Powered by Deep Web Technologies
Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS  

E-Print Network [OSTI]

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION 5 Additions and Alterations Any alteration that increases the connected lighting load must meet all No measures required OUTDOOR LIGHTING11/20/2014 #12;SECTION 5 BACKLIGHT, UPLIGHT, AND GLARE (BUG) RATINGS

California at Davis, University of

2

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS  

E-Print Network [OSTI]

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION level of each multi-tier garage. · General lighting must have occupant sensing controls with at least one control step between 20% and 50% of design lighting power · No more than 500 watts of rated

California at Davis, University of

3

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS  

E-Print Network [OSTI]

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION performance in relation to lighting trespass, sky glow, and high angle brightness. This is necessary in order to reduce light pollution, which has a negative effect on wildlife and the surrounding environments

California at Davis, University of

4

High Performance Outdoor Lighting Accelerator  

Broader source: Energy.gov [DOE]

Hosted by the U.S. Department of Energy (DOE)s Weatherization and Intergovernmental Programs Office (WIPO), this webinar covered the expansion of the Better Buildings platform to include the newest initiative for the public sector: the High Performance Outdoor Lighting Accelerator (HPOLA).

5

Pedestrian Friendly Outdoor Lighting  

SciTech Connect (OSTI)

This GATEWAY report discusses the problems of pedestrian lighting that occur with all technologies with a focus on the unique optical options and opportunities offered by LEDs through the findings from two pedestrian-focused projects, one at Stanford University in California, and one at the Chautauqua Institution in upstate New York. Incorporating user feedback this report reviews the tradeoffs that must be weighed among visual comfort, color, visibility, efficacy and other factors to stimulate discussion among specifiers, users, energy specialists, and in industry in hopes that new approaches, metrics, and standards can be developed to support pedestrian-focused communities, while reducing energy use.

Miller, Naomi J.; Koltai, Rita; McGowan, Terry

2013-12-31T23:59:59.000Z

6

TAP Webinar: High Performance Outdoor Lighting Accelerator  

Broader source: Energy.gov [DOE]

Hosted by the Technical Assistance Program (TAP), this webinar will cover the recently announced expansion of the Better Buildings platform the High Performance Outdoor Lighting Accelerator (HPOLA).

7

STATE OF CALIFORNIA OUTDOOR LIGHTING WORKSHEET  

E-Print Network [OSTI]

STATE OF CALIFORNIA OUTDOOR LIGHTING WORKSHEET CEC-OLTG-2C (Revised 03/10) CALIFORNIA ENERGY COMMISSION 2008 Nonresidential Compliance Forms March 2010 OUTDOOR LIGHTING WORKSHEET (Page 1 of 3) OLTG-2C Project Name: Date: A. LIGHTING POWER ALLOWANCE FOR GENERAL HARDSCAPE AREA WATTAGE ALLOWANCE (AWA) LINEAR

8

DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

criteria might be, how they differ from street and area lighting applications, and how solid-state lighting can be better applied in pedestrian applications. Every outdoor...

9

Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting Webcast  

Broader source: Energy.gov [DOE]

In this October 8, 2009 webcast, ENERGY STAR Program Manager Richard Karney gave an overview of ENERGY STAR criteria covering SSL-based outdoor area and roadway lighting, outdoor wall packs,...

10

Outdoor Area Lighting | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment ofOil's Impact on Our National-Projects2008Outdoor Area Lighting

11

FEMP Outdoor Solid-State Lighting Intiative: Resources for Outdoor...  

Broader source: Energy.gov (indexed) [DOE]

sheet describes the Federal Energy Management Program's (FEMP) solid-state lighting (SSL) initiatives that provide information and resources for the application of SSL lighting...

12

Hierarchical Lighting Simulation for Outdoor Scenes Katja Daubert, Hartmut Schirmacher  

E-Print Network [OSTI]

energy exchanges in outdoor scenes for the first time, including terrain and botanical models as well algorithms, which permit efficient and elegant solutions. In particular,we show that complex geometry can algorithms for outdoor scenes suffer from the sheer geometric and lighting complexity of such environments

Boyer, Edmond

13

Campus Outdoor Lighting Standards The following standards provide for minimum safe lighting standards for outdoor area of  

E-Print Network [OSTI]

Campus Outdoor Lighting Standards The following standards provide for minimum safe lighting with a minimum of 3 foot candles. This lighting level is for daytime and at night. Public Streets Streets must have a minimum of one foot candles average with a minimum of .6 foot candles. Augmented lighting should

de Lijser, Peter

14

Outdoor Lighting Overview Page 6-1 2008 Nonresidential Compliance Manual August 2009  

E-Print Network [OSTI]

Outdoor Lighting ­ Overview Page 6-1 2008 Nonresidential Compliance Manual August 2009 6 Outdoor Lighting This chapter covers the requirements for outdoor lighting design and installation, including controls. This section applies to all outdoor lighting, whether attached to buildings, poles, structures

15

Outdoor Solar Lighting | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartmentEnergy General Law (GC-56)The4 InOur OrganizationOutdoor

16

LED Outdoor Area Lighting Fact Sheet  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DCKickoffLDV HVAC ModelLEDLights forOutdoor

17

Text-Alternative Version: Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the Hitting the Target: ENERGY STAR SSL Outdoor Area Lighting Webcast.

18

Instructions and Data Form for Local Authority Having Jurisdiction to Submit Adjustments to Default Outdoor Lighting Zones  

E-Print Network [OSTI]

Outdoor Lighting Zones Adjustments to Default Outdoor Lighting Zones A local Authority Having Jurisdiction (AHJ) may officially adopt changes to the default Outdoor Lighting Zone designation of an area the proposed change. For example, the AHJ may determine areas where Outdoor Lighting Zone 4 is applicable

19

The Municipal Solid-State Street Lighting Consortium Public Outdoor Lighting Inventory: Phase I: Survey Results  

SciTech Connect (OSTI)

This document presents the results of a voluntary web-based inventory survey of public street and area lighting across the U.S. undertaken during the latter half of 2013.This survey attempts to access information about the national inventory in a bottoms-up manner, going directly to owners and operators. Adding to previous top down estimates, it is intended to improve understanding of the role of public outdoor lighting in national energy use.

Kinzey, Bruce R.; Smalley, Edward; Haefer, R.

2014-09-30T23:59:59.000Z

20

Outdoor Solid-State Lighting Technology Deployment | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment ofOil's Impact on Our National-Projects2008Outdoor AreaTechnology

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Amending Default Outdoor Lighting Zones by Local Jurisdictions Having Authority (AHJ)  

E-Print Network [OSTI]

projects to unnecessarily require greater power, and to wasting of energy. The Energy Commission defines the boundaries of Lighting Zones based on U.S. Census Bureau boundaries for urban and rural areas as well designated parks, recreation areas and wildlife preserves are Lighting Zone 1; rural areas are Lighting Zone

22

Diffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication  

E-Print Network [OSTI]

privacy while carrying tagged items. Keywords: RFID, Tag-Reader communication security, Light item recall etc. As a result, very soon we can expect to see RFID tagged consumer items at manyDiffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication DIVYAN M

Kim, Kwangjo

23

Outdoor Cooking.  

E-Print Network [OSTI]

ham slices; sirloin, T-bone; rib and ribeye steaks; lamb or pork chops; beef or lamb cubes or patties; Cana. dian bacon; and some varieties of sausage; fryers and fish. Some outdoor cooks prefer a large sirloin steak about 1% inches thick. Allow 1..., sirloin tips and high /-I quality (low choice) chuck and arm roasts are suitable for this 0 .' type of cooking. Lamb, pork and bologna may also be used. / (-)/ Poultry for this method include rock cornish game hen, broiler 1 \\ or fryer, roaster...

Douglas, Jenoyce; Reasonover, Frances

1967-01-01T23:59:59.000Z

24

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

25

Outdoor Water Conservation  

E-Print Network [OSTI]

L-438 Outdoor Water Conservation The City of OKLAHOMA CITY UTILITIES DEPARTMENT Oklahoma.JustinQ.Moss 1 #12;2 SEVEN PRINCIPLES FOR CREATING A WATER CONSERVING LANDSCAPE 1. GOOD LANDSCAPE PLANNING

Balasundaram, Balabhaskar "Baski"

26

Science and the Energy Security Challenge: The Example of Solid-State Lighting  

ScienceCinema (OSTI)

Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

Julia Phillips

2010-01-08T23:59:59.000Z

27

E-Print Network 3.0 - audience outdoor obesity-related Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and commercial Summary: be difficult since retail stocking is inconsistent. The Light-Emitting Diode (LED) Hybrid Outdoor Fixture... Title 24 Building Efficiency Standards...

