Powered by Deep Web Technologies
Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Red light, green light | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Red light, green light Red light, green light Red light, green light Posted: December 4, 2013 - 6:28pm After the National Nuclear Security Administration signaled Y-12 to begin resuming full operations after a potential furlough, Production Vice President Bill Tindal said Production had two objectives: refocus production employees on safety, security and quality, and ensure preparedness for normal operations. "It's tempting to jump right back in when you get the green light," Tindal said. "We were in an abnormal state that really shook people. Focusing on people came first." Production began with return-to-work briefings. "During the briefings, we asked employees what they were concerned about, what was causing them stress," Tindal said. "Another concept from the briefing was the theme

2

The MV-I  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The MV-I The MV-I (formerly the WAVE - "Wheelchair Accessible Vehicle for Everyone") The Vehicle Production Group LLC Loan Application for the MV-I Description of Proposed Action: The Department of Energy's (DOE) proposed action is to issue a loan to The Vehicle Production Group LLC (VPG) for an MV-I vehicle, the assembly of which would take place in an existing facility, currently fully equipped to assemble vehicles. The Vehicle Production Group has applied for a loan in response to the Advanced Technology Vehicle Manufacturing (ATVM) Loan Program that was established pursuant to Section 136 of the Energy Independence and Security Act of 2007, as amended, which provides for loans to eligible automobile manufacturers and component suppliers for projects that

3

Diffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication  

E-Print Network (OSTI)

privacy while carrying tagged items. Keywords: RFID, Tag-Reader communication security, Light item recall etc. As a result, very soon we can expect to see RFID tagged consumer items at manyDiffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication DIVYAN M

Kim, Kwangjo

4

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

5

M&V Guidelines: Measurement and  

E-Print Network (OSTI)

M&V Guidelines: Measurement and Verification for Federal Energy Projects Version 3.0 #12;M&V Guidelines: Measurement and Verification for Federal Energy Projects Version 3.0 Prepared For: U 2007. M&V Guidelines 3.0 FEMPii #12;Contents Section Page Section 1 Measurement and Verification (M

6

Science and the Energy Security Challenge: The Example of Solid-State Lighting  

ScienceCinema (OSTI)

Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

Julia Phillips

2010-01-08T23:59:59.000Z

7

Measurement and Verification (M&V)  

E-Print Network (OSTI)

.eere.energy.gov/femp/pdfs/mv_guidelines.pdf ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 M&V Approach Options in IPMVP Component or System Option A: Retrofit Isolation with Key Parameter Measurement...

Masuda, H

2014-01-01T23:59:59.000Z

8

Reliability assessment of a 1 MV LTD.  

SciTech Connect

A 1 MV linear transformer driver (LTD) is being tested with a large area e-beam diode load at Sandia National Laboratories (SNL). The experiments will be utilized to determine the repeatability of the output pulse and the reliability of the components. The 1 MV accelerator is being used to determine the feasibility of designing a 6 MV LTD for radiography experiments. The peak voltage, risetime, and pulse width as well as the cavity timing jitter are analyzed to determine the repeatability of the output pulse.

Portillo, Salvador; Chavez, Raymond (Ktech Corporation, Albuquerque, NM); Molina, Isidro; Kim, Alexandre A. (High Current Electronics Institute, Tomsk, Russia); Johnson, David L. (Titan Pulsed Sciences Division, San Leandro, CA); Maenchen, John Eric; Leckbee, Joshua J.; Ziska, Derek Raymond (Ktech Corporation, Albuquerque, NM)

2005-07-01T23:59:59.000Z

9

M&V Guidelines: Measurement and Verification for Federal Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

M&V Guidelines: Measurement and Verification for Federal Energy Projects M&V Guidelines: Measurement and Verification for Federal Energy Projects Document describes the Federal...

10

M&V Guidelines: Measurement and Verification for Federal Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

M&V Guidelines: Measurement and Verification for Federal Energy Projects M&V Guidelines: Measurement and Verification for Federal Energy Projects FEMP's standard procedures and...

11

Hydrologic Data and Evaluation for Model Validation Wells, MV-1, MV-2, and MV-3 near the Project Shoal Area  

SciTech Connect

In 2006, a drilling campaign was conducted at the Project Shoal Area (PSA) to provide information for model validation, emplace long-term monitoring wells, and develop baseline geochemistry for long term hydrologic monitoring. Water levels were monitored in the vicinity of the drilling, in the existing wells HC-1 and HC-6, as well as in the newly drilled wells, MV-1, MV-2 and MV-3 and their associated piezometers. Periodic water level measurements were also made in existing wells HC-2, HC-3, HC-4, HC-5 and HC-7. A lithium bromide chemical tracer was added to drilling fluids during the installation of the monitoring and validation (MV) wells and piezometers. The zones of interest were the fractured, jointed and faulted horizons within a granitic body. These horizons generally have moderate hydraulic conductivities. As a result, the wells and their shallower piezometers required strenuous purging and development to remove introduced drilling fluids as evidenced by bromide concentrations. After airlift and surging well development procedures, the wells were pumped continuously until the bromide concentration was less then 1 milligram per liter (mg/L). Water quality samples were collected after the well development was completed. Tritium scans were preformed before other analyses to ensure the absence of high levels of radioactivity. Tritium levels were less than 2,000 pico-curies per liter. Samples were also analyzed for carbon-14 and iodine-129, stable isotopes of oxygen and hydrogen, as well as major cations and anions. Aquifer tests were performed in each MV well after the bromide concentration fell below acceptable levels. Water level data from the aquifer tests were used to compute aquifer hydraulic conductivity and transmissivity

B. Lyles; P. Oberlander; D. Gillespie; D. Donithan; J. Chapman; J. Healey

2007-02-14T23:59:59.000Z

12

ESPC Measurement and Verification (M&V) Planning Tool | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ESPC Measurement and Verification (M&V) Planning Tool ESPC Measurement and Verification (M&V) Planning Tool Document provides instructions for Federal agencies on how to use a...

13

LS-81 MCT/MV1125  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 MCT/MV1125 January 29, 1987 EVALUATION OF AMPLITUDE AND FREQUENCY RESPONSE CHARACTERISTICS OF THE TEAC MODEL MR-30 TAPE RECORDER by J. A. Jendrzejczyk and R. K. Smith Materials and Components Technologr Division 1.0 OBJECTIVE Verify operation of the Teac model MR-30 tape recorder at tape speeds and conditions representative of those associated with the collection of ground motion and building vibration data. 2.0 TEST PROCEDURE The basic test setup is shown in Fig. 1. All seven record amplifier inputs are connected in parallel with a random noise generator that supplies the input test vol tage. Outputs, which are generated in the playback mode, are compared to a reference from the random noise generator and a transfer function is calculated via a HP model 5451C Fast

14

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy Yesterday, the Department of Energy announced that we've now finalized a loan for nearly $50 million to the Vehicle Production Group - or VPG. The project will support the development and manufacturing of a new wheelchair accessible, fuel-efficient car, the MV-1, that will run on compressed natural gas instead of gasoline, produce low emissions, and create 900 jobs

15

Use of Quantitative Uncertainty Analysis to Support M&V Decisions in ESPCs  

E-Print Network (OSTI)

M&V Guidelines: Measurement and Verification for FederalLaboratory Abstract Measurement and Verification (M&V) is asuch as measurement and verification (M&V) requirements. M&V

Mathew, Paul A.; Koehling, Erick; Kumar, Satish

2005-01-01T23:59:59.000Z

16

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

17

M&V Guidelines: Measurement and Verification for Federal Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

M&V Guidelines: Measurement and Verification for Federal Energy Projects Version 4.0 Prepared for the U.S. Department of Energy Federal Energy Management Program By

18

Lighting  

SciTech Connect

The lighting section of ASHRAE standard 90.1 is discussed. It applies to all new buildings except low-rise residential, while excluding specialty lighting applications such as signage, art exhibits, theatrical productions, medical and dental tasks, and others. In addition, lighting for indoor plant growth is excluded if designed to operate only between 10 p.m. and 6 a.m. Lighting allowances for the interior of a building are determined by the use of the system performance path unless the space functions are not fully known, such as during the initial stages of design or for speculative buildings. In such cases, the prescriptive path is available. Lighting allowances for the exterior of all buildings are determined by a table of unit power allowances. A new addition the exterior lighting procedure is the inclusion of facade lighting. However, it is no longer possible to trade-off power allotted for the exterior with the interior of a building or vice versa. A significant change is the new emphasis on lighting controls.

McKay, H.N. (Hayden McKay Lighting Design, New York, NY (US))

1990-02-01T23:59:59.000Z

19

Use of Quantitative Uncertainty Analysis to Support M&V Decisions in Super ESPCs  

E-Print Network (OSTI)

such as measurement and verification (M&V) requirements. M&Vthe M&V Guidelines: Measurement and Verification for Federalon the International Measurement and Verification Protocol (

Kumar, Satish; Mathew, Paul

2005-01-01T23:59:59.000Z

20

Simplified VO M&V Protocol Simplified Voltage Optimization (VO)  

E-Print Network (OSTI)

Simplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification Protocol 1.0 Introduction 1.1 Purpose The Simplified Voltage Optimization (VO) Measurement and Verification requirements, and measurement and verification formulations are included as part of this Protocol. 1

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V)  

Energy.gov (U.S. Department of Energy (DOE))

State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V) Webinar.

22

Light  

Science Journals Connector (OSTI)

Sunlight contains energy which can be directly converted into electricity in solar cells of various types. This is an example of what is called 'direct conversion', involving no moving parts or heat conversion processes. This chapter looks at photovoltaic and photoelectric devices and also at other ideas for using light energy, some of which operate in the infrared part of the spectrum. Solar electric power is a rapidly developing field, opening up many opportunities for novel applications, as well as requirements, including for storage, with one idea being solar-powered hydrogen production and then direct conversion to electricity in fuel cells. Direct conversion is not always efficient, and this chapter introduces the concept of 'energy return on energy invested'. In speculative mood this chapter also looks at the idea of a global grid, allowing daytime solar generation to be used on the night side of the planet.

David Elliott ? Pages 4-1 to 4-20

23

M&V Plan and Savings Calculations Methods Outline (IDIQ Attachment...  

Office of Environmental Management (EM)

M&V Plan and Savings Calculations Methods Outline (IDIQ Attachment J-8) Document outlines measurement and verification (M&V) planning and savings calculation methods for an energy...

24

M&V Plan and Savings Calculations Methods Outline (IDIQ Attachment J-8)  

Energy.gov (U.S. Department of Energy (DOE))

Document outlines measurement and verification (M&V) planning and savings calculation methods for an energy savings performance contract (ESPC).

25

M&V Guidelines: Measurement and Verification for Federal Energy Projects  

Energy.gov (U.S. Department of Energy (DOE))

FEMP's standard procedures and guidelines for M&V for federal energy managers, procurement officials, and energy service providers.

26

U. S. Army Measurement and Verification (M&V) Costing Toolkit  

E-Print Network (OSTI)

This is the 2003 final report for the U.S. Army Monitoring and Verification (M&V) costs project. The purpose of this project is to develop a M&V Costing Toolkit to be used by the government or third party planners to design a M&V plan...

Haberl, J. S.; Powell, T.; Carlson, K. A.; Im, P.; Turner, W. D.

2003-01-01T23:59:59.000Z

27

Development of a new 3 MV ultra-high voltage electron microscope at Osaka University  

Science Journals Connector (OSTI)

......shown in Fig. 3 and the main specifications are summarized in Table 1...CW-rircuits at 3MV Main specifications of 3MV electron microscope...stage XI38 stages (at 3MV) InsuLation gas : SFft (4 atoms) Illuminating...This helps to minimize thermal drift of the specimen during......

Akio Takaoka; Katsumi Ura; Hirotaro Mori; Teiji Katsuta; Isao Matsui; Soichiro Hayashi

1997-01-01T23:59:59.000Z

28

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

29

Standard Measurement and Verification Plan for Lighting Retrofit Projects for Buildings and Building Sites  

SciTech Connect

This document provides a framework for standard measurement and verification (M&V) of lighting retrofit and replacement projects. It was developed to provide site owners, contractors, and other involved organizations with the essential elements of a robust M&V plan for lighting projects. It includes details on all aspects of effectively measuring light levels of existing and post-retrofit projects, conducting power measurement, and developing cost-effectiveness analysis. This framework M&V plan also enables consistent comparison among similar lighting projects, and may be used to develop M&V plans for non--lighting-technology retrofits and new installations.

Richman, Eric E.

