OSTI]

    Rana, Puneet Vinod

    2012-01-01

    The pathology of multiple sclerosis is location-dependent:and management of multiple sclerosis. Am. Fam. Physician.interactions in multiple sclerosis: innate and adaptive

  15. ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS

    E-Print Network [OSTI]

    Qin, Xiao

    ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS Except where School Engineering #12;ENERGY-EFFICIENT RESOURCE MANAGEMENT FOR HIGH-PERFORMANCE COMPUTING PLATFORMS energy-aware resource management techniques to #12;v HPC platforms. We have conducted extensive

  16. Integrated platform for functional monitoring of biomimetic heart sheets derived from human pluripotent stem cells

    E-Print Network [OSTI]

    Fowlkes, Charless

    of a biomimetic drug screening platform for the early detection of car- diotoxicity is essentialIntegrated platform for functional monitoring of biomimetic heart sheets derived from human present an integrated platform comprised of a biomimetic substrate and physiologically aligned human

  17. Camera platforms for localization and map building Henrik Stewenius, Magnus Oskarsson and Kalle Astrom

    E-Print Network [OSTI]

    Lunds Universitet

    ]. For an overview of the SLAM problem see [7]. In this paper we consider a platform (a vehicle, robot, car) movingCamera platforms for localization and map building Henrik Stewenius, Magnus Oskarsson and Kalle platform of cameras are considered. In particular we formulate and solve structure and motion problems

  18. Energy-Efficiency Comparison of Mobile Platforms and Applications: A Quantitative Approach

    E-Print Network [OSTI]

    Shi, Weisong

    Energy-Efficiency Comparison of Mobile Platforms and Applications: A Quantitative Approach Grace comparing mobile platforms and apps for energy efficiency. In addition, based on case studies that focus on energy efficiency comparison of different app cat- egories on the most popular platforms, the paper

  19. Simulator platform for fast reactor operation and safety technology demonstration

    SciTech Connect (OSTI)

    Vilim, R. B.; Park, Y. S.; Grandy, C.; Belch, H.; Dworzanski, P.; Misterka, J.

    2012-07-30

    A simulator platform for visualization and demonstration of innovative concepts in fast reactor technology is described. The objective is to make more accessible the workings of fast reactor technology innovations and to do so in a human factors environment that uses state-of-the art visualization technologies. In this work the computer codes in use at Argonne National Laboratory (ANL) for the design of fast reactor systems are being integrated to run on this platform. This includes linking reactor systems codes with mechanical structures codes and using advanced graphics to depict the thermo-hydraulic-structure interactions that give rise to an inherently safe response to upsets. It also includes visualization of mechanical systems operation including advanced concepts that make use of robotics for operations, in-service inspection, and maintenance.

  20. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; McWhorter, Paul Jackson; Rodgers, Murray Steven; Sniegowski, Jeffry J.; Barnes, Stephen M.

    2004-07-06

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with-the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  1. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee (Albuquerque, NM); McWhorter, Paul Jackson (Albuquerque, NM); Rodgers, Murray Steven (Albuquerque, NM); Sniegowski, Jeffry J. (Edgewood, NM); Barnes, Stephen M. (Albuquerque, NM)

    2003-04-08

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  2. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  3. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  4. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  5. Development of a Very Dense Liquid Cooled Compute Platform

    SciTech Connect (OSTI)

    Hughes, Phillip N.; Lipp, Robert J.

    2013-12-10

    The objective of this project was to design and develop a prototype very energy efficient high density compute platform with 100% pumped refrigerant liquid cooling using commodity components and high volume manufacturing techniques. Testing at SLAC has indicated that we achieved a DCIE of 0.93 against our original goal of 0.85. This number includes both cooling and power supply and was achieved employing some of the highest wattage processors available.

  6. LEDSGP/about/regional-platforms | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville, Pennsylvania:LEDSGP/aboutLEDSGP/about/regional-platforms <

  7. Lightweight Integrated Optical Sensor for Atmospheric Measurements on Mobile Platforms

    SciTech Connect (OSTI)

    Parameswaran, Krishnan R.

    2013-12-02

    The goal of the Phase I program was to develop a novel open path sensor platform technology based on integration of semiconductor waveguides with efficient optoelectronic components on a monolithic platform. The successful Phase I effort resulted in demonstration of a novel optical resonator structure based on semiconductor high contrast gratings (HCGs) that will enable implementation of an ultra-compact, low-power gas sensor suitable for use on mobile platforms. Extensive numerical modeling was performed to design a device optimized for measuring CO2 at a wavelength for which a laser was available for proof of concept. Devices were fabricated and tested to match the target wavelength, angle, and operating temperature. This demonstration is the first implementation of HCGs at the wavelengths of interest and shows the flexibility of the proposed architecture for gas sensing applications. The measured cavity Q was lower than anticipated due to fabrication process challenges. The PSI and UC Berkeley team has identified solutions to these challenges and will produce optimized devices in a Phase II program where a prototype sensor will be fabricated and tested.