28

Outdoor PV Degradation Comparison  

SciTech Connect (OSTI)

As photovoltaic (PV) penetration of the power grid increases, it becomes vital to know how decreased power output; may affect cost over time. In order to predict power delivery, the decline or degradation rates must be determined; accurately. At the Performance and Energy Rating Testbed (PERT) at the Outdoor Test Facility (OTF) at the; National Renewable Energy Laboratory (NREL) more than 40 modules from more than 10 different manufacturers; were compared for their long-term outdoor stability. Because it can accommodate a large variety of modules in a; limited footprint the PERT system is ideally suited to compare modules side-by-side under the same conditions.

Jordan, D. C.; Smith, R. M.; Osterwald, C. R.; Gelak, E.; Kurtz, S. R.

2011-02-01T23:59:59.000Z

29

Safeguards and security requirements for weapons plutonium disposition in light water reactors  

SciTech Connect (OSTI)

This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

1994-10-01T23:59:59.000Z

30

Comparing Accelerated Testing and Outdoor Exposure | Department...  

Broader source: Energy.gov (indexed) [DOE]

Comparing Accelerated Testing and Outdoor Exposure Comparing Accelerated Testing and Outdoor Exposure Presented at the PV Module Reliability Workshop, February 26 - 27 2013,...

31

Pedestrian-Friendly Nighttime Lighting  

Broader source: Energy.gov [DOE]

This November 19, 2013 webinar presented issues and considerations related to pedestrian-friendly nighttime lighting, such as color rendering, safety, and adaptation. When it comes to outdoor...

32

Outdoor Lighting Resources | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F SSales LLCDiesel Enginesthe U.S.SolarMarket-Based Programs »

33

CALIFORNIA ENERGY California Outdoor Lighting Baseline  

E-Print Network [OSTI]

design, construction, and operation of building systems. The Integrated Energy Systems: Productivity Design of Commercial Building Ceiling Systems Integrated Design of Residential Ducting & Air Flow Systems of a larger research effort called Integrated Energy Systems: Productivity and Building Science Program

34

CALIFORNIA ENERGY Outdoor Lighting Survey Reports  

E-Print Network [OSTI]

efficiency is improved through the integrated design, construction, and operation of building systems of Small Commercial HVAC Systems Integrated Design of Commercial Building Ceiling Systems Integrated Design. The Integrated Energy Systems: Productivity and Building Science Program research addressed six areas

35

Mobile Phones and Outdoor Advertising: Measurable Advertising  

E-Print Network [OSTI]

Television and newspapers sit at the top of many agency marketing plans, while outdoor advertising stays at the

Quercia, Daniele

36

Reducing indoor residential exposures to outdoor pollutants  

SciTech Connect (OSTI)

The basic strategy for providing indoor air quality in residences is to dilute indoor sources with outdoor air. This strategy assumes that the outdoor air does not have pollutants at harmful levels or that the outdoor air is, at least, less polluted than the indoor air. When this is not the case, different strategies need to be employed to ensure adequate air quality in the indoor environment. These strategies include ventilation systems, filtration and other measures. These strategies can be used for several types of outdoor pollution, including smog, particulates and toxic air pollutants. This report reviews the impacts that typical outdoor air pollutants can have on the indoor environment and provides design and operational guidance for mitigating them. Poor quality air cannot be used for diluting indoor contaminants, but more generally it can become an indoor contaminant itself. This paper discusses strategies that use the building as protection against potentially hazardous outdoor pollutants, including widespread pollutants, accidental events, and potential attacks.

Sherman, Max H.; Matson, Nance E.

2003-07-01T23:59:59.000Z

37

Environment - Giant outdoor lab ... | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environment - Giant outdoor lab ... With the recent completion of a 40-meter observation tower in the nearby Walker Branch Watershed, Oak Ridge National Laboratory researchers are...

38

Outdoor Recreation Participation Trends in Texas  

E-Print Network [OSTI]

Outdoor recreation is a popular pastime in Texas. This publication reports on the participation and trends in outdoor recreation in the U.S. and Texas revealed in the National Survey on Recreation and the Environment conducted by the U.S. Forest...

Schuett, Michael A.; Shafer, Carl Scott; Lu, Jiaying

2009-01-06T23:59:59.000Z

39

Princeton University Outdoor Action Sustainability Guide  

E-Print Network [OSTI]

Princeton University Outdoor Action Sustainability Guide #12;Over the past thirty-five years students in the outdoors and how to facilitate team building and positive group interaction. In addition Itinerary ·Defining sustainability ·Princeton's Sustainability Plan ·Focus: fresh water and climate change

40

Reducing home lighting expenses  

SciTech Connect (OSTI)

Ways to reduce lighting expenses are summarized. These include: turning off lights when not in use; keeping fixtures and lamps clean; replacing lamps with more efficient types; using three-way bulbs; use of daylighting; buying fewer lamps and reducing lamp wattage; consider repainting rooms; replacing recessed fixtures with tracklighting; and using efficient lamps for outdoor use. (MCW)

Aimone, M.A.

1981-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

FEMP Outdoor Solid State Lighting Intiative: Resources for Outdoor SSL Applications  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstruction Management14, 2011Februaryof Energy

42

FEMP Outdoor Solid-State Lighting Intiative: Resources for Outdoor SSL  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review:Department of Energyand Review ofSafety OfficerAdvanced eTraining

43

Terrain sensing and estimation for dynamic outdoor mobile robots  

E-Print Network [OSTI]

In many applications, mobile robots are required to travel on outdoor terrain at high speed. Compared to traditional low-speed, laboratory-based robots, outdoor scenarios pose increased perception and mobility challenges ...

Ward, Christopher Charles

2007-01-01T23:59:59.000Z

44

Outdoor Outfitter Gets Greener With Solar Water Heater | Department...  

Broader source: Energy.gov (indexed) [DOE]

Outdoor Outfitter Gets Greener With Solar Water Heater Outdoor Outfitter Gets Greener With Solar Water Heater October 8, 2010 - 12:51pm Addthis L.L. Beans flagship store sees...

45

Arnold Schwarzenegger INDOOR-OUTDOOR AIR LEAKAGE  

E-Print Network [OSTI]

;#12;Indoor-Outdoor Air Leakage in Apartments and Commercial Buildings Appendix A Air Infiltration Model for Large Buildings Appendix B Analysis of Commercial Building Data Appendix C Commercial Building Data contains data and discussion of the leakage parameter in commercial buildings. The leakage parameter

46

Floodplain Assessment for the Proposed Outdoor Fire Range Upgrades at TA-72 in Lower Sandia Canyon, Los Alamos National Laboratory  

SciTech Connect (OSTI)

Los Alamos National Laboratory (LANL) is preparing to implement actions in Sandia Canyon at Technical Area (TA) 72. Los Alamos National Security (LANS) biologists conducted a floodplain determination and this project is partially located within a 100-year floodplain. The proposed project is to upgrade the existing outdoor shooting range facilities at TA-72. These upgrades will result in increased safety and efficiencies in the training for Protective Force personnel. In order to remain current on training requirements, the firing ranges at TA-72 will be upgraded which will result in increased safety and efficiencies in the training for Protective Force personnel (Figure 1). These upgrades will allow for an increase in class size and more people to be qualified at the ranges. Some of these upgrades will be built within the 100-year floodplain. The upgrades include: concrete pads for turning target systems and shooting positions, new lighting to illuminate the firing range for night fire, a new speaker system for range operations, canopies at two locations, an impact berm at the far end of the 300-yard mark, and a block wall for road protection.