2012-10-31T23:59:59.000Z

30

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

31

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

32

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

33

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

34

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

35

New River Light & Power Co | Open Energy Information  

Open Energy Info (EERE)

New River Light & Power Co New River Light & Power Co Place North Carolina Utility Id 13482 Utility Location Yes Ownership S NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png 100 Watt SV TOB Lighting 150 Watt SV TOB Lighting 150 Watt Sodium Vapor Lighting 175 Watt MV TOB Lighting 175 Watt Mercury Vapor Lighting 250 Watt Metal Halide Lighting 250 Watt SV TOB Lighting 250 Watt Sodium Vapor Lighting 400 Watt MV TOB Lighting 400 Watt Mercury Vapor Lighting 400 Watt Metal Halide Lighting 400 Watt SV TOB Lighting 750 Watt SV TOB Lighting

36

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

37

Construction of MV-6 Well Pad at the Central Nevada Test Area Completed |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Construction of MV-6 Well Pad at the Central Nevada Test Area Construction of MV-6 Well Pad at the Central Nevada Test Area Completed Construction of MV-6 Well Pad at the Central Nevada Test Area Completed October 22, 2013 - 6:10pm Addthis What does this project do? Goal 1. Protect human health and the environment A new groundwater monitoring/validation (MV) well was installed at the Central Nevada Test Area (CNTA) in September 2013. LM proposed this well to the Nevada Division of Environmental Protection (NDEP) to enhance the existing monitoring network and to expedite the Federal Facility Agreement and Consent Order (FFACO) closure process for the CNTA Subsurface Corrective Action Unit. CNTA is located in Hot Creek Valley in Nye County, Nevada, adjacent to U.S. Highway 6, about 30 miles north of Warm Springs, Nevada. CNTA was the site of "Project Faultless," a test site where a

38

Construction of MV-6 Well Pad at the Central Nevada Test Area Completed |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Construction of MV-6 Well Pad at the Central Nevada Test Area Construction of MV-6 Well Pad at the Central Nevada Test Area Completed Construction of MV-6 Well Pad at the Central Nevada Test Area Completed October 22, 2013 - 6:10pm Addthis What does this project do? Goal 1. Protect human health and the environment A new groundwater monitoring/validation (MV) well was installed at the Central Nevada Test Area (CNTA) in September 2013. LM proposed this well to the Nevada Division of Environmental Protection (NDEP) to enhance the existing monitoring network and to expedite the Federal Facility Agreement and Consent Order (FFACO) closure process for the CNTA Subsurface Corrective Action Unit. CNTA is located in Hot Creek Valley in Nye County, Nevada, adjacent to U.S. Highway 6, about 30 miles north of Warm Springs, Nevada. CNTA was the site of "Project Faultless," a test site where a

39

Deadline to Review Draft M&V Guidelines Extended to December...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Program (FEMP) is extending its request for public comment on the draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0). The document...

40

Cascaded H-Bridge MV Grid and Power Balance Control for PV Systems  

Science Journals Connector (OSTI)

In this paper, a new centralized cascaded H-bridge medium-voltage (MV) grid topology model ... array partial shading or module mismatch of Cascaded H-Bridge is analyzed as well, based on which ... quality, solves...

Bin Zhang; Zhiyun Bao; Donglai Zhang

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

M&V Guidelines: Measurement and Verification for Federal Energy Projects  

Energy.gov (U.S. Department of Energy (DOE))

Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

42

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

43

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

44

Combined kV and MV imaging for real-time tracking of implanted fiducial markers  

SciTech Connect

In the presence of intrafraction organ motion, target localization uncertainty can greatly hamper the advantage of highly conformal dose techniques such as intensity modulated radiation therapy (IMRT). To minimize the adverse dosimetric effect caused by tumor motion, a real-time knowledge of the tumor position is required throughout the beam delivery process. The recent integration of onboard kV diagnostic imaging together with MV electronic portal imaging devices on linear accelerators can allow for real-time three-dimensional (3D) tumor position monitoring during a treatment delivery. The aim of this study is to demonstrate a near real-time 3D internal fiducial tracking system based on the combined use of kV and MV imaging. A commercially available radiotherapy system equipped with both kV and MV imaging systems was used in this work. A hardware video frame grabber was used to capture both kV and MV video streams simultaneously through independent video channels at 30 frames per second. The fiducial locations were extracted from the kV and MV images using a software tool. The geometric tracking capabilities of the system were evaluated using a pelvic phantom with embedded fiducials placed on a moveable stage. The maximum tracking speed of the kV/MV system is approximately 9 Hz, which is primarily limited by the frame rate of the MV imager. The geometric accuracy of the system is found to be on the order of less than 1 mm in all three spatial dimensions. The technique requires minimal hardware modification and is potentially useful for image-guided radiation therapy systems.

Wiersma, R. D.; Mao Weihua; Xing, L. [Department of Radiation Oncology, Stanford University School of Medicine, Stanford, California 94305-5847 (United States)

2008-04-15T23:59:59.000Z

45

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

46

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

47

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

48

Design of active loops for magnetic field mitigation in MV/LV substation surroundings  

Science Journals Connector (OSTI)

Abstract This paper deals with the application and optimization of active loops for the mitigation of the magnetic field generated by complex sources, especially MV/LV substations. Various active-loop configurations are proposed, which are analyzed in several regions located close to a particular MV/LV substation, and the optimum geometry and location of the loops are obtained together with the optimum current (magnitude and phase) to be injected into the loops. All this is performed by means of a genetic algorithm in order to reduce the average magnetic field inside the target volume (inspection volume) to the minimum. The performance of the proposed active loops is compared with that obtained via other well-known mitigation technique, such as conductive/ferromagnetic passive shields. The main results are analyzed, and the differences, in terms of performance, between the two shielding techniques, and their proper application to MV/LV substations, are highlighted.

Juan Carlos del-Pino-Lpez; Luca Giaccone; Aldo Canova; Pedro Cruz-Romero

2015-01-01T23:59:59.000Z

49

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

50

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

51

Global security  

SciTech Connect

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

52

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

53

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

54

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

55

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

56

NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium  

ScienceCinema (OSTI)

Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

Thomas D'Agostino

2010-09-01T23:59:59.000Z

57

Optimal location and sizing of HV/MV substations in uncertainty load environment using genetic algorithm  

Science Journals Connector (OSTI)

In this paper a novel approach for optimal location, sizing and determining the service areas of HV/MV substations in a long-range planning period using pseudodynamic methodology is presented. Costs of equipment, areas, cables in MV side and power loss are considered in cost function. Uncertainty in loads is modeled using LR fuzzy numbers in load points. For optimization procedure, genetic algorithm with a new coding is used. Load points splitting in each area between substations and infeasibility solutions are considered in search procedure. Based on this, a software was developed and integrated into an optimization tool for substation allocation. The software was applied in many cases with satisfactory results.

M.R Haghifam; M Shahabi

2002-01-01T23:59:59.000Z

58

Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada  

SciTech Connect

The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

Shott, Gregory [NSTec

2014-08-31T23:59:59.000Z

59

Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting...  

Office of Environmental Management (EM)

by conducting a major overhaul of its outdoor lighting (replacing 2,000 fixtures with LED lights), while boosting safety and security throughout the site. mcbquantico2014.pdf...

60

19CHALLENGE Summer 2006 OUTDOOR LIGHTING, INSECTS & BIRDS  

E-Print Network (OSTI)

-whocomplainofthevisualintrusion causedbysecuritylightsandinsensitivestreetlighting. It is common knowledge that street and security lights attract insects: indeed, 2000-watt light that the increasing numbers of urban street and security lights must have a measurable impact on the environment19CHALLENGE Summer 2006 OUTDOOR LIGHTING, INSECTS & BIRDS Is light pollution killing our birds

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

62

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

63

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

64

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

65

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

66

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

67

Personnel Security  

Directives, Delegations, and Requirements

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

68

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

69

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

70

Dosimetric Comparison of 6 MV and 15 MV Single Arc Rapidarc to Helical TomoTherapy for the Treatment of Pancreatic Cancer  

SciTech Connect

We conducted a planning study to compare Varian's RapidArc (RA) and helical TomoTherapy (HT) for the treatment of pancreatic cancer. Three intensity-modulated radiotherapy (IMRT) plans were generated for 8 patients with pancreatic cancer: one using HT with 6-MV beam (Plan{sub HT6}), one using single-arc RA with 6-MV beam (Plan{sub RA6}), and one using single-arc RA with 15-MV beam (Plan{sub RA15}). Dosimetric indices including high/low conformality index (CI{sub 100%}/CI{sub 50%}), heterogeneity index (HI), monitor units (MUs), and doses to organs at risk (OARs) were compared. The mean CI{sub 100%} was statistically equivalent with respect to the 2 treatment techniques, as well as beam energy (0.99, 1.01, and 1.02 for Plan{sub HT6}, Plan{sub RA6}, and Plan{sub RA156,} respectively). The CI{sub 50%} and HI were improved in both RA plans over the HT plan. The RA plans significantly reduced MU (MU{sub RA6} = 697, MU{sub RA15} = 548) compared with HT (MU{sub HT6} = 6177, p = 0.008 in both cases). The mean maximum cord dose was decreased from 29.6 Gy in Plan{sub HT6} to 21.6 Gy (p = 0.05) in Plan{sub RA6} and 21.7 Gy (p = 0.04) in Plan{sub RA15}. The mean bowel dose decreased from 17.2 Gy in Plan{sub HT6} to 15.2 Gy (p = 0.03) in Plan{sub RA6} and 15.0 Gy (p = 0.03) Plan{sub RA15}. The mean liver dose decreased from 8.4 Gy in Plan{sub HT6} to 6.3 Gy (p = 0.04) in Plan{sub RA6} and 6.2 Gy in Plan{sub RA15}. Variations of the mean dose to the duodenum, kidneys, and stomach were statistically insignificant. RA and HT can both deliver conformal dose distributions to target volumes while limiting the dose to surrounding OARs in the treatment of pancreatic cancer. Dosimetric advantages might be gained by using RA over HT by reducing the dose to OARs and total MUs used for treatment.

Cai Jing, E-mail: jing.cai@duke.edu [Department of Radiation Oncology, Duke University Medical Center, Durham, NC (United States); Department of Radiation Oncology, University of Virginia, Charlottesville, VA (United States); Yue Jinbo [Department of Radiation Oncology, Duke University Medical Center, Durham, NC (United States); Department of Radiation Oncology, Shandong Cancer Hospital, Jinan, Shandong (China); McLawhorn, Robert; Yang Wensha; Wijesooriya, Krishni; Dunlap, Neal E.; Sheng Ke [Department of Radiation Oncology, University of Virginia, Charlottesville, VA (United States); Yin Fangfang [Department of Radiation Oncology, Duke University Medical Center, Durham, NC (United States); Benedict, Stanley H. [Department of Radiation Oncology, University of Virginia, Charlottesville, VA (United States)

2011-10-01T23:59:59.000Z

71

Hagerstown Light Department | Open Energy Information  

Open Energy Info (EERE)

Hagerstown Light Department Hagerstown Light Department Jump to: navigation, search Name Hagerstown Light Department Place Maryland Utility Id 7908 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes RTO PJM Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png GENERAL AND COMMERCIAL SERVICE Commercial LIGHT AND POWER SERVICE (HIGH LOAD FACTOR) Industrial LIGHT AND POWER SERVICE (Low Load Factor) Commercial OUTDOOR LIGHTING SERVICE (200 Watts)Fluorescent luminaire Lighting OUTDOOR LIGHTING SERVICE(100 Watts)Fluorescent luminaire Lighting OUTDOOR LIGHTING SERVICE(175 Watts MV)) Lighting

72

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

73

Energy Security Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

74

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

75

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

76

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

77

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

78

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network (OSTI)

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

79

Tag: Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

80

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security Conditions  

Directives, Delegations, and Requirements

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

82

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

83

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

84

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

85

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

86

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

87

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

88

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

89

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

90

Parkland Light & Water Company | Open Energy Information  

Open Energy Info (EERE)

Parkland Light & Water Company Parkland Light & Water Company Jump to: navigation, search Name Parkland Light & Water Company Place Washington Utility Id 14505 Utility Location Yes Ownership C NERC Location WECC NERC WECC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Large Commercial (Over 50kVA) Commercial Residential Rate Residential Security Lights-100 WATT HP SODIUM Lighting Security Lights-200 WATT HP SODIUM Lighting Security Lights-250 WATT HP SODIUM Lighting Security Lights-400 WATT HP SODIUM Lighting Small Commercial (Under 50kVA) Commercial Average Rates

91

Newnan Wtr, Sewer & Light Comm | Open Energy Information  

Open Energy Info (EERE)

Newnan Wtr, Sewer & Light Comm Newnan Wtr, Sewer & Light Comm Jump to: navigation, search Name Newnan Wtr, Sewer & Light Comm Place Georgia Utility Id 13547 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial Power Rates Commercial Large Power Service Industrial Residential Power Rates Residential Security Lighting - 100 Watt (Decorative) Lighting Security Lighting - 1000 Watt (Directional Flood) Lighting Security Lighting - 1000 Watt (Metal Halide Flood) Lighting Security Lighting - 100W (Cobra or Open) Lighting

92

Albany Water Gas & Light Comm | Open Energy Information  

Open Energy Info (EERE)

Water Gas & Light Comm Water Gas & Light Comm Jump to: navigation, search Name Albany Water Gas & Light Comm Place Georgia Utility Id 230 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial Demand Commercial Commercial Non-Demand Commercial Large Commercial Demand Commercial Residential Residential Security Lights 1000 Watt Metal Halide Metal Pole Lighting Security Lights 1000 Watt Metal Halide Wooden Pole Lighting Security Lights 150 HPSV Fixtures Metal Pole Lighting Security Lights 150 HPSV Fixtures Wooden Pole Lighting

93

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

94

Transportation Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

95

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

96

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

97

Security for grids  

SciTech Connect

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

98

Radiated noise characteristics of M/V OVERSEAS HARRIETTE, a modern cargo ship  

Science Journals Connector (OSTI)

Low?frequency ambient noise in the ocean is often influenced by radiated noise from merchant shipping. In an effort to quantify this noise a series of extensive and carefully planned measurements were made of the radiated noise of M/V OVERSEAS HARRIETTE a 25 525?deadweight ton 567?ft cargo ship powered by a direct?drive low?speed diesel engine. This ship and its power plant are typical of many modern merchant ships. The radiated noise data show high?level tonal frequencies from the ship's service diesel generator main engine firing rate and blade rate harmonics due to propeller cavitation. Directivity measurements taken at many angles under the ship indicate that the radiation is generally dipole in form at lower frequencies as expected. There are some departures from this pattern that may indicate hull interactions. Blade rate fundamental levels show good agreement with predicted levels. [Work supported by NRL.