  8. REopt: A Platform for Energy System Integration and Optimization: Preprint

    SciTech Connect (OSTI)

    Simpkins, T.; Cutler, D.; Anderson, K.; Olis, D.; Elgqvist, E.; Callahan, M.; Walker, A.

    2014-08-01

    REopt is NREL's energy planning platform offering concurrent, multi-technology integration and optimization capabilities to help clients meet their cost savings and energy performance goals. The REopt platform provides techno-economic decision-support analysis throughout the energy planning process, from agency-level screening and macro planning to project development to energy asset operation. REopt employs an integrated approach to optimizing a site?s energy costs by considering electricity and thermal consumption, resource availability, complex tariff structures including time-of-use, demand and sell-back rates, incentives, net-metering, and interconnection limits. Formulated as a mixed integer linear program, REopt recommends an optimally-sized mix of conventional and renewable energy, and energy storage technologies; estimates the net present value associated with implementing those technologies; and provides the cost-optimal dispatch strategy for operating them at maximum economic efficiency. The REopt platform can be customized to address a variety of energy optimization scenarios including policy, microgrid, and operational energy applications. This paper presents the REopt techno-economic model along with two examples of recently completed analysis projects.

  9. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  11. North American Renewables Registry (Multiple States)

    Broader source: Energy.gov [DOE]

    The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and...

  12. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  15. Design of Controllers for a Multiple Input Multiple Output System 

    E-Print Network [OSTI]

    Harris, Amanda Lynne

    2012-07-16

    A method of controller design for multiple input multiple output (MIMO) system is needed that will not give the high order controllers of modern control theory but will be more systematic than the “ad hoc” method. The objective of this method...

  16. Multiple stage railgun

    DOE Patents [OSTI]

    Hawke, Ronald S. (Livermore, CA); Scudder, Jonathan K. (Pleasanton, CA); Aaland, Kristian (Livermore, CA)

    1982-01-01

    A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

  17. Engineering a comet-based platform for specific, sensitive, and high throughput assessment of multiple DNA repair pathways in humans

    E-Print Network [OSTI]

    Ge, Jing, Ph. D. Massachusetts Institute of Technology

    2015-01-01

    Human exposure to dangerous genotoxins is unavoidable, as DNA damaging agents are ubiquitous both in our environment and within our cells. The diversity in lesions induced by these agents led to the evolution of several ...

  18. Monitoring system including an electronic sensor platform and an interrogation transceiver

    DOE Patents [OSTI]

    Kinzel, Robert L.; Sheets, Larry R.

    2003-09-23

    A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.

  19. Distributed mobile platforms and applications for intelligent transportation systems

    E-Print Network [OSTI]

    Gao, Jason Hao

    2013-01-01

    Smartphones are pervasive, and possess powerful processors, multi-faceted sensing, and multiple radios. However, networked mobile apps still typically use a client-server programming model, sending all shared data queries ...

  20. Building aggressively duty-cycled platforms to achieve energy efficiency

    E-Print Network [OSTI]

    Agarwal, Yuvraj

    2009-01-01

    Power Management in Mobile Devices . . . . . . . 2.3.2 PowerWi-Fi HotSpot, allow mobile devices to connect other devicesConsumption of Wireless Mobile Devices with Multiple Radio

  1. Proposed platform for improving grid security by trust management system

    E-Print Network [OSTI]

    Siadat, Safieh; Mohsenzadeh, Mehran

    2009-01-01

    With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

  2. The Draugen platform and subsea structures, installation and foundation aspects

    SciTech Connect (OSTI)

    Alm, T.; Bye, A.; Sandvik, K.; Egeland, S.

    1995-12-01

    Installation data from the Draugen GBS and subsea structures have been processed and analyzed in order to verify the design assumptions with regards to soil reactions. These results have shown that penetration of concrete skirts and piles into the very hard clay layer, typically found at the Haltenbanken area is feasible. The resistances may be predicted with reasonable accuracy using conventional methods and average soil strength values as obtained by traditional soil testing. This paper reveals and comments the installation data both for the gravity platform and the piles for the different subsea structures and provides and updated basis for foundation design of similar structures in the area.