Hathcock, Charles D. [Los Alamos National Laboratory

2012-08-27T23:59:59.000Z

47

Lighting and Dark Sky Regulations  

E-Print Network [OSTI]

.........................................................................................................2 C. Cherokee County, Georgia's Outdoor Lighting and Road Glare Ordinance visited Apr. 0, 2008) (providing links to ordinances throughout the United States). 2 See, e.g. Cherokee Protection Ordinance (Dec. , 200). 5 See, e.g. Model Lighting Section for Zoning Ordinances and Cherokee

Rosemond, Amy Daum

48

DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe HouseStudents2.2at MultipleorderNuclearThisProgram

49

DOE Publishes GATEWAY Report on Pedestrian Friendly Outdoor Lighting |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe HouseStudents2.2at MultipleorderNuclearThisProgramDepartment of Energy

50

Big Savings on Outdoor Lighting | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review: Top Five EEREDepartment ofEnergyEnergyBetter PlantsBeyondBig Savings on

51

Summer Loving-Energy-Efficient Outdoor Lighting! | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4 RecoveryJuly 1, 2013On-BoardSummer CampSummer

52

Model Specification for Networked Outdoor Lighting Control Systems |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Careerlumens_placard-green.eps MoreWSRC-STI-2007-00250 Rev. 05 Oak09 UAn aerialIllnessVersion 2.0 of

53

Determining Outdoor CPV Cell Temperature: Preprint  

SciTech Connect (OSTI)

An accurate method is needed for determining cell temperature when measuring CPV modules outdoors. It has been suggested that cell temperature can be calculated though a procedure that shutters sunlight to the cells while measuring the transients in open-circuit voltage (Voc) and heat sink temperature. This paper documents application of this shutter procedure to multiple CPV modules at NREL. The challenges and limitations are presented along with an alternate approach to measuring CPV cell operating temperature.

Muller, M.; Deline, C.; Marion, B.; Kurtz, S.; Bosco, N.

2011-07-01T23:59:59.000Z

54

Transient Response of Cadmium Telluride Modules to Light Exposure: Preprint  

SciTech Connect (OSTI)

Commercial cadmium telluride (CdTe) photovoltaic (PV) modules from three different manufacturers were monitored for performance changes during indoor and outdoor light-exposure. Short-term transients in Voc were recorded on some modules, with characteristic times of ~1.1 hours. Outdoor performance data shows a similar drop in Voc after early morning light exposure. Preliminary analysis of FF changes show light-induced changes on multiple time scales, including a long time scale.

Deline, C.; del Cueto, J.; Albin, D. S.; Petersen, C.; Tyler, L.; TamizhMani, G.

2011-07-01T23:59:59.000Z

55

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

56

Minimizing Variation in Outdoor CPV Power Ratings: Preprint  

SciTech Connect (OSTI)

The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

Muller, M.; Marion, B.; Rodriguez, J.; Kurtz, S.

2011-07-01T23:59:59.000Z

57

NREL: Photovoltaics Research - Outdoor Test Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn F. Geisz, Ph.D. Principal ScientistOutdoor Test

58

STATE OF CALIFORNIA CERTIFICATE OF COMPLIANCE, SIGN LIGHTING  

E-Print Network [OSTI]

STATE OF CALIFORNIA CERTIFICATE OF COMPLIANCE, SIGN LIGHTING CEC-SLTG-1C (Revised 10/10) CALIFORNIA Lighting) (Page 1 of 4) SLTG-1C Project Name: Date: Project Address: Location of Sign Phase of Sign Construction Type of Lighting Control Outdoor Signs New Signs New Lighting Controls Indoor Signs Sign

59

ACCESS America's Great Outdoors: Public Lands Are for Everyone!1  

E-Print Network [OSTI]

Universal Access to Outdoor Recreation: A Design Guide. This state-of-the-art design guide is breaking new ground in the area of accessibility by focusing on integrating universal design into all outdoor experience are limited. Historically, recreation facilities and programs were created by traditional design

Standiford, Richard B.

60

Predictive clothing insulation model based on outdoor air and indoor operative temperatures  

E-Print Network [OSTI]

2012) Predictive clothing insulation model based on outdoorPredictive clothing insulation model based on outdoor airpredictive models of clothing insulation have been developed

Schiavon, Stefano; Lee, Kwang Ho

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

62

Spellbound : an activity-based outdoor mobile multiplayer game  

E-Print Network [OSTI]

Traditional outdoor recreation is physically and emotionally rewarding from goal directed social activities and encourages a connection with the real world but can be logistically difficult. Online gaming allows people to ...

Sra, Misha

2013-01-01T23:59:59.000Z

63

Minimizing Variation in Outdoor CPV Power Ratings (Presentation)  

SciTech Connect (OSTI)

Presented at the 7th International Conference on Concentrating Photovoltaic Systems (CPV-7), 4-6 April 2011, Las Vegas, Nevada. The CPV community has agreed to have both indoor and outdoor power ratings at the module level. The indoor rating provides a repeatable measure of module performance as it leaves the factory line while the outdoor rating provides a measure of true performance under real world conditions. The challenge with an outdoor rating is that the spectrum, temperature, wind speed, etc are constantly in flux and therefore the resulting power rating varies from day to day and month to month. This work examines different methodologies for determining the outdoor power rating with the goal of minimizing variation even if data are collected under changing meteorological conditions.

Muller, M.

2011-04-01T23:59:59.000Z

64

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

65

EXTERIOR LIGHTING CASE STUDY CALIFORNIA LIGHTING TECHNOLOGY CENTER, UC DAVIS PHONE: (530) 747-3838 FAX: (530) 747-3812 CLTC.UCDAVIS.EDU  

E-Print Network [OSTI]

. This energy waste can easily be averted by implementing energy-efficient light sources and lighting controls.S. health care facilities to install an energy-efficient, ultra-smart outdoor LED lighting system. The award schedules, light levels and time-out settings, monitor the system's energy use, and receive automated alerts

California at Davis, University of

66

BEHAVIOR OF RADON PROGENY NEAR OUTDOOR SURFACES IN CONTRASTING TERRAINS  

E-Print Network [OSTI]

Federal legislation expresses a long-term goal of reducing indoor radon to levels comparable to those outdoors. A thorough understanding of the behavior of radon and its progeny in the outdoor environment is therefore important We report near-surface measurements of radon, attached-to-aerosol progeny, and unattachcd-toaerosol progeny in the contrasting environments of the forested hill country of Oak Ridge, TN and the desert sands of White Sands National Monument, NM. Vertical progeny gradients are greater at White Sands due to a smoother terrain, and dose levels tend to be lower due to lower radon flux from the gypsum sand. Both sites show a significant diurnal variation of dose rate with a maximum occurring usually in the early morning. Correlation of dose rate variation with radon variation is surprisingly small suggesting the importance of other factors such as progeny deposition and aerosol concentration in controlling outdoor dose.

S. D. Schery; P. T. Wasiolek; Y. Li

67

Advancements in sensing and perception using structured lighting techniques :an LDRD final report.  

SciTech Connect (OSTI)

This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Advancements in Sensing and Perception using Structured Lighting Techniques''. There is an ever-increasing need for robust, autonomous ground vehicles for counterterrorism and defense missions. Although there has been nearly 30 years of government-sponsored research, it is undisputed that significant advancements in sensing and perception are necessary. We developed an innovative, advanced sensing technology for national security missions serving the Department of Energy, the Department of Defense, and other government agencies. The principal goal of this project was to develop an eye-safe, robust, low-cost, lightweight, 3D structured lighting sensor for use in broad daylight outdoor applications. The market for this technology is wide open due to the unavailability of such a sensor. Currently available laser scanners are slow, bulky and heavy, expensive, fragile, short-range, sensitive to vibration (highly problematic for moving platforms), and unreliable for outdoor use in bright sunlight conditions. Eye-safety issues are a primary concern for currently available laser-based sensors. Passive, stereo-imaging sensors are available for 3D sensing but suffer from several limitations : computationally intensive, require a lighted environment (natural or man-made light source), and don't work for many scenes or regions lacking texture or with ambiguous texture. Our approach leveraged from the advanced capabilities of modern CCD camera technology and Center 6600's expertise in 3D world modeling, mapping, and analysis, using structured lighting. We have a diverse customer base for indoor mapping applications and this research extends our current technology's lifecycle and opens a new market base for outdoor 3D mapping. Applications include precision mapping, autonomous navigation, dexterous manipulation, surveillance and reconnaissance, part inspection, geometric modeling, laser-based 3D volumetric imaging, simultaneous localization and mapping (SLAM), aiding first responders, and supporting soldiers with helmet-mounted LADAR for 3D mapping in urban-environment scenarios. The technology developed in this LDRD overcomes the limitations of current laser-based 3D sensors and contributes to the realization of intelligent machine systems reducing manpower need.

Novick, David Keith; Padilla, Denise D.; Davidson, Patrick A. Jr. (.; .); Carlson, Jeffrey J.