Paul T. Arveson; David J. Vendittis

1991-01-01T23:59:59.000Z

99

Design and Development of the First Polish Superconducting Fault Current Limiter For MV Distribution Systems  

Science Journals Connector (OSTI)

Superconducting fault current limiters (SFCL) are designed to protect the electrical grid from faults. The rapid increase of impedance of the SFCL reduces the short current in the circuit. In this paper, we present the design and development of coreless inductive SFCL for MV distribution systems. It is a very attractive design which reduces the weight of the device thanks to the coreless construction and the size of primary winding, reduced thanks to cryogenic cooling. The primary 2G HTS and secondary 2G HTS windings are magnetically coupled to one another. Copper primary winding connected parallely to the HTS primary winding is magnetically coupled to HTS windings and ensure that in cases of lack of cooling or superconductor failure, the protected circuit will not be disrupted. Tests performed at high power test facility shows the limiting performance of the coreless inductive SFCL.

Janusz Kozak; Michal Majka; Tadeusz Janowski; Slawomir Kozak

2012-01-01T23:59:59.000Z

100

Performance of a 1 MV A high temperature superconductors-enabled saturable magnetic  

Science Journals Connector (OSTI)

A 1MVA single-phase DC saturated iron core-type fault current limiter (FCL) employing DC coils manufactured from Bi-2223/Ag high temperature superconductor has been designed, constructed, and tested. The device, configured to respond to a fault occurring on either the positive or negative wave cycle, exhibited instantaneous reaction and reset times. It could clip a continuous applied steady state fault current of 1200A, and limited a transient peak fault current of 2200A to the specified current of 100A. The operation of the device did not produce any significant harmonic contribution from the clipping action, as under fault conditions, 99.96% of the harmonic power spectrum of the clipped waveform contributed to the fundamental, and the non-fault inductance of the FCL was

C J Hawley; F Darmann; T P Beales

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

102

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

103

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

104

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

105

Personnel Security Activities  

Directives, Delegations, and Requirements

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

106

Security | Department of Energy  

Energy Savers (EERE)

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

107

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

108

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

109

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

110

Climate-derived tensions in Arctic security.  

SciTech Connect

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

111

Evaluation of Alternative Field Buses for Lighting Control Applications  

E-Print Network (OSTI)

be successful in the Home Automation market worldwide. Forstreet lighting and home automation. Casient is seeking OEMmeter reading), home automation, alarm and security systems,

Koch, Ed; Rubinstein, Francis

2005-01-01T23:59:59.000Z

112

A fiducial detection algorithm for real-time image guided IMRT based on simultaneous MV and kV imaging  

SciTech Connect

The advantage of highly conformal dose techniques such as 3DCRT and IMRT is limited by intrafraction organ motion. A new approach to gain near real-time 3D positions of internally implanted fiducial markers is to analyze simultaneous onboard kV beam and treatment MV beam images (from fluoroscopic or electronic portal image devices). Before we can use this real-time image guidance for clinical 3DCRT and IMRT treatments, four outstanding issues need to be addressed. (1) How will fiducial motion blur the image and hinder tracking fiducials? kV and MV images are acquired while the tumor is moving at various speeds. We find that a fiducial can be successfully detected at a maximum linear speed of 1.6 cm/s. (2) How does MV beam scattering affect kV imaging? We investigate this by varying MV field size and kV source to imager distance, and find that common treatment MV beams do not hinder fiducial detection in simultaneous kV images. (3) How can one detect fiducials on images from 3DCRT and IMRT treatment beams when the MV fields are modified by a multileaf collimator (MLC)? The presented analysis is capable of segmenting a MV field from the blocking MLC and detecting visible fiducials. This enables the calculation of nearly real-time 3D positions of markers during a real treatment. (4) Is the analysis fast enough to track fiducials in nearly real time? Multiple methods are adopted to predict marker positions and reduce search regions. The average detection time per frame for three markers in a 1024x768 image was reduced to 0.1 s or less. Solving these four issues paves the way to tracking moving fiducial markers throughout a 3DCRT or IMRT treatment. Altogether, these four studies demonstrate that our algorithm can track fiducials in real time, on degraded kV images (MV scatter), in rapidly moving tumors (fiducial blurring), and even provide useful information in the case when some fiducials are blocked from view by the MLC. This technique can provide a gating signal or be used for intra-fractional tumor tracking on a Linac equipped with a kV imaging system. Any motion exceeding a preset threshold can warn the therapist to suspend a treatment session and reposition the patient.

Mao Weihua; Riaz, Nadeem; Lee, Louis; Wiersma, Rodney; Xing Lei [Department of Radiation Oncology, Stanford University School of Medicine, Stanford, California 94305-5847 (United States)

2008-08-15T23:59:59.000Z

113

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

114

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

115

Beam quality conversion factors for parallel-plate ionization chambers in MV photon beams  

SciTech Connect

Purpose: To investigate the behavior of plane-parallel ion chambers in high-energy photon beams through measurements and Monte Carlo simulations. Methods: Ten plane-parallel ion chamber types were obtained from the major ion chamber manufacturers. Absorbed dose-to-water calibration coefficients are measured for these chambers and k{sub Q} factors are determined. In the process, the behaviors of the chambers are characterized through measurements of leakage currents, chamber settling in cobalt-60, polarity and ion recombination behavior, and long-term stability. Monte Carlo calculations of the absorbed dose to the air in the ion chamber and absorbed dose to water are obtained to calculate k{sub Q} factors. Systematic uncertainties in Monte Carlo calculated k{sub Q} factors are investigated by varying material properties and chamber dimensions. Results: Chamber behavior was variable in MV photon beams, especially with regard to chamber leakage and ion recombination. The plane-parallel chambers did not perform as well as cylindrical chambers. Significant differences up to 1.5% were observed in calibration coefficients after a period of eight months although k{sub Q} factors were consistent on average within 0.17%. Chamber-to-chamber variations in k{sub Q} factors for chambers of the same type were at the 0.2% level. Systematic uncertainties in Monte Carlo calculated k{sub Q} factors ranged between 0.34% and 0.50% depending on the chamber type. Average percent differences between measured and calculated k{sub Q} factors were - 0.02%, 0.18%, and - 0.16% for 6, 10, and 25 MV beams, respectively. Conclusions: Excellent agreement is observed on average at the 0.2% level between measured and Monte Carlo calculated k{sub Q} factors. Measurements indicate that the behavior of these chambers is not adequate for their use for reference dosimetry of high-energy photon beams without a more extensive QA program than currently used for cylindrical reference-class ion chambers.

Muir, B. R.; McEwen, M. R.; Rogers, D. W. O. [Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario K1S 5B6 (Canada); Institute for National Measurement Standards, National Research Council of Canada, Ottawa, Ontario K1A 0R6 (Canada); Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario K1S 5B6 (Canada)

2012-03-15T23:59:59.000Z

116

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

117

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

118

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

119

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

120

Personnel Security Program Manual  

Directives, Delegations, and Requirements

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Personnel Security Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

122

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

123

Shot reproducibility of the self-magnetic-pinch diode at 4.5MV  

Science Journals Connector (OSTI)

In experiments conducted at Sandia National Laboratories RITS-6 accelerator, the self-magnetic-pinch diode exhibits significant shot-to-shot variability. Specifically, for identical hardware operated at the same voltage, some shots exhibit a catastrophic drop in diode impedance. A study is underway to identify sources of shot-to-shot variations which correlate with diode impedance collapse. The scope of this report is limited to data collected at 4.5-MV peak voltage and sources of variability which occur away from the diode, such as sheath electron emission and trajectories, variations in pulsed power, load and transmission line alignment, and different field shapers. We find no changes in the transmission line hardware, alignment, or hardware preparation methods which correlate with impedance collapse. However, in classifying good versus poor shots, we find that there is not a continuous spectrum of diode impedance behavior but that the good and poor shots can be grouped into two distinct impedance profiles. In poor shots, the sheath current in the load region falls from 16%30% of the total current to less than 10%. This result will form the basis of a follow-up study focusing on the variability resulting from diode physics.

Nichelle Bennett; M. Dale Crain; Darryl W. Droemer; Raymond E. Gignac; Greg Lare; Isidro Molina; Robert Obregon; Chase C. Smith; Frank L. Wilkins; Dale R. Welch; Steve Cordova; Manuel L. Gallegos; Mark D. Johnston; Mark L. Kiefer; Joshua J. Leckbee; Michael G. Mazarakis; Dan Nielsen; Timothy J. Renk; Tobias Romero; Timothy J. Webb; Derek Ziska

2014-05-27T23:59:59.000Z

124

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

125

Quantum Dissociation of a Vortex-Antivortex Pair in a Long Josephson Junction M.V. Fistul,1  

E-Print Network (OSTI)

Quantum Dissociation of a Vortex-Antivortex Pair in a Long Josephson Junction M.V. Fistul,1 A VAV pair manifests itself in a switching of the Josephson junction from the superconducting biased single Josephson junctions (JJs), various SQUIDs, and small Josephson junction arrays, contain

Wallraff, Andreas

126

BID NO: SKA SSLE 009/2011 SUPPLY, DELIVERY AND INSTALLATION OF ROTARY UPS, MV INDOOR SWITCHGEAR AND  

E-Print Network (OSTI)

, and dry-type power transformers only ­ no alternative offers in this regard will be accepted. The contract SWITCHGEAR AND POWER TRANSFORMERS AT THE MeerKAT SITE NEAR CARNARVON, NORTHERN CAPE TENDER NOTICE and Installation of Rotary UPS, MV Indoor Switchgear and Power Transformers at the MeerKAT Site near Carnarvon

Jarrett, Thomas H.

127

Project Transformation E.R. Bachmann & P.L. McDowell MV 4202 Page 1 of 14  

E-Print Network (OSTI)

Project Transformation E.R. Bachmann & P.L. McDowell MV 4202 Page 1 of 14 7. Projection Transformations · Projection Transformations Projections transform three dimensional eye coordinates into points in three dimensional clip coordinates - Three dimensional object coordinates are projected onto

McDowell, Perry

128

Transformation E.R. Bachmann & P.L. McDowell MV 4202 Page 1 of3  

E-Print Network (OSTI)

Transformation E.R. Bachmann & P.L. McDowell MV 4202 Page 1 of3 5. Transformations Overview window coordinates Modeling Transformations Projection Transformation Perspective Division Viewport Transformation Object Coordinates x, y, z, w Modelview Matrix Projection Matrix Eye Coordinates Clip Coordinates

McDowell, Perry

129

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

130

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

131

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

132

Security-oriented Data Grids for Microarray Expression Profiles  

E-Print Network (OSTI)

Security-oriented Data Grids for Microarray Expression Profiles Richard SINNOTT a,1 Christopher and comparison of microarray experiment results. Keywords. Microarray Expression Profiles, Grid security shedding light and understanding for ex- ample on biological processes. The BBSRC funded Grid enabled

Glasgow, University of

133

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

134

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

135

3 MV hypervelocity dust accelerator at the Colorado Center for Lunar Dust and Atmospheric Studies  

SciTech Connect

A hypervelocity dust accelerator for studying micrometeorite impacts has been constructed at the Colorado Center for Lunar Dust and Atmospheric Studies (CCLDAS) at the University of Colorado. Based on the Max-Planck-Instituet fuer Kernphysik (MPI-K) accelerator, this accelerator is capable of emitting single particles of a specific mass and velocity selected by the user. The accelerator consists of a 3 MV Pelletron generator with a dust source, four image charge pickup detectors, and two interchangeable target chambers: a large high-vacuum test bed and an ultra-high vacuum impact study chamber. The large test bed is a 1.2 m diameter, 1.5 m long cylindrical vacuum chamber capable of pressures as low as 10{sup -7} torr while the ultra-high vacuum chamber is a 0.75 m diameter, 1.1 m long chamber capable of pressures as low as 10{sup -10} torr. Using iron dust of up to 2 microns in diameter, final velocities have been measured up to 52 km/s. The spread of the dust particles and the effect of electrostatic focusing have been measured using a long exposure CCD and a quartz target. Furthermore, a new technique of particle selection is being developed using real time digital filtering techniques. Signals are digitized and then cross-correlated with a shaped filter, resulting in a suppressed noise floor. Improvements over the MPI-K design, which include a higher operating voltage and digital filtering for detection, increase the available parameter space of dust emitted by the accelerator. The CCLDAS dust facility is a user facility open to the scientific community to assist with instrument calibrations and experiments.