  3. LAC Regional Platform Workshop Report | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville, Pennsylvania: Energy Resources Jump to:Kyle,LAC Regional Platform

  4. MHK Technologies/Horizon Horizontal Platform | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource HistoryScenarios Towards 2050Enermar < MHK TechnologiesCatHorizontal Platform

  5. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  6. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  7. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  8. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  9. Development and Investigation of Synthetic Skin Simulant Platform (3SP) in Friction Blister Applications 

    E-Print Network [OSTI]

    Guerra, Carlos

    2012-02-14

    Skin is the largest organ of the human body. It is the first line of defense between the vulnerable organs and tissues of the body and the environment. Healthy skin is paramount to avoiding infection and disease. Therefore, ...

  10. Constraining multiple systems with GAIA

    E-Print Network [OSTI]

    Beauvalet, L.

    GAIA will provide observations of some multiple asteroid and dwarf systems. These observations are a way to determine and improve the quantification of dynamical parameters, such as the masses and the gravity fields, in ...

  11. Multiple Motivations Institutional Change Principle

    Broader source: Energy.gov [DOE]

    The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

  12. Characterization and parameterization of the singular manifold of a simple 6-6 Stewart platform

    E-Print Network [OSTI]

    T. Charters; P. Freitas

    2008-11-07

    This paper presents a study of the characterization of the singular manifold of the six-degree-of-freedom parallel manipulator commonly known as the Stewart platform. We consider a platform with base vertices in a circle and for which the bottom and top plates are related by a rotation and a contraction. It is shown that in this case the platform is always in a singular configuration and that the singular manifold can be parameterized by a scalar parameter.

  13. Sequence stratigraphic development of the Neoarchean Transvaal carbonate platform, Kaapvaal Craton, South Africa

    E-Print Network [OSTI]

    Sumner, Dawn Y.; Beukes, Nicolas J

    2006-01-01

    M. (1996). Sequence stratigraphy and platform evolution ofE.S. (1996). Sequence stratigraphy and plate tectonic1988). Carbonate sequence stratigraphy. In: C.K. Wilgus;

  14. [8] Robotic Cloning and Protein Production Platform of the Northeast Structural

    E-Print Network [OSTI]

    Gerstein, Mark

    [8] Robotic Cloning and Protein Production Platform of the Northeast Structural Genomics Consortium eukaryotic and prokaryotic proteins. These improved robotic and/or parallel cloning, expression, protein pro

  15. Vacuum/Compression Valving (VCV) Using Parrafin-Wax on a Centrifugal Microfluidic CD Platform

    E-Print Network [OSTI]

    2013-01-01

    wax solidifies) by centrifugal force. Author ContributionsF, et al. (2007) The centrifugal microfluidic Bio-Diskswitching valves on a centrifugal microfluidic platform.

  16. THE DESIGN AND FABRICATION OF AN OMNI-DIRECTIONAL VEHICLE PLATFORM

    E-Print Network [OSTI]

    Florida, University of

    .....................................................................................................16 2 MOTOR AND GEAR TRAIN DESIGN................................................................................................... 24 Gear Train DesignTHE DESIGN AND FABRICATION OF AN OMNI-DIRECTIONAL VEHICLE PLATFORM By CHRISTOPHER ROBERT FULMER

  17. Annotated Bibliography: Fisheries Species and Oil/Gas Platforms Offshore California

    E-Print Network [OSTI]

    MBC Applied Environmental Sciences

    1987-01-01

    which associate with oil and gas platforms offshoredamaging consequence of oil and gas development. The studycollection was done by oil and gas company personnel who

  18. Graphene-Plasmonic Hybrid Platform for Label-Free SERS Biomedical Detection

    E-Print Network [OSTI]

    Wang, Pu

    2015-01-01

    silver nanoparticle hybrids for ultrasensitive single-optical anisotropy in hybrid graphene-metal nanoparticlesensitive graphene-plasmonic hybrid platform for label-free

  19. Networked Robotic Sensor Platform Deployments for use in Coastal Environmental Assessment in Southern California

    E-Print Network [OSTI]

    2009-01-01

    Sensing Networked Robotic Sensor Platform Deployments forGaurav S. Sukhatme 1 Robotic Embedded Systems Laboratory,~4 wks) Collaborative robotic sensing Slow moving (<1km/hr)

  20. Automating Oceanography: A Robotic Surface Sensor Platform Combining Flexibility and Low-cost

    E-Print Network [OSTI]

    Mairs, Bryant

    2015-01-01

    AUTOMATING OCEANOGRAPHY: A ROBOTIC SURFACE SENSOR PLATFORM65] Karl N Murphy. Analysis of robotic vehicle steering andet al. Operation of robotic science boats using the