2005-09-01T23:59:59.000Z

68

Indoor and Outdoor Spectroradiometer Intercomparison for Spectral Irradiance Measurement  

SciTech Connect (OSTI)

This report details the global spectral irradiance intercomparison using spectroradiometers that was organized by the National Renewable Energy Laboratory's Solar Radiation Research Laboratory. The intercomparison was performed both indoors and outdoors on September 17, 2013. Five laboratories participated in the intercomparison using 10 spectroradiometers, and a coordinated measurement setup and a common platform were employed to compare spectral irradiances under both indoor and outdoor conditions. The intercomparison aimed to understand the performance of the different spectroradiometers and to share knowledge in making spectral irradiance measurements. This intercomparison was the first of its kind in the United States.

Habte, A.; Andreas, A.; Ottoson, L.; Gueymard, C.; Fedor, G.; Fowler, S.; Peterson, J.; Naranen, R.; Kobashi, T.; Akiyama, A.; Takagi, S.

2014-05-01T23:59:59.000Z

69

University of Minnesota Center for Outdoor Adventure (COA) Health History Form  

E-Print Network [OSTI]

1 University of Minnesota Center for Outdoor Adventure (COA) Health History Form Center for Outdoor: Specific Symptoms Date of last occurrence How you care for condition Frequency of condition Duration

Amin, S. Massoud

70

Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

Shott, Gregory [NSTec

2014-08-31T23:59:59.000Z

71

Lighting Research Group FinalReportOctober1999  

E-Print Network [OSTI]

Lighting Research Group FinalReportOctober1999 Lighting Recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA #12;Final Report Lighting Recommendations to improve the lighting quality and energy efficiency of the lighting system at the Social Security

72

Outdoor Virtual Reality Bruce H. Thomas and Wayne Piekarski  

E-Print Network [OSTI]

Outdoor Virtual Reality Bruce H. Thomas and Wayne Piekarski Wearable Computer Laboratory University of South Australia Mawson Lakes, SA 5095 Australia Bruce.Thomas@unisa.edu.au Wayne@cs.unisa.edu.au ABSTRACT or augmented beyond the user's normal experience, and increase understanding 226Copyright held by the author

Thomas, Bruce

73

Bayesian Color Constancy for Outdoor Object Recognition Yanghai Tsin  

E-Print Network [OSTI]

University Siemens Corporate Research Pittsburgh, PA 15213 Princeton, NJ 08540 {ytsin,rcollins,tk}@cs.cmu.edu rameshv@scr.siemens.com Abstract Outdoor scene classification is challenging due to irregular geometry-overlapping spectral sensitivity functions. The generalized diagonal transform [5] performs better than the diagonal

Collins, Robert

74

OUTDOOR EDUCATION SUBJECT GUIDE -I/S STORY TELLING  

E-Print Network [OSTI]

Canada) http://www.ec.gc.ca/EnviroZine/english/issues/23/feature2_e.cfm Websites: Arctic Climate Impact of the Arctic/ Mark Nuttall, editor Ref: G606 .E49 2005 Impacts of a Warming Arctic: Arctic Climate Impact Association for Geographic & Environmental Education. Outdoor Canada Pathways Online: EnviroZine (Environment

Abolmaesumi, Purang

75

PLACEMENT OF OUTDOOR RECYCLING CONTAINERS AROUND UBC CAMPUS  

E-Print Network [OSTI]

PLACEMENT OF OUTDOOR RECYCLING CONTAINERS AROUND UBC CAMPUS UBC SEEDS Project by Iong, Sin I (Jace RECYCLING CONTAINERS ON UBC CAMPUS by Jace Iong 24 April, 2009 INTRODUCTION This SEEDS (Social, Ecological recycling containers on UBC-Vancouver campus. Initiated by David Smith, the associate director of municipal

76

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

77

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

78

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

79

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

80

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium  

ScienceCinema (OSTI)

Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

Thomas D'Agostino

2010-09-01T23:59:59.000Z

82

Residential Lighting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared atEffectquestionnairesU.S. EnergyEnergy EfficiencyLighting

83

The effects of outdoor heat exchanger hydrophobic treatment on the performance of an air source heat pump  

E-Print Network [OSTI]

mode, the system must remove heat from the cold outdoor air and provide it to the conditioned space. To remove the heat from the outdoor air, the refrigerant entering the outdoor heat exchanger must be colder than the outdoor air. The outdoor air... is pulled across the heat exchanger surface by the outdoor fan Hence, the cold liquid refrigerant passing through the evaporator coil receives heat from the outdoor ambient air passing over the coil, causing the refrigerant to vaporize into a cool gas...

Parker, Brandon DeWayne

1995-01-01T23:59:59.000Z

84

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

85

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

86

Minimizing Variation in Outdoor CPV Power Ratings (Presentation)  

SciTech Connect (OSTI)

Module data from NREL's CPV test bed is used to examine methods for calculating outdoor CPV power ratings. IEC 62670 and ASTM E2527 are used as a starting point for determining a module power rating on a monthly basis. Monthly power ratings vary by more than desired using existing methods. The presentation examines modifications to existing methods as well as spectral corrections to reduce variation in monthly module power ratings.

Muller, M.

2011-02-01T23:59:59.000Z

87

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

88

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

89

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

90

Outdoor testing of advanced optical materials for solar thermal electric applications  

SciTech Connect (OSTI)

The development of low-cost, durable advanced optical materials is an important element in making solar energy viable for electricity production. It is important to determine the expected lifetime of candidate reflector materials in real-world service conditions. The demonstration of the optical durability of such materials in outdoor environments is critical to the successful commercialization of solar thermal electric technologies. For many years optical performance data have been collected and analyzed by the National Renewable Energy Laboratory (NREL) for candidate reflector materials subjected to simulated outdoor exposure conditions. Much of this testing is accelerated in order to predict service durability. Some outdoor testing has occurred but not in a systematic manner. To date, simulated/accelerated testing has been limited correlation with actual outdoor exposure testing. Such a correlation is desirable to provide confidence in lifetime predictions based upon accelerated weathering methods. To obtain outdoor exposure data for realistic environments and to establish a data base for correlating simulated/accelerated outdoor exposure data with actual outdoor exposure data, the development of an expanded outdoor testing program has recently been initiated by NREL. Several outdoor test sites will be selected based on the solar climate, potential for solar energy utilization by industry, and cost of installation. Test results are site dependent because exposure conditions vary with geographical location. The importance of this program to optical materials development is outlined, and the process used to determine and establish the outdoor test sites is described. Candidate material identification and selection is also discussed. 10 refs.

Wendelin, T.J.; Jorgensen, G.; Goggin, R.M.

1992-05-01T23:59:59.000Z

91

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

92

Dynamic predictive clothing insulation models based on outdoor air and indoor operative temperatures  

E-Print Network [OSTI]

predictive clothing insulation models based on outdoor airrange of the clothing insulation calculated for eachbuilding). Figure 8 Clothing insulation versus dress code [

Schiavon, Stefano; Lee, Kwang Ho

2012-01-01T23:59:59.000Z

93

An outdoor exposure testing program for optical materials used in solar thermal electric technologies  

SciTech Connect (OSTI)

Developing low-cost, durable advanced optical materials is important for making solar thermal energy. technologies viable for electricity production. The objectives of a new outdoor testing program recently initiated by the National Renewable Energy Laboratory (NREL) are to determine the expected lifetimes of candidate reflector materials and demonstrate their optical durability in real-world service conditions. NREL is working with both utilities and industry in a collaborative effort to achieve these objectives. To date, simulated/accelerated exposure testing of these materials has not been correlated with actual outdoor exposure testing. Such a correlation is desirable to provide confidence in lifetime predictions based upon accelerated weathering results. This outdoor testing program will allow outdoor exposure data to be obtained for realistic environments and will establish a data base for correlating simulated/accelerated outdoor exposure data with actual outdoor exposure data. In this program, candidate reflector materials are subjected to various outdoor exposure conditions in a network of sites across the southwestern United States. Important meteorological data are continuously recorded at these sites; these data will be analyzed for possible correlations with material optical performance. Weathered samples are characterized on a regular basis using a series of optical tests. These tests provide the basis for tracking material performance and durability with exposure time in the various outdoor environments. This paper describes the outdoor testing program in more detail including meteorological monitoring capabilities and the optical tests that are performed on these materials.