Shu, Anthony; Horanyi, Mihaly; Kempf, Sascha; Thomas, Evan [Colorado Center for Lunar Dust and Atmospheric Studies, Boulder, Colorado 80303 (United States); Department of Physics, University of Colorado, Boulder, Colorado 80309 (United States); Laboratory for Atmospheric and Space Physics, 1234 Innovation Drive, Boulder, Colorado 80303 (United States); Collette, Andrew; Drake, Keith; Northway, Paige [Colorado Center for Lunar Dust and Atmospheric Studies, Boulder, Colorado 80303 (United States); Laboratory for Atmospheric and Space Physics, 1234 Innovation Drive, Boulder, Colorado 80303 (United States); Gruen, Eberhard [Colorado Center for Lunar Dust and Atmospheric Studies, Boulder, Colorado 80303 (United States); MPI fuer Kernphysik, Saupfercheckweg 1, D-69117 Heidelberg (Germany); Mocker, Anna [Colorado Center for Lunar Dust and Atmospheric Studies, Boulder, Colorado 80303 (United States); MPI fuer Kernphysik, Saupfercheckweg 1, D-69117 Heidelberg (Germany); IRS, Universitaet Stuttgart, Pfaffenwaldring 31, D-70569 Stuttgart (Germany); Munsat, Tobin [Colorado Center for Lunar Dust and Atmospheric Studies, Boulder, Colorado 80303 (United States); Department of Physics, University of Colorado, Boulder, Colorado 80309 (United States); Srama, Ralf [MPI fuer Kernphysik, Saupfercheckweg 1, D-69117 Heidelberg (Germany); IRS, Universitaet Stuttgart, Pfaffenwaldring 31, D-70569 Stuttgart (Germany); and others

2012-07-15T23:59:59.000Z

136

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

137

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

138

Security Policy, Guidance & Reports  

Energy.gov (U.S. Department of Energy (DOE))

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

139

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

140

Sample M&V Plan from the Texas Workshop: Preparing and Evaluating Measurement and Verification Plans for Energy Performance Contracts in Texas  

E-Print Network (OSTI)

This document contains a sample M&V plan that has been prepared in accordance with the Texas Guidelines for Measurement and Verification for Energy Performance Contracts. This sample M&V plan was extracted from the March 1999 workshop, entitled...

Haberl, J. S.

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Personal Security Assistance for Secure Internet Commerce  

E-Print Network (OSTI)

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

142

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

143

Office of Security Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

144

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

145

Data Security ROCKVILLE, MD  

E-Print Network (OSTI)

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

146

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

147

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

148

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

149

Personnel Security Program Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

150

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

151

What is Security? A perspective on achieving security  

SciTech Connect

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

152

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

153

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

154

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

155

Recent applications of thermal imagers for security assessment  

SciTech Connect

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

156

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

157

Comparison of the Effects of High-Energy Photon Beam Irradiation (10 and 18 MV) on 2 Types of Implantable Cardioverter-Defibrillators  

SciTech Connect

Purpose: Radiation therapy for cancer may be required for patients with implantable cardiac devices. However, the influence of secondary neutrons or scattered irradiation from high-energy photons (?10 MV) on implantable cardioverter-defibrillators (ICDs) is unclear. This study was performed to examine this issue in 2 ICD models. Methods and Materials: ICDs were positioned around a water phantom under conditions simulating clinical radiation therapy. The ICDs were not irradiated directly. A control ICD was positioned 140 cm from the irradiation isocenter. Fractional irradiation was performed with 18-MV and 10-MV photon beams to give cumulative in-field doses of 600 Gy and 1600 Gy, respectively. Errors were checked after each fraction. Soft errors were defined as severe (change to safety back-up mode), moderate (memory interference, no changes in device parameters), and minor (slight memory change, undetectable by computer). Results: Hard errors were not observed. For the older ICD model, the incidences of severe, moderate, and minor soft errors at 18 MV were 0.75, 0.5, and 0.83/50 Gy at the isocenter. The corresponding data for 10 MV were 0.094, 0.063, and 0 /50 Gy. For the newer ICD model at 18 MV, these data were 0.083, 2.3, and 5.8 /50 Gy. Moderate and minor errors occurred at 18 MV in control ICDs placed 140 cm from the isocenter. The error incidences were 0, 1, and 0 /600 Gy at the isocenter for the newer model, and 0, 1, and 6 /600Gy for the older model. At 10 MV, no errors occurred in control ICDs. Conclusions: ICD errors occurred more frequently at 18 MV irradiation, which suggests that the errors were mainly caused by secondary neutrons. Soft errors of ICDs were observed with high energy photon beams, but most were not critical in the newer model. These errors may occur even when the device is far from the irradiation field.

Hashii, Haruko, E-mail: haruko@pmrc.tsukuba.ac.jp [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)] [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Hashimoto, Takayuki; Okawa, Ayako; Shida, Koichi; Isobe, Tomonori [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)] [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Hanmura, Masahiro; Nishimura, Tetsuo [Department of Radiation Oncology, Shizuoka Cancer Center Hospital, Nagaizumi, Shizuoka (Japan)] [Department of Radiation Oncology, Shizuoka Cancer Center Hospital, Nagaizumi, Shizuoka (Japan); Aonuma, Kazutaka [Department of Cardiovascular Medicine, University of Tsukuba, Tsukuba, Ibaraki (Japan)] [Department of Cardiovascular Medicine, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakae, Takeji; Sakurai, Hideyuki [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)] [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)

2013-03-01T23:59:59.000Z

158

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

159

Using audio in secure device pairing  

Science Journals Connector (OSTI)

Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the use of the audio channel for human-assisted device pairing. First we assume a common (insecure) wireless channel between devices. We then obviate the assumption of a pre-existing common channel with a single-channel device pairing approach only based on audio. Both approaches are applicable to a wide range of devices and place light burden on the user.

Michael T. Goodrich; Michael Sirivianos; John Solis; Claudio Soriente; Gene Tsudik; Ersin Uzun

2009-01-01T23:59:59.000Z

160

European Commissions Antitrust Investigation against Gazprom - Implications for the Energy Security of Russia and the European Union.  

E-Print Network (OSTI)

??This master thesis analyzes the European and Russian energy security, in light of political science and international political economy. The aim of the study is (more)

Re, Anni

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

162

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

163

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

164

SECURITY TERMINATION STATEMENT | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

165

6.1-MV, 0.79-MA laser-triggered gas switch for multimodule, multiterawatt pulsed-power accelerators  

Science Journals Connector (OSTI)

A 6.1-MV, 0.79-MA laser-triggered gas switch (LTGS) is used to synchronize the 36 modules of the Z machine at Sandia National Laboratories. Each module includes one switch, which serves as the last command-fired switch of the module, and hence is used to determine the time at which each module electrically closes relative to the other modules. The switch is ?81-cm in length, ?45-cm in diameter, and is immersed in mineral oil. The outer switch envelope consists of six corrugated monomer-cast acrylic insulators and five contoured stainless-steel rings. The trigger electrodes are fabricated from copper-infused tungsten. The switch is pressurized with several atmospheres of sulfur hexafluoride (SF6), which is turbulently purged within 2seconds after every shot. Each switch is powered from a 6-MV, 0.78-MJ Marx generator which pulse charges a 24-nF intermediate-store water capacitor in 1.4-?s. Closure of the switch allows power to flow into pulse-forming transmission lines. The power pulse is subsequently compressed by water switches, which results in a total accelerator output power in excess of 70-TW. A previous version of the LTGS performed exceptionally at a 5.4-MV, 0.7-MA level on an engineering test module used for switch development. It exhibited a 1-? jitter of ?5??ns, a prefire and flashover rate less than 0.1%, and a lifetime in excess of 150 shots. When installed on the Z accelerator, however, the switch exhibited a prefire probability of ?3%, a flashover probability of ?7%, and a 15-ns jitter. The difference in performance is attributed to several factors such as higher total charge transfer, exposure to more debris, and more stressful dynamic mechanical loading upon machine discharge. Under these conditions, the replacement lifetime was less than ten shots. Since refurbishment of Z in October2007, there have been three LTGS design iterations to improve the performance at 6.1-MV. The most recent design exhibits a prefire rate of less than 0.1%, a flashover rate of ?0.2%, a single switch jitter of ?6-ns, and a lifetime of greater than 75 shots. Modifications to achieve the performance improvement are detailed in this article.

K. R. LeChien; W. A. Stygar; M. E. Savage; P. E. Wakeland; V. Anaya; D. S. Artery; M. J. Baremore; D. E. Bliss; R. Chavez; G. D. Coombs; J. P. Corley; P. A. Jones; A. K. Kipp; B. A. Lewis; J. A. Lott; J. J. Lynch; G. R. McKee; S. D. Ploor; K. R. Prestwich; S. A. Roznowski; D. C. Spencer; S. D. White; J. R. Woodworth

2010-03-24T23:59:59.000Z

166

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

167

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

168

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

169

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

170

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

171

310 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 40, NO. 1, JANUARY 2005 A 180-mV Subthreshold FFT Processor Using a  

E-Print Network (OSTI)

310 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 40, NO. 1, JANUARY 2005 A 180-mV Subthreshold FFT THERE is significant research activity to minimize energy dissipation at the system level to lengthen battery life

Chandrakasan, Anantha

172

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

173

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

174

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

175

Office of Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

176

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

177

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

178

Industrial Security Specialst  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

179

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

180

Industrial and Grid Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

182

Securing Cloud Storage Service.  

E-Print Network (OSTI)

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

183

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

184

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

185

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

186

A framework model for grid security  

Science Journals Connector (OSTI)

Computational grids can be considered as tiered objects; following a widespread terminology, cluster grids may be grouped into enterprise grids, that in turn may belong to global grids. Therefore, computing grid security has to be tiered too, with the ground level remaining the OS one. In this work, we introduce a sort of unified approach, an overall architectural framework for access control to grid resources, and one that adheres as much as possible to current security principles. Current grid security implementations are viewed in the light of this model, their main drawbacks are described, and we show how our proposal is able to avoid them. We believe that a main strategy could be to adopt both PKI and PMI infrastructures at the grid layer, ensuring that an adequate transfer of authentication and authorization will be made between the Virtual Organization and Resource Provider layers. This can be achieved by extending those features at the OS layer as system applications and services.

G. Laccetti; G. Schmid

2007-01-01T23:59:59.000Z

187

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

188

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

189

Dimming-discrete-multi-tone (DMT) for simultaneous color control and high speed visible light communication  

Science Journals Connector (OSTI)

Visible light communication (VLC) using LEDs has attracted significant attention recently for the future secure, license-free and electromagnetic-interference (EMI)-free optical...

Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung

2014-01-01T23:59:59.000Z

190

SWIFT XRT Observations of the Nova-like Cataclysmic Variables MV Lyr, BZ Cam and V592 Cas  

E-Print Network (OSTI)

We present a total of ~ 45 ksec (3$\\times$15 ksec) of SWIFT XRT observations for three non-magnetic nova-like (NL) Cataclysmic Variables (CVs) (MV Lyr, BZ Cam, V592 Cas) in order to study characteristics of Boundary Layers (BL) in CVs. The nonmagnetic NLs are found mostly in a state of high mass accretion rate ($\\ge$1$\\times$10$^{-9}$ Msun yr$^{-1}$) and some show occasional low states. Using the XRT data, we find optically thin multiple-temperature cooling flow type emission spectra with X-ray temperatures (kT$_{max}$) of 21-50 keV. These hard X-ray emitting boundary layers diverge from simple isobaric cooling flows indicating X-ray temperatures that are of virial values in the disk. In addition, we detect power law emission components from MV Lyr and BZ Cam and plausibly from V592 Cas which may be a result of the Compton scattering of the optically thin emission from the fast wind outflows in these systems and/or Compton up-scattering of the soft disk photons. The X-ray luminosities of the (multi-temperatur...

Balman, Solen; Sion, Edward M

2014-01-01T23:59:59.000Z

191

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Institutional Research & Development > Contact Us Contact Us Above Image: Fission neutrons can be distinguished from background radiation using a novel variation of a metal-organic framework (MOF) scintillator that was a new class of scintillator previously patented by Sandia: Crystals of a metal organic framework (left) emit light in the blue (middle) when exposed to ionizing radiation. Infiltrating them with an organometallic compound causes the crystals to emit red light as well (right), creating a new way to differentiate fission neutrons from

192

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

193

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

194

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

195

Quantum-Secure Authentication with a Classical Key  

E-Print Network (OSTI)

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

196

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

197

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

198

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

199

Incidents of Security Concern  

SciTech Connect

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

200

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

202

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

203

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

204

Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting  

Energy.gov (U.S. Department of Energy (DOE))

Document provides an overview of how the Marine Corps Base Quantico (MCBQ) achieved 85% energy savings in parking lighting by conducting a major overhaul of its outdoor lighting (replacing 2,000 fixtures with LED lights), while boosting safety and security throughout the site.

205

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

206

Detecting and Mitigating Security Risks  

E-Print Network (OSTI)

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

207

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

208

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

209

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

210

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

211

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

212

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

213

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

214

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

215

Light Portal  

Science Journals Connector (OSTI)

The Light Portal was designed to organize and mark the pedestrian paths that circumnavigate the rectangle of the...

2006-01-01T23:59:59.000Z

216

Light's twist  

Science Journals Connector (OSTI)

...equal to the optical power divided by the speed of light, and hence go unnoticed in our everyday lives...approaching object equal to the power in the light beam (P) divided by the speed of light. The movement of the approaching object does...