Wendelin, T.; Jorgensen, G.

1994-01-01T23:59:59.000Z

94

E-Print Network 3.0 - asthma outdoor air Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sample search results for: asthma outdoor air Page: << < 1 2 3 4 5 > >> 1 About the Air Pollution and Respiratory Health Program The Air Pollution and Respiratory Health...

95

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

96

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

97

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

98

Outdoor unit construction for an electric heat pump  

DOE Patents [OSTI]

The outdoor unit for an electric heat pump is provided with an upper portion containing propeller fan means for drawing air through the lower portion containing refrigerant coil means in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed. 4 figs.

Draper, R.; Lackey, R.S.

1984-09-11T23:59:59.000Z

99

Outdoor unit construction for an electric heat pump  

DOE Patents [OSTI]

The outdoor unit for an electric heat pump is provided with an upper portion 10 containing propeller fan means 14 for drawing air through the lower portion 12 containing refrigerant coil means 16 in the form of four discrete coils connected together in a subassembly forming a W shape, the unit being provided with four adjustable legs 64 which are retracted in shipment, and are adjusted on site to elevate the unit to a particular height suitable for the particular location in which the unit is installed.

Draper, Robert (Pittsburgh, PA); Lackey, Robert S. (Pittsburgh, PA)

1984-01-01T23:59:59.000Z

100

Outdoor polymeric insulators long-term exposed to HVDC  

SciTech Connect (OSTI)

Field experience from outdoor polymeric insulators exposed to HVDC under natural contamination conditions is presented. This paper summarizes the peak leakage current statistics, the hydrophobicity and the surface material conditions studied by electron spectroscopy for chemical analysis (ESCA) and attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. The results show a strong interrelation between the surface conditions and the performance with respect to leakage currents. Moreover, the results show that the surface conditions and the performance of the insulators exposed to HVDC are rather similar to those of the insulators exposed to HVAC.

Soerqvist, T.; Vlastos, A.E. [Chalmers Univ. of Technology, Gothenburg (Sweden)] [Chalmers Univ. of Technology, Gothenburg (Sweden)

1997-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Interactive Montages of Sprites for Indexing and Summarizing Security Video  

E-Print Network [OSTI]

for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

Pal, Chris

102

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

103

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

104

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

105

System Architecture Directions for a Software-Defined Lighting Infrastructure  

E-Print Network [OSTI]

spectrum of an outdoor environment and a typical fluorescent tube-lit office space. Indoor spectrum to incandescent and fluorescent lights. Unfortunately, the remarkable march of semiconductor technology a renaissance. The staple of illumi- nation for one and a half centuries, the incandescent bulb, is being phased

Dutta, Prabal

106

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

107

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

108

Learning Visual Feature Descriptors for Dynamic Lighting Conditions Nicholas Carlevaris-Bianco and Ryan M. Eustice  

E-Print Network [OSTI]

Learning Visual Feature Descriptors for Dynamic Lighting Conditions Nicholas Carlevaris, the success or failure of feature-based image registration is largely determined by changes in lighting conditions are presented for a challenging indoor-outdoor dataset spanning 27 mapping sessions over a period

Eustice, Ryan

109

Thermosyphon coil arrangement for heat pump outdoor unit  

DOE Patents [OSTI]

For a heat pump, the outdoor unit is provided with a coil and a refrigerant flow arrangement there for which is such that in the heating mode of operation of the heat pump they operate in a thermosyphon fashion. The coil has a feed portion and an exit portion leading to a separator drum from which liquid refrigerant is returned through downcomer line for recirculation to the feed portion. The coil is tilted upwardly from entry to exit by the angle alpha to enhance the clearance of the two phases of refrigerant from each other in the heating mode of operation. There is no thermosyphon function in the cooling mode of operation. 9 figs.

Draper, R.

1984-05-22T23:59:59.000Z

110

Thermosyphon coil arrangement for heat pump outdoor unit  

DOE Patents [OSTI]

For a heat pump, the outdoor unit is provided with a coil and a refrigerant flow arrangement therefor which is such that in the heating mode of operation of the heat pump they operate in a thermosyphon fashion. The coil 32 has a feed portion 30 and an exit portion 34 leading to a separator drum 36 from which liquid refrigerant is returned through downcomer line 42 for recirculation to the feed portion. The coil is tilted upwardly from entry to exit by the angle alpha to enhance the clearance of the two phases of refrigerant from each other in the heating mode of operation. There is no thermosyphon function in the cooling mode of operation.

Draper, Robert (Churchill, PA)

1984-01-01T23:59:59.000Z

111

Energy Department Announces Outdoor Winners of Next Generation...  

Broader source: Energy.gov (indexed) [DOE]

was launched in 2008 to promote excellence in the design of energy-efficient light-emitting diode (LED) commercial lighting fixtures, or "luminaires." A panel of six judges,...

112

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

113

Text-Alternative Version of TAP Webinar: High Performance Outdoor Lighting Accelerator  

Broader source: Energy.gov [DOE]

Nebiat Solomon? We are going to give other attendees a few minutes to get on, and then well be ready to start. Just so you know, if you have questions along the way, just type them into the...

114

DOE Publishes CALiPER Snapshot Report on LED Outdoor Area Lighting |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe HouseStudents2.2at MultipleorderNuclearThisProgram toCharacteristics

115

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

116

A study of programs in conservation and outdoor education in selected colleges and universities  

E-Print Network [OSTI]

to participate in an outdoor resident school ss part of their etude. ut teaching experience. Twenty planned to offer an outdoor teacher education progr~n. 5. gore emphas]s was placed upon outdoor ducation skills than subject malter in the interdisciplinary... approach. 14 He fart"nur recommended that a study be ccnducted to investi gate outuoor edu at ion programs in higher educe. tiou institutions in an area o her than the western s ction of the United States. Bus' afson ll5J conduct d a study...

Noel, Jean-Guy Claude

1969-01-01T23:59:59.000Z

117

Muon Fluence Measurements for Homeland Security Applications  

SciTech Connect (OSTI)

This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

2010-08-10T23:59:59.000Z

118

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

119

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

120

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

122

Bourdieuian Analysis on African Americans Under-representation at Parks and Outdoor Recreation  

E-Print Network [OSTI]

This study used Pierre Bourdieus theory of practice and analyzed African Americans under-representation at parks and in outdoor recreation. It focused on Cedar Hill State Park (CHSP) located in Cedar Hill, Texas and investigated local African...

Lee, KangJae

2013-07-18T23:59:59.000Z

123

A sun-tracking environmental chamber for the outdoor quantification of CPV modules  

SciTech Connect (OSTI)

The paper describes a sun-tracking environmental chamber and its associated fast electronics, devised for the accurate outdoor characterization of CPV cells, receivers, mono-modules, and modules. Some typical measurement results are presented.

Faiman, David, E-mail: faiman@bgu.ac.il; Melnichak, Vladimir, E-mail: faiman@bgu.ac.il; Bokobza, Dov, E-mail: faiman@bgu.ac.il; Kabalo, Shlomo, E-mail: faiman@bgu.ac.il [Department of Solar Energy and Environmental Physics, Blaustein Institutes for Desert Research, Ben-Gurion University of the Negev, Sede Boqer Campus, 8499000 (Israel)

2014-09-26T23:59:59.000Z

124

Analysis of a Dedicated Outdoor Air System and Low Temperature Supply Air Conditioning System  

E-Print Network [OSTI]

This paper presents the principles and the characteristics of a dedicated outdoor air system (DOAS) and low temperature supply air system. DOAS is offered based on the demands of indoor air quality and the low temperature supply air system...

Guang, L.; Li, R.

2006-01-01T23:59:59.000Z

125

Architecture for environmental learning : a National Outdoor Leadership School in Baja, Mexico  

E-Print Network [OSTI]

An understanding of people, program, and place establishes a foundation from which to make architectural decisions. The focus of this thesis is to understand the needs of those involved in an outdoor education school in ...

Galyean, Taylor

1994-01-01T23:59:59.000Z

126

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

127

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

128

Outdoor airflow into HVAC systems: An evaluation of measurement technologies  

SciTech Connect (OSTI)

During the last few years, new technologies have been introduced for measuring the flow rates of outdoor air (OA) into HVAC systems; however, an evaluation of these measurement technologies has not previously been published. This document describes a test system and protocols developed for controlled evaluation of these measurement technologies. The results of tests of three measurement technologies are also summarized. The test system and protocol were judged practical and very useful. The test results indicate that one measurement technology can measure OA flow rates with errors of 20% or less without a field-based calibration, as long as the OA velocities are sufficient to provide an accurately measurable pressure signal. The test results for a second measurement technology are similar; however, a difficult field-based calibration relating the OA flow rate with the pressure signal would be required to reduce errors below approximately 30%. The errors in OA flow rates measured with the third measurement technology, that uses six electronic airspeed sensors downstream of the OA inlet louver, exceeded 100%; however, these errors could be substantially reduced through a difficult field based calibration. The effects of wind on the accuracy of these measurement technologies still needs to be evaluated.

Fisk, William J.; Faulkner, David; Sullivan, Douglas P.; Delp, Woody

2003-09-01T23:59:59.000Z

129

Measuring Outdoor Air Intake Rates into Existing Building  

SciTech Connect (OSTI)

Practical and accurate technologies are needed for continuously measuring and controlling outdoor air (OA) intake rates in commercial building heating, ventilating, and air conditioning (HVAC) systems. This project evaluated two new measurement approaches. Laboratory experiments determined that OA flow rates were measurable with errors generally less than 10 percent using electronic air velocity probes installed between OA intake louver blades or at the outlet face of louvers. High accuracy was maintained with OA flow rates as low as 15 percent of the maximum for the louvers. Thus, with this measurement approach HVAC systems do not need separate OA intakes for minimum OA supply. System calibration parameters are required for each unique combination of louver type and velocity sensor location but calibrations are not necessary for each system installation. The research also determined that the accuracy of measuring OA flow rates with velocity probes located in the duct downstream of the intake louver was not improved by installing honeycomb airflow straighteners upstream of the probes. Errors varied with type of upstream louver, were as high as 100 percent, and were often greater than 25 percent. In conclusion, use of electronic air velocity probes between the blades of OA intake louvers or at the outlet face of louvers is a highly promising means of accurately measuring rates of OA flow into HVAC systems. The use of electronic velocity probes downstream of airflow straighteners is less promising, at least with the relatively small OA HVAC inlet systems employed in this research.

Fisk, William; Sullivan, Douglas; Cohen, Sebastian; Han, Hwataik

2009-04-16T23:59:59.000Z

130

Indoor-Outdoor Air Leakage of Apartments and Commercial Buildings  

SciTech Connect (OSTI)

We compiled and analyzed available data concerning indoor-outdoor air leakage rates and building leakiness parameters for commercial buildings and apartments. We analyzed the data, and reviewed the related literature, to determine the current state of knowledge of the statistical distribution of air exchange rates and related parameters for California buildings, and to identify significant gaps in the current knowledge and data. Very few data were found from California buildings, so we compiled data from other states and some other countries. Even when data from other developed countries were included, data were sparse and few conclusive statements were possible. Little systematic variation in building leakage with construction type, building activity type, height, size, or location within the u.s. was observed. Commercial buildings and apartments seem to be about twice as leaky as single-family houses, per unit of building envelope area. Although further work collecting and analyzing leakage data might be useful, we suggest that a more important issue may be the transport of pollutants between units in apartments and mixed-use buildings, an under-studied phenomenon that may expose occupants to high levels of pollutants such as tobacco smoke or dry cleaning fumes.

Price, P.N.; Shehabi, A.; Chan, R.W.; Gadgil, A.J.

2006-06-01T23:59:59.000Z

131

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

132

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

133

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

134

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

135

NREL: Measurements and Characterization - Outdoor Module Current Versus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and Achievements

136

Solar Decathlon Design Places People and the Outdoors at its...  

Broader source: Energy.gov (indexed) [DOE]

their clean energy take on a time-honored tradition. Addthis Related Articles "First Light," the solar home from New Zealand, stands complete on the first day of the 2011 U.S....

137

Safety of Hydrogen Systems Installed in Outdoor Enclosures  

SciTech Connect (OSTI)

The Hydrogen Safety Panel brings a broad cross-section of expertise from the industrial, government, and academic sectors to help advise the U.S. Department of Energys (DOE) Fuel Cell Technologies Office through its work in hydrogen safety, codes, and standards. The Panels initiatives in reviewing safety plans, conducting safety evaluations, identifying safety-related technical data gaps, and supporting safety knowledge tools and databases cover the gamut from research and development to demonstration and deployment. The Panels recent work has focused on the safe deployment of hydrogen and fuel cell systems in support of DOE efforts to accelerate fuel cell commercialization in early market applications: vehicle refueling, material handling equipment, backup power for warehouses and telecommunication sites, and portable power devices. This paper resulted from observations and considerations stemming from the Panels work on early market applications. This paper focuses on hydrogen system components that are installed in outdoor enclosures. These enclosures might alternatively be called cabinets, but for simplicity, they are all referred to as enclosures in this paper. These enclosures can provide a space where a flammable mixture of hydrogen and air might accumulate, creating the potential for a fire or explosion should an ignition occur. If the enclosure is large enough for a person to enter, and ventilation is inadequate, the hydrogen concentration could be high enough to asphyxiate a person who entered the space. Manufacturers, users, and government authorities rely on requirements described in codes to guide safe design and installation of such systems. Except for small enclosures used for hydrogen gas cylinders (gas cabinets), fuel cell power systems, and the enclosures that most people would describe as buildings, there are no hydrogen safety requirements for these enclosures, leaving gaps that must be addressed. This paper proposes that a technical basis be developed to enable code bodies to write requirements for the range of enclosures from the smallest to the largest.

Barilo, Nick F.

2013-11-06T23:59:59.000Z

138

Study of Frost Growth on Heat Exchangers Used as Outdoor Coils in Air Source Heat Pump Systems.  

E-Print Network [OSTI]

??During winter heating operation, the outdoor coil of a heat pump acts as an evaporator and when the ambient temperature is near freezing, the moisture (more)

Padhmanabhan, Sankaranarayanan K.

2011-01-01T23:59:59.000Z

139

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

140

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

142

Commercial Lighting  

Broader source: Energy.gov [DOE]

Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

143

Lecture 13: Control System Cyber Security  

E-Print Network [OSTI]

Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

CERN. Geneva

2013-01-01T23:59:59.000Z

144

Outdoor classroom inspires urban students to pursue technical careers |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002Optics Group (X-rayLSDPrecious ... OurOut and AboutNational

145

Sandia National Laboratories: Wake-Imaging System Progresses to Outdoor  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1development Sandia, NREL Release Wave Energy Converter Modeling andScaled Test

146

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

147

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II:LIGHT-DUTYTransportation Safeguards

148

Indoor and Outdoor in Situ High-Resolution Gamma Radiation Measurements in Urban Areas of Cyprus  

E-Print Network [OSTI]

In situ, high-resolution, gamma-ray spectrometry of a total number of 70 outdoor and 20 indoor representative measurements were performed in preselected, common locations of the main urban areas of Cyprus. Specific activities and gamma absorbed dose rates in air due to the naturally occurring radionuclides of Th-232 and U-238 series, and K-40 are determined and discussed. Effective dose rate to the Cyprus population due to terrestrial gamma radiation is derived directly from this work. The results obtained outdoors match very well with those derived previously by high-resolution gamma spectrometry of soil samples, which were collected from the main island bedrock surface. This implies that the construction and building materials in urban areas do not affect the external gamma dose rate; thus they are mostly of local origin. Finally, the indoor/outdoor gamma dose ratio was found to be 1.4 +- 0.5.

Svoukis, E

2006-01-01T23:59:59.000Z

149

Indoor and Outdoor in Situ High-Resolution Gamma Radiation Measurements in Urban Areas of Cyprus  

E-Print Network [OSTI]

In situ, high-resolution, gamma-ray spectrometry of a total number of 70 outdoor and 20 indoor representative measurements were performed in preselected, common locations of the main urban areas of Cyprus. Specific activities and gamma absorbed dose rates in air due to the naturally occurring radionuclides of Th-232 and U-238 series, and K-40 are determined and discussed. Effective dose rate to the Cyprus population due to terrestrial gamma radiation is derived directly from this work. The results obtained outdoors match very well with those derived previously by high-resolution gamma spectrometry of soil samples, which were collected from the main island bedrock surface. This implies that the construction and building materials in urban areas do not affect the external gamma dose rate; thus they are mostly of local origin. Finally, the indoor/outdoor gamma dose ratio was found to be 1.4 +- 0.5.