2014-01-01T23:59:59.000Z

217

Light Properties Light travels at the speed of light `c'  

E-Print Network (OSTI)

LIGHT!! #12;Light Properties Light travels at the speed of light `c' C = 3 x 108 m/s Or 190.nasa.gov #12;The speed of light The speed of light `c' is equal to the frequency ` times the wavelength,000 miles/second!! Light could travel around the world about 8 times in one second #12;What is light?? Light

Mojzsis, Stephen J.

218

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

219

Outlook for Light-Duty-Vehicle Fuel Demand | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Outlook for Light-Duty-Vehicle Fuel Demand Outlook for Light-Duty-Vehicle Fuel Demand Gasoline and distillate demand impact of the Energy Independance and Security Act of 2007...

220

Solid-State Lighting: About the Program  

NLE Websites -- All DOE Office Websites (Extended Search)

About the About the Program Printable Version Share this resource Send a link to Solid-State Lighting: About the Program to someone by E-mail Share Solid-State Lighting: About the Program on Facebook Tweet about Solid-State Lighting: About the Program on Twitter Bookmark Solid-State Lighting: About the Program on Google Bookmark Solid-State Lighting: About the Program on Delicious Rank Solid-State Lighting: About the Program on Digg Find More places to share Solid-State Lighting: About the Program on AddThis.com... Contacts Partnerships About the Program The Energy Policy Act of 2005 (EPACT 2005) and the Energy Independence and Security Act of 2007 (EISA 2007) issued directives to the Secretary of Energy to carry out a Next Generation Lighting Initiative to support SSL

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Lighting Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Purple LED lamp Purple LED lamp Lighting Systems Lighting research is aimed at improving the energy efficiency of lighting systems in buildings and homes across the nation. The goal is to reduce lighting energy consumption by 50% over twenty years by improving the efficiency of light sources, and controlling and delivering illumination so that it is available, where and when needed, and at the required intensity. Research falls into four main areas: Sources and Ballasts, Light Distribution Systems, Controls and Communications, and Human Factors. Contacts Francis Rubinstein FMRubinstein@lbl.gov (510) 486-4096 Links Lighting Research Group Batteries and Fuel Cells Buildings Energy Efficiency Applications Commercial Buildings Cool Roofs and Heat Islands Demand Response Energy Efficiency Program and Market Trends

222

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

223

Clarksville Light & Water Co | Open Energy Information  

Open Energy Info (EERE)

Clarksville Light & Water Co Clarksville Light & Water Co Jump to: navigation, search Name Clarksville Light & Water Co Place Arkansas Utility Id 3705 Utility Location Yes Ownership M NERC Location SPP NERC SPP Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Large Commercial (Rate schedule p) Commercial Large Industrial (Rate schedule p) Industrial Residential (R1) Residential Residential Rate Schedule R-2 Residential Security Light Service (Rate schedule L)HPS 100 W Commercial Security Light Service 1000 W MH Commercial Security light service 150 W HPS Commercial

224

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

225

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

226

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

227

South Central Ark El Coop, Inc | Open Energy Information  

Open Energy Info (EERE)

El Coop, Inc El Coop, Inc Jump to: navigation, search Name South Central Ark El Coop, Inc Place Arkansas Utility Id 17540 Utility Location Yes Ownership C NERC Location SERC NERC SPP Yes RTO SPP Yes Activity Transmission Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png 1000W MV Security Lighting Lighting 100W HPS Security Lighting Lighting 150W HPS Security Lighting Lighting 175W MV Security Lighting Lighting 400W HPS Security Lighting Lighting 400W MV Security Lighting Lighting Commercial Commercial Large Power Service-Optional Load Control Commercial

228

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

229

Headquarters Security Quick Reference Book  

Energy.gov (U.S. Department of Energy (DOE))

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

230

November 2003 NETWORK SECURITY TESTING  

E-Print Network (OSTI)

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

231

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

232

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

233

Requirements for security signalling  

SciTech Connect

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

234

Safeguards and Security Program  

Directives, Delegations, and Requirements

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

235

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

236

Operations Security Program  

Directives, Delegations, and Requirements

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

237

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

238

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

239

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

240

Safety, Security & Fire Report  

E-Print Network (OSTI)

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

242

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

243

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

244

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

245

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

246

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

247

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

248

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

249

Incidents of Security Concern  

Directives, Delegations, and Requirements

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

250

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

251

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

252

Lemnos Interoperable Security Program  

SciTech Connect

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

253

Frequently Asked Questions: Lighting Choices to Save You Money | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money August 9, 2012 - 9:20am Addthis Frequently Asked Questions: Lighting Choices to Save You Money Below are some of the most frequently asked questions and answers about the new lighting efficiency standards. Learn more about your lighting choices and find out how to shop for lights by lumens, not watts. Download our Lighting Myths and Facts fact sheet to learn more about your lighting choices and the new lighting standards. Why are my lighting choices changing? What is the Energy Independence and Security Act of 2007 (EISA 2007)? When will the new bulbs be phased in? What will the lighting standards mandated by EISA 2007 mean to consumers?

254

Frequently Asked Questions: Lighting Choices to Save You Money | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money August 9, 2012 - 9:20am Addthis Frequently Asked Questions: Lighting Choices to Save You Money Below are some of the most frequently asked questions and answers about the new lighting efficiency standards. Learn more about your lighting choices and find out how to shop for lights by lumens, not watts. Download our Lighting Myths and Facts fact sheet to learn more about your lighting choices and the new lighting standards. Why are my lighting choices changing? What is the Energy Independence and Security Act of 2007 (EISA 2007)? When will the new bulbs be phased in? What will the lighting standards mandated by EISA 2007 mean to consumers?

255

Lighting Renovations  

Energy.gov (U.S. Department of Energy (DOE))

When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

256

Cerenkov Light  

ScienceCinema (OSTI)

The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

Slifer, Karl

2014-05-22T23:59:59.000Z

257

North Star Electric Coop, Inc | Open Energy Information  

Open Energy Info (EERE)

North Star Electric Coop, Inc North Star Electric Coop, Inc Place Minnesota Utility Id 13731 Utility Location Yes Ownership C NERC Location MRO Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Single Phase Commercial Interruptible Large Power Industrial Large Power Industrial MV Request Lighting Metered Street Lights Lighting Off Peak Rental Security Lights - 150 watt Lighting Rental Security Lights - HPS Lighting Rental Security Lights - HPS & Transformer Lighting Rental Security Lights - MV Lighting Rental Security Lights - MV & Transformer Lighting

258

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

259

The CFE Treaty review conference: Strengthening the {open_quote}Cornerstone{close_quote} of European security  

SciTech Connect

The Conventional Armed Forces in Europe (CFE) Treaty is considered the cornerstone of European security. The author examines the impact of the treaty on European security and the major issues involved in strengthening this Treaty in light of current status of the participants.

Graham, T. Jr.

1996-04-01T23:59:59.000Z

260

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Northern Lights  

NLE Websites -- All DOE Office Websites (Extended Search)

Northern Lights Northern Lights Nature Bulletin No. 178-A February 6, 1965 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation NORTHERN LIGHTS To a person seeing the Aurora Borealis or "northern lights" for the first time, it is an uncanny awe-inspiring spectacle. Sometimes it begins as a glow of red on the northern horizon, ominously suggesting a great fire, gradually changing to a curtain of violet-white, or greenish-yellow light extending from east to west. Some times this may be transformed to appear as fold upon fold of luminous draperies that march majestically across the sky; sometimes as a vast multitude of gigantic flaming swords furiously slashing at the heavens; sometimes as a flowing crown with long undulating colored streamers fanning downward and outward.

262

Village of Penn Yan, New York (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Yan, New York (Utility Company) Yan, New York (Utility Company) Jump to: navigation, search Name Village of Penn Yan Place New York Utility Id 14700 Utility Location Yes Ownership M NERC Location NPCC NERC NPCC Yes ISO NY Yes Activity Distribution Yes Activity Bundled Services Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Industrial Rate Industrial Public Street Lighting Lighting Residential (per meter, per month) Residential Security Outdoor Lighting (175W MV/HPS) Lighting Security Outdoor Lighting (250W MV/HPS) Lighting Security Outdoor Lighting (400W MV/HPS) Lighting Security Outdoor Lighting(1000W MV/HPS) Lighting

263

Tag: GTRI | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

264

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

265

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

266

Sandia National Laboratories: Water Security Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

267

Integrated safeguards and security management plan  

E-Print Network (OSTI)

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

268

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

269

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

270

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

271

Security, Emergency Planning & Safety Records | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

272

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

273

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

274

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

275

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

276

Radiation damage of polyethylene single crystals in electron microscopy between 1 and 2.5 MV. II. The influence of temperature  

E-Print Network (OSTI)

1043 Radiation damage of polyethylene single crystals in electron microscopy between 1 and 2.5 MV mécanismes réels décrits par les chimistes. Abstract. 2014 The critical dose measured for polyethylene single. Introduction. Polyethylene single crystals, like every organic sub- stance, lose their crystallinity when

Paris-Sud XI, Université de

277

Crystal structure of Si3N4Y2O3 examined by a 1 MV high-resolution electron microscope  

Science Journals Connector (OSTI)

The crystal structure of Si3N4Y2O3...prepared by a hot-press is examined in a 1 MV high-resolution electron microscope. The image contrast reveals that it is isostructural with one of the layered silicates, Akermanite

S. Horiuchi; M. Mitomo

1979-11-01T23:59:59.000Z

278

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

279

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

280

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

282

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

283

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

284

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

285

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

286

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

287

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

288

Engineering secure software  

E-Print Network (OSTI)

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

289

Quantum-secured imaging  

E-Print Network (OSTI)

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

290

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network (OSTI)

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

291

Glencoe Light & Power Comm | Open Energy Information  

Open Energy Info (EERE)

Glencoe Light & Power Comm Glencoe Light & Power Comm Jump to: navigation, search Name Glencoe Light & Power Comm Place Minnesota Utility Id 7292 Utility Location Yes Ownership M NERC Location MRO ISO MISO Yes Operates Generating Plant Yes Activity Generation Yes Activity Buying Transmission Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Area/Security Lighting-175 Watt Lighting Area/Security Lighting-400 Watt Lighting Large Industrial Service-Primary Voltage Industrial Large industrial Service-secondary volatge Industrial Residential Service Residential

292

Logan County Coop Power & Light | Open Energy Information  

Open Energy Info (EERE)

County Coop Power & Light County Coop Power & Light Jump to: navigation, search Name Logan County Coop Power & Light Place Ohio Utility Id 11203 Utility Location Yes Ownership C NERC Location RFC NERC RFC Yes Activity Transmission Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png COMMERCIAL AND GENERAL SERVICE Commercial FARM AND RESIDENTIAL SERVICE Residential LARGE POWER SERVICE Industrial Security Lighting 175 W LED Lighting Security Lighting 400 W LED Lighting Average Rates Residential: $0.1190/kWh Commercial: $0.1040/kWh Industrial: $0.0724/kWh References

293

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network (OSTI)

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

294

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network (OSTI)

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

295

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

296

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

297

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

298

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

299

Automated analysis of security APIs  

E-Print Network (OSTI)

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

300

Solid-State Lighting: LED Lighting Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Market-Based Programs Printable Version Share this resource Send a link to Solid-State Lighting: LED Lighting Facts to someone by E-mail Share Solid-State Lighting: LED Lighting Facts on Facebook Tweet about Solid-State Lighting: LED Lighting Facts on Twitter Bookmark Solid-State Lighting: LED Lighting Facts on Google Bookmark Solid-State Lighting: LED Lighting Facts on Delicious Rank Solid-State Lighting: LED Lighting Facts on Digg Find More places to share Solid-State Lighting: LED Lighting Facts on AddThis.com... LED Lighting Facts CALiPER Program Standards Development Technical Information Network Gateway Demonstrations Municipal Consortium Design Competitions LED Lighting Facts LED lighting facts - A Program of the U.S. DOE DOE's LED Lighting Facts® program showcases LED products for general

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

302

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

303

East Asian Security in 2025  

E-Print Network (OSTI)

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

304

About SRNL - Directorates - National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

305

Safeguard Security and Awareness Program  

Directives, Delegations, and Requirements

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

306

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

307

Safeguards and Security Program References  

Directives, Delegations, and Requirements

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

308

Transmission Line Security Monitor  

SciTech Connect

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

309

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

310

Information Security Manual  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

311

Information Security Manual  

Directives, Delegations, and Requirements

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

312

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

313

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

314

National Security System Manual  

Directives, Delegations, and Requirements

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

315

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

316

Headquarters Security Operations  

Energy.gov (U.S. Department of Energy (DOE))

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

317

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

318

Fundamental science investigations to develop a 6-MV laser triggered gas switch for ZR: first annual report.  

SciTech Connect

In October 2005, an intensive three-year Laser Triggered Gas Switch (LTGS) development program was initiated to investigate and solve observed performance and reliability issues with the LTGS for ZR. The approach taken has been one of mission-focused research: to revisit and reassess the design, to establish a fundamental understanding of LTGS operation and failure modes, and to test evolving operational hypotheses. This effort is aimed toward deploying an initial switch for ZR in 2007, on supporting rolling upgrades to ZR as the technology can be developed, and to prepare with scientific understanding for the even higher voltage switches anticipated needed for future high-yield accelerators. The ZR LTGS was identified as a potential area of concern quite early, but since initial assessments performed on a simplified Switch Test Bed (STB) at 5 MV showed 300-shot lifetimes on multiple switch builds, this component was judged acceptable. When the Z{sub 20} engineering module was brought online in October 2003 frequent flashovers of the plastic switch envelope were observed at the increased stresses required to compensate for the programmatically increased ZR load inductance. As of October 2006, there have been 1423 Z{sub 20} shots assessing a variety of LTGS designs. Numerous incremental and fundamental switch design modifications have been investigated. As we continue to investigate the LTGS, the basic science of plastic surface tracking, laser triggering, cascade breakdown, and optics degradation remain high-priority mission-focused research topics. Significant progress has been made and, while the switch does not yet achieve design requirements, we are on the path to develop successively better switches for rolling upgrade improvements to ZR. This report summarizes the work performed in FY 2006 by the large team. A high-level summary is followed by detailed individual topical reports.