E. Svoukis; H. Tsertos

2006-10-02T23:59:59.000Z

150

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

151

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

152

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

153

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

154

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

155

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

156

STUDY OF FROST GROWTH ON HEAT EXCHANGERS USED AS OUTDOOR COILS IN AIR SOURCE HEAT PUMP SYSTEMS  

E-Print Network [OSTI]

STUDY OF FROST GROWTH ON HEAT EXCHANGERS USED AS OUTDOOR COILS IN AIR SOURCE HEAT PUMP SYSTEMS OF FROST GROWTH ON HEAT EXCHANGERS USED AS OUTDOOR COILS IN AIR SOURCE HEAT PUMP SYSTEMS Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 3.5.3 Air Side Heat Transfer Rates . . . . . . . . . . . . . . . . . . 43 3.5.4 Fluid Side Heat

157

Benefits and costs of tourism and outdoor recreation in the Natural Park of the Ampezzo Dolomites (Veneto-Italy)  

E-Print Network [OSTI]

1 Benefits and costs of tourism and outdoor recreation in the Natural Park of the Ampezzo Dolomites economy. The Alps Agreement too, with particular regard to Tourism Protocol has underlined that tourism development has to be sustainable. Therefore, we need to know tourism and outdoor recreation benefits

Tempesta, Tiziano

158

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

159

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

160

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

162

European Commissions Antitrust Investigation against Gazprom - Implications for the Energy Security of Russia and the European Union.  

E-Print Network [OSTI]

??This master thesis analyzes the European and Russian energy security, in light of political science and international political economy. The aim of the study is (more)

Re, Anni

2013-01-01T23:59:59.000Z

163

Recent applications of thermal imagers for security assessment  

SciTech Connect (OSTI)

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

164

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

165

Ris-M-2476 RELATIONSHIPS IN INDOOR/OUTDOOR AIR POLLUTION  

E-Print Network [OSTI]

Risø-M-2476 RELATIONSHIPS IN INDOOR/OUTDOOR AIR POLLUTION Jørn Roed Abstract. Beryllium-7 a pollution episode, especially a reactor accident. The effect of operating a vacuum cleaner during the pollution episode and airing shortly after is also investigated. Earlier relevant literature is reviewed

166

RIS-M-2234 A NOTE ON THE RELATIONSHIP BETWEEN OUTDOOR AND INDOOR  

E-Print Network [OSTI]

POLLUTION OP OUTDOOR ORIGIN H.L. Gjørup and Jørn Roed Health Physics Department Abstract. Beryllium-7-descriotors; AIR POLLUTION, BERYLLIUM 7, BUILDINGS, INHALATION, IODINE 131, MEASURING METHODS, RADIATION DOSES from its counterpart in Danish dated Hay 1979. 2. GENERAL INFORMATION Any pollution of inhaled air

167

Linking Accelerating Laboratory Test with Outdoor Performance Results for a Model Epoxy Coating System  

E-Print Network [OSTI]

and accelerate outdoor degradation by exposing materials for extended periods of time to high UV irradiance- based measurements on both exposure environments and degradation properties for epoxy specimens exposed), a device in which spectral ultraviolet (UV) wavelength, spectral intensity, temperature, and relative

168

Economic Value of Outdoor Recreation Activities in Iowa Daniel Otto, KristinTylka, and  

E-Print Network [OSTI]

Economic Value of Outdoor Recreation Activities in Iowa Daniel Otto, KristinTylka, and Susan Erickson Department of Economics Iowa State University Extension and Outreach Center for Agricultural Otto is a professor in the Department of Economics at Iowa State University, Kristin Tylka

Chen, Tsing-Chang "Mike"

169

Outdoor Scene Synthesis in the Infrared Range for Remote Sensing Applications  

E-Print Network [OSTI]

Outdoor Scene Synthesis in the Infrared Range for Remote Sensing Applications Thierry Poglio Eric under remote sensing applications, like meteorology, farming, or military information are concerned. Yet. The solar forcing leads to an increase in temperature, while heat transfer due to strong cold wind decreases

Boyer, Edmond

170

Outdoor 3D Acquisition System for Small and Fast Targets. Application to honeybee monitoring at the  

E-Print Network [OSTI]

Outdoor 3D Acquisition System for Small and Fast Targets. Application to honeybee monitoring-based system for monitoring honeybees in 3D at the beehive entrance. In this context, this article highlights or health conditions. 1 Introduction The honeybee is a bio-indicator species, and nowadays researchers use

Boyer, Edmond

171

Factors affecting the indoor concentrations of carbonaceous aerosols of outdoor origin  

SciTech Connect (OSTI)

A field study was conducted in an unoccupied single story residence in Clovis, California to provide data to address issues important to assess the indoor exposure to particles of outdoor origin. Measurements of black and organic carbonaceous aerosols were performed using a variety of methods, resulting in both near real-time measurements as well as integrated filter based measurements. Comparisons of the different measurement methods show that it is crucial to account for gas phase adsorption artifacts when measuring organic carbon (OC). Measured concentrations affected by the emissions of organic compounds sorbed to indoor surfaces imply a higher degree of infiltration of outdoor organic carbon aerosols into the indoor environment for our unoccupied house. Analysis of the indoor and outdoor data for black carbon (BC) aerosols show that, on average, the indoor concentration of black carbon aerosols behaves in a similar manner to sulfate aerosols. In contrast, organic carbon aerosols are subject to chemical transformations indoors that, for our unoccupied home, resulted in lower indoor OC concentrations than would be expected by physical loss mechanisms alone. These results show that gas to particle partitioning of organic compounds, as well as gas to surface interactions within the residence, are an important process governing the indoor concentration to OC aerosols of outdoor origin.

Lunden, Melissa M.; Kirchstetter, Thomas W.; Thatcher, Tracy L.; Hering, Susanne V.; Brown, Nancy J.

2007-06-25T23:59:59.000Z

172

Light Pollution as Part of the Environmental Problems  

E-Print Network [OSTI]

Unscrupulous outdoor lighting produces a number of effects that are currently included under the term light pollution. Its consequences (e.g. loss of resources by energy waste), are being recognized for some time, as well as the possibility to mitigate this pollution. In the present work, we present some lines of action developed at the Facultad Regional San Nicol\\'as of National Technological University (UTN) of Argentina to include the CL as a regular topic of study in the problems of air pollution.

Quaranta, Nancy

2012-01-01T23:59:59.000Z

173

Smart Lighting Controller!! Smart lighting!  

E-Print Network [OSTI]

1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if://blogs.stthomas.edu/realestate/2011/01/24/residential-real-estate-professionals-how-do-you- develop feedback! There is a connection between the output and the input! Therefore forces inputs to same voltage

Anderson, Betty Lise

174

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

175

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

176

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

177

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

178

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

179

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

180

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

182

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

183

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

184

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

185

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

186

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

187

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

188

Commercial Lighting and LED Lighting Incentives  

Broader source: Energy.gov [DOE]

Incentives for energy efficient commercial lighting equipment as well as commercial LED lighting equipment are available to businesses under the Efficiency Vermont Lighting and LED Lighting...

189

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

190

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

191

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

192

Lighting Renovations  

Broader source: Energy.gov [DOE]

When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

193

Cerenkov Light  

ScienceCinema (OSTI)

The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

Slifer, Karl

2014-05-22T23:59:59.000Z

194

Cerenkov Light  

SciTech Connect (OSTI)

The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

Slifer, Karl

2013-06-13T23:59:59.000Z

195

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

196

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

197

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

198

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

199

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

200

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

202

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

203

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

204

Quantum cryptography for secure free-space communications  

SciTech Connect (OSTI)

The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

1999-03-01T23:59:59.000Z

205

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

206

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

207

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

208

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

209

Cyber Assessment Methods For SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

May Robin Permann; Kenneth Rohde

2005-06-01T23:59:59.000Z

210

Cyber Assessment Methods for SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

Not Available

2005-06-01T23:59:59.000Z

211

Nearby Outdoor Environmental Support of Older Adults' Yard Activities, Neighborhood Walking and Independent Living in the Community  

E-Print Network [OSTI]

to remain healthy and gives them the ability to access daily-life services, and thus extend their independent years at home. Nearby outdoor environments on residential sites and in the neighborhoods may influence older adults' independent living through...