Warne, Larry Kevin; Van Den Avyle, James A.; Lehr, Jane Marie; Rose, David (Voss Scientific, Albuquerque, NM); Krompholz, Hermann G. (Texas Tech University, Lubbock, TX); Vela, Russell (Texas Tech University, Lubbock, TX); Jorgenson, Roy Eberhardt; Timoshkin, Igor (University of Strathclyde, Glasgow, Scotland); Woodworth, Joseph Ray; Prestwich, Kenneth Randel (Voss Scientific, Albuquerque, NM); Krile, John (Texas Tech University, Lubbock, TX); Given, Martin (University of Strathclyde, Glasgow, Scotland); McKee, G. Randall; Rosenthal, Stephen Edgar; Struve, Kenneth William; Welch, Dale Robert (Voss Scientific, Albuquerque, NM); Benwell, Andrew L. (University of Missouri-Columbia, Columbia, Missouri); Kovaleski, Scott (University of Missouri-Columbia, Columbia, Missouri); LeChien, Keith, R.; Johnson, David (Titan Pulse Sciences Division); Fouracre, R.A. (University of Strathclyde, Glasgow, Scotland); Yeckel, Chris (University of Missouri-Columbia, Columbia, Missouri); Wakeland, Peter Eric (Ktech Corporation, Albuquerque, NM); Miller, A. R. (Titan Pulse Sciences Division); Hodge, Keith Conquest (Ktech Corporation, Albuquerque, NM); Pasik, Michael Francis; Savage, Mark Edward; Maenchen, John Eric; Curry, Randy D. (University of Missouri-Columbia, Columbia, Missouri); Feltz, Greg (Ktech Corporation, Albuquerque, NM); Bliss, David Emery; MacGregor, Scott (University of Strathclyde, Glasgow, Scotland); Corley, J. P. (Ktech Corporation, Albuquerque, NM); Anaya, Victor (Ktech Corporation, Albuquerque, NM); Wallace, Zachariah (Ktech Corporation, Albuquerque, NM); Thoma, Carsten (Voss Scientific, Albuquerque, NM); Neuber, Andreas. (Texas Tech University, Lubbock, TX)

2007-03-01T23:59:59.000Z

319

Security Science & Technology | Nuclear Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

320

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

322

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

323

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

324

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

325

New and Underutilized Technology: Exterior LED/Solid State Lighting |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Exterior LED/Solid State Lighting Exterior LED/Solid State Lighting New and Underutilized Technology: Exterior LED/Solid State Lighting October 4, 2013 - 4:55pm Addthis The following information outlines key deployment considerations for exterior LED/solid state lighting within the Federal sector. Benefits LED lighting economics can work in high electric cost areas with high hours of use. Pricing continually decreases for LED lighting. This technology provides quality, white, even lighting with good color rendition. Greater cost savings can be achieved when combined with bi-level motion sensors to reduce light levels in parking areas, garages, and walkways. Application Exterior LED/solid state lighting is applicable in areas where security and visual performance are critical, including street lighting, parking lots,

326

Fast, accurate, and robust automatic marker detection for motion correction based on oblique kV or MV projection image pairs  

SciTech Connect

Purpose: A robust and accurate method that allows the automatic detection of fiducial markers in MV and kV projection image pairs is proposed. The method allows to automatically correct for inter or intrafraction motion. Methods: Intratreatment MV projection images are acquired during each of five treatment beams of prostate cancer patients with four implanted fiducial markers. The projection images are first preprocessed using a series of marker enhancing filters. 2D candidate marker locations are generated for each of the filtered projection images and 3D candidate marker locations are reconstructed by pairing candidates in subsequent projection images. The correct marker positions are retrieved in 3D by the minimization of a cost function that combines 2D image intensity and 3D geometric or shape information for the entire marker configuration simultaneously. This optimization problem is solved using dynamic programming such that the globally optimal configuration for all markers is always found. Translational interfraction and intrafraction prostate motion and the required patient repositioning is assessed from the position of the centroid of the detected markers in different MV image pairs. The method was validated on a phantom using CT as ground-truth and on clinical data sets of 16 patients using manual marker annotations as ground-truth. Results: The entire setup was confirmed to be accurate to around 1 mm by the phantom measurements. The reproducibility of the manual marker selection was less than 3.5 pixels in the MV images. In patient images, markers were correctly identified in at least 99% of the cases for anterior projection images and 96% of the cases for oblique projection images. The average marker detection accuracy was 1.4{+-}1.8 pixels in the projection images. The centroid of all four reconstructed marker positions in 3D was positioned within 2 mm of the ground-truth position in 99.73% of all cases. Detecting four markers in a pair of MV images takes a little less than a second where most time is spent on the image preprocessing. Conclusions: The authors have developed a method to automatically detect multiple markers in a pair of projection images that is robust, accurate, and sufficiently fast for clinical use. It can be used for kV, MV, or mixed image pairs and can cope with limited motion between the projection images.

Slagmolen, Pieter; Hermans, Jeroen; Maes, Frederik; Budiharto, Tom; Haustermans, Karin; Heuvel, Frank van den [Department of ESAT, Medical Image Computing, Catholic University Leuven, Leuven 3000 (Belgium) and Department of Radiology, Medical Image Computing, Catholic University Leuven, Leuven 3000 (Belgium); Department of Radiotherapy, University Hospitals Leuven, Leuven 3000 (Belgium)

2010-04-15T23:59:59.000Z

327

Interference between electronic lighting and other appliances  

SciTech Connect

This paper presents empirical data from the laboratory and the field to provide an overview of electromagnetic interference between high-efficiency electronic lighting and certain other electronic devices, such as power-line carrier systems, security systems, and remote controls for televisions and VCRs. Reported cases involving both electronic lighting emissions and immunity in building power systems are summarized according to basic interference mechanisms. To illustrate the potential complexities of this problem, the paper describes a case where high-efficiency lighting interfered with a hearing aid. The hearing aid case includes a field survey, laboratory investigations, and recommended solutions to the problem.

Schwabe, R.J.; Zelingher, S. [New York Power Authority, New York, NY (United States); Key, T.; Phipps, K. [EPRI Power Electronics Applications Center, Knoxville, TN (United States)

1995-12-31T23:59:59.000Z

328

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

329

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

330

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

331

Headquarters Facilities Master Security Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

332

Sheffield Utilities | Open Energy Information  

Open Energy Info (EERE)

Utilities Utilities Jump to: navigation, search Name Sheffield Utilities Place Alabama Utility Id 17033 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Security Light 100 W HPS Openbottom Lighting Security Light 150 W HPS Cobrahead Lighting Security Light 150 W HPS Decorative Light Lighting Security Light 1500 W MH Floodlight Lighting Security Light 175 W MV Openbottom Lighting Security Light 250 W HPS Cobrahead Lighting Security Light 250 W HPS Decorative Light Lighting Security Light 250 W HPS Floodlight Lighting

333

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

334

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

335

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

336

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

337

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

338

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

339

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

340

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Fergus Electric Coop, Inc | Open Energy Information  

Open Energy Info (EERE)

Electric Coop, Inc Electric Coop, Inc Jump to: navigation, search Name Fergus Electric Coop, Inc Place Montana Utility Id 21513 Utility Location Yes Ownership C NERC Location WECC NERC WECC Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Activity Buying Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Green Power Residential Irrigation Industrial Security Light - 100 watt HPS Lighting Security Light - 150 watt HPS Lighting Security Light - 175 watt MV Lighting Security Light - 250 watt MV Lighting Security Light - 400 watt MV Lighting

342

Cullman Power Board | Open Energy Information  

Open Energy Info (EERE)

Board Board Jump to: navigation, search Name Cullman Power Board Place Alabama Utility Id 4617 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Outdoor Lights 100 W HPS Lighting Outdoor Lights 175 W MV Lighting Outdoor Lights 400 W MV Lighting Residential Residential Security Light Service 1000 W MH Lighting Security Light Service 250 W HPS Flood Lighting Security Light Service 250 W MH Lighting Security Light Service 400 W HPS Lighting Security Light Service 400 W HPS Flood Lighting

343

Security, Safety and Health  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

344

Security Administration Production Office,  

NLE Websites -- All DOE Office Websites (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

345

HEADQUARTERS SECURITY OFFICERS  

NLE Websites -- All DOE Office Websites (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

346

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

347

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

348

Light's twist  

Science Journals Connector (OSTI)

...Glasgow G12 8QQ, UK An invited Perspective to mark the election of Miles Padgett to the fellowship of the Royal Society in 2014. That...energy and momentum flow within light beams can twist to form vortices such as eddies in a stream. These...

2014-01-01T23:59:59.000Z

349

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

350

ESPC Sucess Story - Harold Washington Social Security Administration Center  

NLE Websites -- All DOE Office Websites (Extended Search)

HAROLD WASHINGTON HAROLD WASHINGTON SOCIAL SECURITY ADMINISTRATION CENTER CHICAGO, ILLINOIS Water Conservation and Green Energy ESPC SUCCESS STORY The Harold Washington Social Security Center in Chicago, IL, installed numerous energy conservation measures using direct financing and Energy Savings Performance Contracts (ESPCs). These measures include: a 110-kilowatt, rooftop solar electric system; energy efficient lighting fixtures and controls; retro- commissioning and energy management control system upgrades; chilled water system improve- ments; HVAC improvements; low-flow fixtures and waterless urinals. These projects reduce the Center's annual energy consumption by more than 20 percent - a total of more than 4 million kWh - and save 2 million gallons of water each year.

351

ESPC Sucess Story - Harold Washington Social Security Administration Center  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HAROLD WASHINGTON HAROLD WASHINGTON SOCIAL SECURITY ADMINISTRATION CENTER CHICAGO, ILLINOIS Water Conservation and Green Energy ESPC SUCCESS STORY The Harold Washington Social Security Center in Chicago, IL, installed numerous energy conservation measures using direct financing and Energy Savings Performance Contracts (ESPCs). These measures include: a 110-kilowatt, rooftop solar electric system; energy efficient lighting fixtures and controls; retro- commissioning and energy management control system upgrades; chilled water system improve- ments; HVAC improvements; low-flow fixtures and waterless urinals. These projects reduce the Center's annual energy consumption by more than 20 percent - a total of more than 4 million kWh - and save 2 million gallons of water each year.

352

Y-12 lights the night | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Media Congressional Testimony Fact Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog Y-12...

353

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

354

City of Livingston, Texas (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Texas (Utility Company) Texas (Utility Company) Jump to: navigation, search Name City of Livingston Place Texas Utility Id 11097 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Industrial Rate Industrial Large Light and Power Commercial Large School and Government Commercial Monthly Security Light Charge Lighting Residential Residential Security Lights- 1000W MH Lighting Security Lights- 1000W MV Lighting Security Lights- 100W HPS Lighting Security Lights- 175W MV Lighting Security Lights- 400W MH Lighting

355

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

356

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

357

Texas Electric Lighting Report  

NLE Websites -- All DOE Office Websites (Extended Search)

electric lighting electric lighting The SNAP House's lighting design aims for elegant simplicity in concept, use, and maintenance. Throughout the house, soft, ambient light is juxtaposed with bright, direct task lighting. All ambient and most task lighting is integrated directly into the architectural design of the house. An accent light wall between the bedroom and bathroom provides a glowing light for nighttime navigation.

358

Light Water Reactor Sustainability (LWRS) Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Light Water Reactor Light Water Reactor Sustainability (LWRS) Program Light Water Reactor Sustainability (LWRS) Program Light Water Reactor Sustainability (LWRS) Program The Light Water Reactor Sustainability (LWRS) Program is developing the scientific basis to extend existing nuclear power plant operating life beyond the current 60-year licensing period and ensure long-term reliability, productivity, safety, and security. The program is conducted in collaboration with national laboratories, universities, industry, and international partners. Idaho National Laboratory serves as the Technical Integration Office and coordinates the research and development (R&D) projects in the following pathways: Materials Aging and Degradation Assessment, Advanced Instrumentation, Information, and Control Systems

359

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

360

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

362

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

363

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

364

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

365

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

366

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

367

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

368

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

369

City of Hogansville, Georgia (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Hogansville, Georgia (Utility Company) Hogansville, Georgia (Utility Company) Jump to: navigation, search Name Hogansville City of Place Georgia Utility Id 8698 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes Activity Bundled Services Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Residential Residential Security Lights, HPS 100 Lighting Security Lights, HPS 250 Lighting Security Lights, HPS 400 Lighting Security Lights, HPS Flood 250 Lighting Security Lights, HPS Flood 400 Lighting Security Lights, MH 1000 Lighting Security Lights, MH 400 Lighting Security Lights, MV 175 Lighting

370

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers (EERE)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

371

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

372

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

373

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

374

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers (EERE)

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

375

ETTP Security Access Control System (ESACS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

376

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

377

City of Palmetto, Georgia (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Georgia (Utility Company) Georgia (Utility Company) Jump to: navigation, search Name City of Palmetto Place Georgia Utility Id 14396 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Large Commercial Commercial Residential Electric Rates Residential Security Lighting Service 100 W HPSV Lighting Security Lighting Service 250 W HPSV Lighting Security Lighting Service 400W HPSV Lighting Security Lighting Service 400W MV Lighting Security Lighting Service- 1000 W MH Lighting Security Lighting Service- 175W MV Lighting

378

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

379

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

380

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Climate Change and National Security  

E-Print Network (OSTI)

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

382

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

383

Hardware Security through Design Obfuscation.  

E-Print Network (OSTI)

??Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs (more)

Chakraborty, Rajat Subhra

2010-01-01T23:59:59.000Z

384

Jordan | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Jordan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

385

Personnel Security Corner- PERSEC Corner  

Energy.gov (U.S. Department of Energy (DOE))

Welcome to the Departmental Personnel Security PERSEC Corner document collection. If you have not yet registered for access to this information, please complete our Registration form.

386

russia | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

russia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

387

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

388

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

389

David Telles wins NNSA Security  

NLE Websites -- All DOE Office Websites (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

390

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

391

Secure Data Center (Fact Sheet)  

SciTech Connect

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

392

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

393

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

394

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

395

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

require authoization be obtained throught the SNL Foreign National Request (FNR) Security Plan (SP) electronic process. The Contractor and Subcontractor must notify their...

396

Information Technology Management ((Information Security))  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

397

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not include controlled...

398

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

399

Cyberspace security system  

SciTech Connect

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

400

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS  

E-Print Network (OSTI)

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS Thomas Neubauer Secure Business Austria of security safeguards is often a result of current needs or influ- enced by security problems that may go decision makers with an overview of common methods for the evaluation and selection of security safeguards

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Computer Security Division 2009 Annual Report  

E-Print Network (OSTI)

Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

402

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

403

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network (OSTI)

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

404

Army Energy Security Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

ARMY Energy Security ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11% of installations' budget US ARMY IS DEPENDENT ON 1 ¾ ¾ ¾ ¾ ¾ In ¾ 3 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Challenges To Managing The Future World population growing: 6.5 B in 2006, 2030 estimate 7.9 B

405

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

406

Safety, security and safeguard  

Science Journals Connector (OSTI)

Abstract A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion based on the use of sensors, signal lines and alarm systems is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks.

Nasiru Imam Zakariya; M.T.E. Kahn

2015-01-01T23:59:59.000Z

407

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 National Security Complex Y-12 National Security Complex Home > About Us > Our Operations > Acquisition and Project Management > M & O Support Department > Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 09/30/2013 BASIC Contract (Official) Modifications (Official) Funding Mods Available Upon Request Conformed Contract (Unofficial) Basic Contract dated 8/31/2000 (pdf, 13,886KB) Y-12 A001 (9/15/00) (pdf, 60KB) Y-12 Conformed Contract (Conformed to Mod 297 dated 09/30/2013 (pdf, 4201 KB) Y-12 A002 (10/15/00) (pdf, 130KB) Y-12 M003 (10/26/00) (pdf, 77KB) Y-12 M004 (10/31/00) (pdf, 865KB) Y-12 M006 (10/31/00) (pdf, 191KB)

408

Office of Security Policy - Safeguards and Security Frequently Asked  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Safeguards and Security New Frequently Asked Questions The following frequently asked questions (FAQs) are organized by the topical areas and offer answers to recurring questions or policy clarification requests. These entries represent the newest additions to the collection of S&S FAQs. 1. General 2. Program Planning and Management 3. Protection Program Operations 4. Information Security 5. Nuclear Material Control and Accountability General Q: Where can I find the national policies that may affect security programs I am responsible for? A: The national policies affecting DOE's safeguards and security programs are located on the Policy Information Resource tool at http://pir.pnl.gov. This collection is comprised of the most current version of each policy

409

Low-Pressure Sodium Lighting Basics | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Low-Pressure Sodium Lighting Basics Low-Pressure Sodium Lighting Basics Low-Pressure Sodium Lighting Basics August 16, 2013 - 10:17am Addthis Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and security lighting, where color is not important. Low-pressure sodium lamps work somewhat like fluorescent lamps. Like high-intensity discharge lighting, low-pressure sodium lamps require up to 10 minutes to start and have to cool before they can restart. Therefore, they are most suitable for applications in which they stay on for hours at a time. They are not suitable for use with motion detectors. The chart below compares low-pressure sodium lamps and high-intensity

410

Lighting Test Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Custom Projects Lighting Test Facilities SSL Guidelines Industrial Federal Agriculture LED Street and Area Lighting Field Test of Exterior LED Down Lights Abstract Outdoor...

411

Light Water Reactor Sustainability  

NLE Websites -- All DOE Office Websites (Extended Search)

4 Light Water Reactor Sustainability ACCOMPLISHMENTS REPORT 2014 Accomplishments Report | Light Water Reactor Sustainability 2 T he mission of the Light Water Reactor...

412

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

413

Departmental Personnel Security- Policy and Procedures  

Energy.gov (U.S. Department of Energy (DOE))

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

414

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

O 470.4B, Safeguards and Security Program by Mary Gallion Functional areas: Safety, Safety and Security, Security, Work Processes, To establish responsibilities for the U.S....

415

SUBJECT: National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Sandia Site Ofce P. 0. Box 5400 Albuquerque, NM 87185 JAN O=P= ONP= Annual National Environmental Policy Act Planning Sumary 2013 Attached is: the Annual National Environmental Policy Act (NEPA) Planning Summary for the National Nuclear Security Administation, Sandia Site Ofce (SSO). Currently, there are two environmental assessments planned and one environmental impact statement in progess for the

416

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network (OSTI)

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

417

Distributed Internet Security and Measurement  

E-Print Network (OSTI)

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

418

Pricing Security L. Jean Camp  

E-Print Network (OSTI)

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

419

Reporting Incidents Of Security Concern  

Directives, Delegations, and Requirements

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

420

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

422

Fluid Mechanics and Homeland Security  

E-Print Network (OSTI)

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department and sampling, explosive detection, microfluidics and labs-on-a-chip, chem- ical plume dispersal in urban security combines established fluids topics like plume dispersion with others that are new

Settles, Gary S.

423

Village of Deshler, Ohio (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Deshler Deshler Place Ohio Utility Id 5096 Utility Location Yes Ownership M NERC Location RFC NERC RFC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial General Service (Single Phase) Commercial Commercial General Service (Three Phase) Commercial Industrial Large Power Service Industrial Outdoor Security Lighting (100 HPS) Commercial Outdoor Security Lighting (150 HPS) Commercial Outdoor Security Lighting (175 MV) Commercial Outdoor Security Lighting (250 HPS) Commercial Outdoor Security Lighting (250 MV) Commercial Outdoor Security Lighting (400 MV) Commercial

424

Contract Provisions and Ratchets: Utility Security or Customer Equity?  

E-Print Network (OSTI)

CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric.... INTRODUCTION The pricing structures of large commercial and industrial electric tariffs often contain various contract provisions which provide for some minimum demand to be billed to the customer over a period of time. These contract provisions include...

Penkala, B. A.

425

Office of Secure Transportation Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16th, 2012 16th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other missions supporting the national security of the United States of America. 3 5 OST's Commitment to Transportation Safety and Security Over three decades of safe, secure transport of nuclear weapons and special nuclear material to and from military locations and DOE facilities More than 140 million miles traveled Over three decades and 240,000 flight hours of accident-free flying Professionalism We conduct ourselves and our operations with the highest standards of professionalism and integrity.

426

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

427

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 8, 2012 May 8, 2012 PSH-12-0004 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. In September of 2011, the individual informed his contractor, which in turn informed the local DOE security office (LSO), that he had been hospitalized for treatment of his depression and suicidal thoughts. Exhibit 15. The LSO summoned the individual for an interview with a personnel security specialist on September 20, 2011. Exhibit 22 (Transcript of Personnel Security Interview). May 4, 2012 PSH-12-0007 - In the Matter of Personnel Security Hearing The individual began working at a DOE site in March 1992. Tr. at 87. In September 1999, his employer requested an access authorization for him. Ex.

428

Security and You, May 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Incidents Headquarters Security Incidents The Department of Energy depends on its employees to protect sensitive and classified information. You are the first line of defense. Your failure to properly protect classified information and controlled unclassified information not only endangers our national security, it can also subject you to criminal, civil, or administrative penalties. Unfortunately, DOE Headquarters (HQ) had over fifty security incidents in 2012. The majority of Security Incidents are easily preventable. Let's take an actual case that happened at HQ. A new employee wrote down the combination to a classified container so that they could easily access the combination without having to memorize it. So it would be within reach, the person put the combination

429

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

430

Safety and Security Directives Reform  

NLE Websites -- All DOE Office Websites (Extended Search)

Reforming a "Mountain" of Policy Reforming a "Mountain" of Policy Beginning with his confirmation hearings in January 2009, Energy Secretary Steven Chu challenged the Department of Energy to take a fresh look at how we conduct business. This challenge provided the opportunity for DOE to put in place the most effective and efficient strategies to accomplish the Department's missions safely and securely. In response to the Secretary's challenge and building on the results of Deputy Secretary Poneman's Safety and Security Reform studies, the Office of Health, Safety and Security (HSS) broadened its directives review activities during 2009. By November 2009 HSS had initiated a disciplined review of all health, safety, and security directives, which included a systematic review of the Department's safety and security regulatory model.

431

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 19, 2013 April 19, 2013 PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. April 17, 2013 PSH-12-0143 - In the Matter of Personnel Security On April 17, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under Criteria H, J, and L of 10 CFR

432

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2013 January 23, 2013 PSH-12-0121 - In the Matter of Personnel Security Hearing This Decision concerns the eligibility of XXXXXXXX (hereinafter referred to as "the individual") to hold an access authorization under the Department of Energy's (DOE) regulations set forth at 10 C.F.R. January 17, 2013 PSH-12-0118 - In the Matter of Personnel Security Hearing On January 17, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance after the individual had incurred $20,000 in charges while patronizing a "gentleman's club" on a single evening; approximately $17,000 of that amount was charged to his corporate credit card. His

433

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 19, 2011 July 19, 2011 TSO-1013 - In the Matter of Personnel Security The individual works for a Department of Energy (DOE) contractor and is an applicant for a DOE access authorization. In the report of a background investigation, the Office of Personnel Management noted that the individual had a history of anger, unusual behaviors, animal abuse, illegal drug use, court-ordered anger management, and counseling. The Local Security Office (LSO) interviewed the individual on June 9, 2010, regarding these concerns in a Personnel Security Interview (PSI). July 15, 2011 TSO-1003 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 2010. His employer requested that DOE grant the individual a clearance. The individual completed a Questionnaire for National Security

434

Quantum Enabled Security (QES) for Optical Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled Security (QES), a revolutionary new cybersecurity capability using quantum (single-photon) communications integrated with optical communications to provide a strong, innate, security foundation at the photonic layer for optical fiber networks. July 10, 2013 Quantum Enabled Security (QES) for Optical Communications Available for thumbnail of Feynman Center (505) 665-9090 Email Quantum Enabled Security (QES) for Optical Communications Applications: Secure communication over optical or free space networks Financial networks Transparent access networks: fiber to the home (FTTH); fiber to the

435

Lemnos Interoperable Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Lemnos Interoperable Security The Lemnos Interoperable Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements, energy asset owners can better evaluate product functions and purchase products from different vendors knowing they will be interoperable. Three years later, the Lemnos team developed those specifications-called interoperable configuration profiles-and one of the first products built to those profiles is in the market. Lemnos Interoperable Security More Documents & Publications Lemnos Interoperable Security Program SECURITY CORE FUNCTION AND DEFINITION REPORT Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

436

Evergreen Securities formerly Ethanol Investments | Open Energy...  

Open Energy Info (EERE)

Securities formerly Ethanol Investments Jump to: navigation, search Name Evergreen Securities (formerly Ethanol Investments) Place London, England, United Kingdom Zip EC2V 5DE...

437

first responders | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Blog Home first responders first responders Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

438

render safe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

at NNSA Blog Home render safe render safe Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

439

consequence management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

consequence management consequence management Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

440

Solutia: Massachusetts Chemical Manufacturer Uses SECURE Methodology...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURE Methodology to Identify Potential Reductions in Utility and Process Energy Consumption Solutia: Massachusetts Chemical Manufacturer Uses SECURE Methodology to Identify...

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

July 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Jul 1, 2014 Transition for Pantex and Y-12 Contract Completed The National Nuclear Security Administration Production Office and Consolidated Nuclear Security...

442

EU Energy Situations and Supply Security.  

E-Print Network (OSTI)

?? Energy supply security is a hot topic today. It highly influences energy market, national security and also residents daily lives. However, due to different (more)

Xu, Chen

2008-01-01T23:59:59.000Z

443

January 2014 Cybersecurity Awareness Campaign - Secure Online...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping The primary cyber theme for the...

444

Independent Oversight Inspection, Office of Secure Transportation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection, Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency...

445

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

446

Independent Activity Report, Office of Secure Transportation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

447

October 4, 2010: Robot on Security Patrol  

Energy.gov (U.S. Department of Energy (DOE))

October 4, 2010The Department's National Nuclear Security Administration (NNSA) announces that the Nevada National Security Site (NNSS) has brought the first of three Mobile Detection Assessment...

448

2014 Headquarters Facilities Master Security Plan- Acronyms  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

449

Safeguards and Security Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

450

Transportation Safeguards & Security Test Bed (TSSTB) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

451

Deriving Policies from Grid Security Requirements Model  

Science Journals Connector (OSTI)

The emerging Grid applications require rigorous approaches to handle security management issues as their scale, heterogeneity, ... , we propose a rigorous method of deriving security policies for grid application...

Syed Naqvi; Alvaro E. Arenas

2008-01-01T23:59:59.000Z

452

Security Enforcement Reporting Criteria | Department of Energy  

Energy Savers (EERE)

can be found in the Office of Health, Safety and Security's Enforcement Coordinator Handbook. Security Enforcement Reporting Criteria More Documents & Publications Safety and...

453

National Securities Technologies _NSTec_ Livermore Operations...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

454

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

455

Partnering with Utilities for Energy Efficiency & Security |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Partnering with Utilities for Energy Efficiency & Security Partnering with Utilities for Energy Efficiency & Security Presentation covers partnering with utilities for energy...

456

Automated Security Compliance Tool for the Cloud.  

E-Print Network (OSTI)

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

457

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

458

Security demo at Sunport October 13  

NLE Websites -- All DOE Office Websites (Extended Search)

Security demo at Sunport Security demo at Sunport October 13 The tool distinguishes potential-threat liquids from the harmless shampoos and sodas a regular traveler might take...

459

Recommended Security Controls for Federal Information Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

460

Privacy, Security, & Legal Disclaimer Notice - Hanford Site  

NLE Websites -- All DOE Office Websites (Extended Search)

About Us > Privacy, Security, & Legal Disclaimer Notice About Us Hanford Overview and History Hanford Cleanup Hanford Site Wide Programs Privacy, Security, & Legal Disclaimer...

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

0.4B Admin Chg 1, Safeguards and Security Program by Mary Gallion Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and...

462

Chapter_10_Security_Awareness_Program  

Office of Environmental Management (EM)

0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National...

463

Visitor Security Requirements | Savannah River Ecology Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Visitor Security Requirements NOTE: These requirements do not apply to events held at the SREL Conference Center, which is located outside the security barricade. Before you...

464

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23744 23744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch Communication  Idea Moderation  Adjust by KPIs 4. Close  Idea Evaluation  Debrief with Sponsor  Communicate Impacts Target Impacts  Program Development  Cost Reduction  Operational Improvement Value Propositions  Speed Collaboration

465

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

466

NATIONAL NUCLEAR SECURITY ADMINISTRATION  

National Nuclear Security Administration (NNSA)

NNSA Policy Letter: NAP-5 NNSA Policy Letter: NAP-5 (DOE P 450.3) Date: October 16, 2002 TITLE: Policy Letter for Standards Management I. OBJECTIVE: Establish NNSA expectations for Standards Management Programs used to select and maintain applicable standards for work performed at NNSA Headquarters and field sites. II. APPLICABILITY: NNSA federal staff and NNSA management and operating contractors, and other prime contractors as determined by NNSA Headquarters and/or field site management, shall use a defined formal process to tailor environment, safety, and health; project management; safeguards and security; quality assurance; business; and administrative standards and, as determined by NNSA management, other standards used to perform federal and contractor work. Here, the term standard encompasses federal,

467

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

468

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network (OSTI)

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

469

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network (OSTI)

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

470

Light Bodies: Exploring Interactions with Responsive Lights  

E-Print Network (OSTI)

reinterpretation of street lighting. Before fixed infrastructure illuminated cities at night, people carried Urban street lighting today is a networked, fixed infrastructure that relies on the electrical grid. WeLight Bodies: Exploring Interactions with Responsive Lights Susanne Seitinger MIT Media Laboratory

Hunt, Galen

471

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

472

Measuring Light Reflectance of BGO Crystal Surfaces  

E-Print Network (OSTI)

by the National Nuclear Security Administration, Office ofby the National Nuclear Security Administration, Office of

Janecek, Martin

2009-01-01T23:59:59.000Z

473

Cyber Security Evaluation of II&C Technologies  

SciTech Connect

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

474

NNSA Policies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us > Our Operations > Management and Budget > NNSA Policy About Us > Our Operations > Management and Budget > NNSA Policy System > NNSA Policies NNSA Policies NNSA Policies (NAPs) impart policy and requirements unique to the Administration or provide short-term notices until more formal direction can be provided. NAP-4B Corporate Performance Process for M&O Contractors June 30, 2008 NAP-5 Standards Management October 16, 2002 NAP-6 FEOSH Program for NNSA Headquarters Employees December 19, 2002 NAP-7 NNSA's Acquisition and Assistance Policy Guidance December 9, 2002 NAP-14.1D Baseline Cyber Security Program December 14, 2012 NAP-21 Signed Governance and Oversight March 2, 2011 NAP-23 Transformational Governance and Oversight February 28, 2011 NAP-24 Weapons Quality Policy June 20, 2013 NAP-25 Management and Operating Contractor Business Meals and Light Refreshment

475

Lighting | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lighting Lighting Lighting When you're shopping for lightbulbs, compare lumens and use the Lighting Facts label to be sure you're getting the amount of light, or level of brightness, you want. You can save money and energy while lighting your home and still maintaining good light quantity and quality. Consider energy-efficient lighting options to use the same amount of light for less money. Learn strategies for comparing and buying lighting products and using them efficiently. Featured Lighting Choices to Save You Money Light your home for less money while using the same amount of light. How Energy-Efficient Light Bulbs Compare with Traditional Incandescents Energy-efficient light bulbs are available today and could save you about $50 per year in energy costs when you replace 15 traditional incandescent bulbs in your home.

476

Edinburgh Research Explorer Scotland, NATO, and transatlantic security  

E-Print Network (OSTI)

Edinburgh Research Explorer Scotland, NATO, and transatlantic security Citation for published version: Fleming, C & Gebhard, C 2014, 'Scotland, NATO, and transatlantic security' European Security, vol Statement: �Fleming, C., & Gebhard, C. (2014). Scotland, NATO, and transatlantic security. European Security

Schnaufer, Achim

477

Security for Radioactive Sources: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for Radioactive Sources: Fact Sheet | National Nuclear Security for Radioactive Sources: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Security for Radioactive Sources: Fact Sheet Fact Sheet Security for Radioactive Sources: Fact Sheet Mar 23, 2012 Radioactive materials are a critical and beneficial component of global

478

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

479

Nuclear Forensics | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

480

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Markel Markel SRA International Lawrence_Markel@sra.com Federal Utility Partnership Working Group Fall 2012 - October 16-17 Mobile, AL Sponsored by Alabama Power Theme Meeting energy security requirements in federal facilities provides opportunities for additional types of cooperation between utilities and the federal agencies. However, there are significant barriers to pursuing these opportunities - constraints on utilities and on federal agencies, as well as sometimes-competing objectives. Energy security encompasses sufficiency, surety, and sustainability.  Above all, energy security means having adequate power to conduct critical operations for the duration required (sufficiency).  Secondarily, and leading to sufficiency, is ensuring resilient energy supplies that are accessible when

Note: This page contains sample records for the topic "mv lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Announcements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Announcements | National Nuclear Security Administration Announcements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Announcements Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Announcements

482

Supercomputers | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Supercomputers | National Nuclear Security Administration Supercomputers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Supercomputers Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Supercomputers

483

AP1000 Design for Security  

SciTech Connect

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

484

Saudi National Security. Research report  

SciTech Connect

The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

Al-Ayed, I.

1996-05-01T23:59:59.000Z

485

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

486

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

487

Grid Security: Expecting the Mingchao Ma  

E-Print Network (OSTI)

Grid Security: Expecting the Unexpected Mingchao Ma STFC � Rutherford Appleton Laboratory, UK #12;Slide 2 Overview � Security Service Challenges (SSC) Review � Grid Security Incident � What had happened of the LCG/EGEE Grid Sites (Dec 2008) http://www.gridpp.ac.uk/security/ssc/ https

University College London

488

06 DEC 2013 1 Information Security Guideline  

E-Print Network (OSTI)

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

489

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network (OSTI)

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

490

Architectural Lighting Analysis in Virtual Lighting Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Architectural Lighting Analysis in Virtual Lighting Laboratory Architectural Lighting Analysis in Virtual Lighting Laboratory Speaker(s): Mehlika Inanici Date: July 7, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Satkartar K. Kinney Virtual Lighting Laboratory is a Radiance-based lighting analysis tool and methodology that proposes transformations in the utilization of computer visualization in lighting analysis and design decision-making. It is a computer environment, where the user has been provided with matrices of illuminance and luminance values extracted from high dynamic range images. The principal idea is to provide the laboratory to the designer and researcher to explore various lighting analysis techniques instead of imposing limited number of predetermined metrics. In addition, it introduces an analysis approach for temporal and spatial lighting

491

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

492

Homeland Security Presidential Directive 7  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Homeland Security Presidential Directive/Hspd-7 3 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization, and Protection Purpose (1) This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks. Background (2) Terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence. (3) America's open and technologically complex society includes a wide array of critical infrastructure

493

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 14, 2012 February 14, 2012 PSH-11-0002 - In the Matter of Personnel Security Hearing The administrative review proceeding began with the issuance of a Notification Letter to the Individual. See 10 C.F.R. 710.21. The letter informed the Individual that information in the possession of the DOE created a substantial doubt concerning her eligibility for a security clearance. Specifically, the Local Security Office (LSO) characterized this information as indicating that the Individual had engaged in unusual conduct which brought her honesty, trustworthiness, and reliability into question, and been diagnosed by a psychologist with alcohol abuse. February 9, 2012 PSH-11-0015 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor in a position that requires

494

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites

About About Careers Community Employees & Retirees Library Suppliers Contact Us Y-12 Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | B&W Y-12 donates $75,000 to Emory Valley Center Facebook Twitter YouTube Flickr RSS Feature Stories Expertise Our NRFTC trainers have many years of operational experience at Y-12 as well as on numerous international missions. Nuclear Detection and Forensics A strong technical nuclear detection and forensics capability is important to the nation's security. "Cook"ing at Y-12 for 70 years We have an enduring mission. Y-12 plays a key role in it. And a nuclear deterrent remains the ultimate insurance policy for America. Young Innovators' Society Awesome Eyeballs visit Y-12

495

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 31, 2012 July 31, 2012 PSH-12-0042 - In the Matter of Personnel Security Hearing This case involves an Individual who failed to meet his financial obligations during the final years of his first marriage. The Individual reported the repossession of his motor vehicle and a home foreclosure to the Local Security Office (LSO) in 2008. The LSO subsequently conducted a series of three Personal Security Interviews (PSI) of the Individual, the most recent on February 1, 2012. July 27, 2012 PSH-12-0050 - In the Matter of Personnel Security Hearing The individual's present employer, a DOE contractor, has requested a DOE access authorization for the individual. The individual completed and submitted an Electronic Questionnaire for Investigations Processing (QNSP) in November 2011. DOE Exhibit 8. Based on issues contained in the

496

Pollux | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Pollux | National Nuclear Security Administration Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > Pollux Pollux Pollux The National Nuclear Security Administration (NNSA) announced that Pollux, a subcritical experiment, was successfully conducted at its Nevada National Security Site (NNSS). This video is of the vessel containing the Pollux experiment.

497

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 31, 2013 July 31, 2013 PSH-13-0033 - In the Matter of Personnel Security On July 31, 2013, an OHA Hearing Officer issued a decision in which he concluded that a security clearance should not be granted to an individual. The individual disclosed during his background investigation that in 2005-06 he had been charged for battery as a result of a dispute with a neighbor, domestic violence as a result of an altercation with his then-wife, and driving under the influence of alcohol. Beginning in 2007, the individual had separately attended court-mandated domestic violence counseling and alcohol treatment programs. July 26, 2013 PSH-13-0044 - In the Matter of Personnel Security Hearing On July 26 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be

498

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

REPORTING REQUIREMENTS REPORTING REQUIREMENTS Reporting Requirements Matrix Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a coworker, you must do so in writing with signature and date. Your report should contain factual and comprehensive information regarding the incident. A good rule of thumb is to ask yourself did I cover the "Who, What, When, Where, and How." If you did, your report will most likely provide all of the necessary information needed by personnel security to render an adjudicative action or decision. FSO Reporting Responsibilities List of company changes that need to be reported by the FSO. SF 2730-NCB, Name Change Request DOE F 5631.29, Security Termination Statement

499

Budget | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Budget | National Nuclear Security Administration Budget | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Budget Home > About Us > Budget Budget Full details of the President's FY14 budget for NNSA can be found here. We're keeping the American people safe. President Obama has laid out the most ambitious view of nuclear security in decades. Our

500

Army Energy Security and Independence  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ARMY ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership Energy Costs Driven by Global Situation OIL & GAS LIQUIDS Army Utilities Energy Use * 35% of DoD consumption * 21% of Fed government use * 11% of installations' budget * Commodity Prices increasing 8 - 20% annually Consumption Climbs as new sources decrease Oil production is primarily OCONUS and decreasing Our consumption is out of balance with our Reserves New Sources Dwindling - Forcing our reliance on Unstable governments 3 ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership Oil Field Forecasts Peak Year Oil Expert