Wang, Zhe

2011-02-22T23:59:59.000Z

212

Air Corrosivity in U.S. Outdoor-Air-Cooled Data Centers is Similar to That in Conventional Data Centers  

E-Print Network [OSTI]

is Just Prior to Cooling Air Entering IT Equipment FigureGadgil, A.J. and Tschudi, W.F. , Air Corrosivity in U.S.Outdoor-Air-Cooled Data Centers is Similar to That in

Coles, Henry C.

2012-01-01T23:59:59.000Z

213

The effect of hardware configuration on the performance of residential air conditioning systems at high outdoor ambient temperatures  

E-Print Network [OSTI]

A study was performed which investigated the effect of hardware configuration on air conditioning cooling system performance at high outdoor temperatures. The initial phase of the investigation involved the testing of ten residential air...

Bain, Joel Alan

1995-01-01T23:59:59.000Z

214

Outdoor Performance of a Thin-Film Gallium-Arsenide Photovoltaic Module  

SciTech Connect (OSTI)

We deployed a 855 cm2 thin-film, single-junction gallium arsenide (GaAs) photovoltaic (PV) module outdoors. Due to its fundamentally different cell technology compared to silicon (Si), the module responds differently to outdoor conditions. On average during the test, the GaAs module produced more power when its temperature was higher. We show that its maximum-power temperature coefficient, while actually negative, is several times smaller in magnitude than that of a Si module used for comparison. The positive correlation of power with temperature in GaAs is due to temperature-correlated changes in the incident spectrum. We show that a simple correction based on precipitable water vapor (PWV) brings the photocurrent temperature coefficient into agreement with that measured by other methods and predicted by theory. The low operating temperature and small temperature coefficient of GaAs give it an energy production advantage in warm weather.

Silverman, T. J.; Deceglie, M. G.; Marion, B.; Cowley, S.; Kayes, B.; Kurtz, S.

2013-06-01T23:59:59.000Z

215

A plan for teaching waste management education at an outdoor education center  

E-Print Network [OSTI]

A PLAN FOR TEACHING WASTE MANAGEMENT EDUCATION AT AN OUTDOOR EDUCATION CENTER A PROFESSIONAL PAPER BY JOE DON ARMSTRONG Submitted to the College of Agriculture and Life Sciences of Texas A&M University in partial fulfillment... by JOE DON ARMSTRONG Approved as to style and content by: DR, LOUIS H DGES (CHAIRMAN OF ADVISORY COMMITTEE) DR. EDWARD HEATH (COMMITTEE MEMBER) DR. CAMILL G (COMMITTEE MBER) DR. R WITT (DEPARTMENT HEAD) MAY 1994 1 1. l. ABSTRACT A Plan...

Armstrong, Joe Don

1994-01-01T23:59:59.000Z

216

Factors affecting the concentration of outdoor particles indoors (COPI): Identification of data needs and existing data  

SciTech Connect (OSTI)

The process of characterizing human exposure to particulate matter requires information on both particle concentrations in microenvironments and the time-specific activity budgets of individuals among these microenvironments. Because the average amount of time spent indoors by individuals in the US is estimated to be greater than 75%, accurate characterization of particle concentrations indoors is critical to exposure assessments for the US population. In addition, it is estimated that indoor particle concentrations depend strongly on outdoor concentrations. The spatial and temporal variations of indoor particle concentrations as well as the factors that affect these variations are important to health scientists. For them, knowledge of the factors that control the relationship of indoor particle concentrations to outdoor levels is particularly important. In this report, we identify and evaluate sources of data for those factors that affect the transport to and concentration of outdoor particles in the indoor environment. Concentrations of particles indoors depend upon the fraction of outdoor particles that penetrate through the building shell or are transported via the air handling (HVAC) system, the generation of particles by indoor sources, and the loss mechanisms that occur indoors, such as deposition. To address these issues, we (i) identify and assemble relevant information including the behavior of particles during air leakage, HVAC operations, and particle filtration; (ii) review and evaluate the assembled information to distinguish data that are directly relevant to specific estimates of particle transport from those that are only indirectly useful and (iii) provide a synthesis of the currently available information on building air-leakage parameters and their effect on indoor particle matter concentrations.

Thatcher, Tracy L.; McKone, Thomas E.; Fisk, William J.; Sohn, Michael D.; Delp, Woody W.; Riley, William J.; Sextro, Richard G.

2001-12-01T23:59:59.000Z

217

An evaluation of the outdoor advertising industry and current proposed legislation  

E-Print Network [OSTI]

Circulation and Rates in Selected United States Markets, 1962 23 Top 25 National Outdoor Advertisers, 1962 26 6. Average Accident Rate of 390 2-Lane Sections Arrayed According to Sign Frequency and Average Daily Traffic Volumes 36 Accident Rates... for Intersections by Frequency of Signs 37 Rate of Occurrence of Accidents Per Feature Per 100 Feet Intersection and Non-Intersection Section, 1947-49 41 Partial and Total Correlation Coefficients of Accidents with Each of Five Types of Roadside Features...

Disinger, Thomas Ainsworth

1965-01-01T23:59:59.000Z

218

Recreation motivators and facility factors as relative determinants of urban outdoor recreation behavior and satisfaction  

E-Print Network [OSTI]

by JEFFREY STEPHEN MILKES Approved as to style and content by: Allan S. Mills (Chairman of Committee) Edward H. Heath (Member) Thomas M. Bonnicksen (Head of Department) John R. Stoll (Member) August 1987 ABSTRACT Recreat1on Motivators and Facility... Factors as Relative Determ1nants of Urban Outdoor Recreation Behavior and Satisfaction. (August 1987) Jeffrey Stephen Milkes, B. S. , University of Oregon Chairman of Advisory Committee: Dr. Allan Mills This study was conducted to determine...

Milkes, Jeffrey Stephen

1987-01-01T23:59:59.000Z

219

Growing Minds: The Relationship Between Parental Attitudes About Children Spending Time Outdoors And Their Children's Overall Health  

E-Print Network [OSTI]

were spent indoors watching TV (Hofferth and Sandberg, 2001b). Children ages 12 to 14 now spend only 50 minutes per weekend day doing sports and outdoor activities (Juster et al., 2004). Even with the reports of positive health benefits from... of time children spend indoors. A study done on children under the age of 13 found that approximately half an hour a week was spent outdoors by children doing activities such as gardening, picnicking, playing, walking and hiking (Hofferth and Sandberg...

Hammond, Danielle E.

2010-07-14T23:59:59.000Z

220

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

222

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

223

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

224

The energy saving potential of precooling incoming outdoor air by indirect evaporative cooling  

SciTech Connect (OSTI)

This paper investigates the energy saving potentials of using indirect evaporative coolers to precool incoming outdoor air as the first stage of a standard cooling system. For dry and moderately humid locations, either exhaust room air or outdoor air can be used as the secondary air to the indirect evaporative precooler with similar energy savings. Under these conditions, the use of outdoor air is recommended due to the simplicity in installing the duct system. For humid locations, the use of exhaust room air is recommended because the precooling capacity and energy savings will be greatly increased. For locations with short cooling seasons, the use of indirect evaporative coolers for precooling may not be worthwhile. The paper also gives some simplified indices for easily predicting the precooling capacity, energy savings and water consumption of an indirect evaporative precooler. These indices can be used for cooling systems with continuous operation, but further work is needed to determine whether the same indices are also suitable for cooling systems with intermittent operations.

Chen, P.; Qin, H.; Huang, Y.J.; Wu, H.; Blumstein, C.

1992-09-01T23:59:59.000Z

225

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

226

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

227

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

228

Performance Stabilization of CdTe PV Modules using Bias and Light  

SciTech Connect (OSTI)

Reversible performance changes due to light exposure frustrate repeatable performance measurements on CdTe PV modules. It is common to use extended light-exposure to ensure that measurements are representative of outdoor performance. We quantify the extent to which such a light-exposed state depends on module temperature and consider bias in the dark to aid in stabilization. We evaluate the use of dark forward bias to bring about a performance state equivalent to that obtained with light exposure, and to maintain a light-exposed state prior to STC performance measurement. Our results indicate that the most promising method for measuring a light-exposed state is to use light exposure at controlled temperature followed by prompt STC measurement with a repeatable time interval between exposure and the STC measurement.

Silverman, T. J.; Deceglie, M. G.; Marion, B.; Kurtz, S. R.

2014-07-01T23:59:59.000Z

229

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

230

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

231

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

232

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

233

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

234

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

235

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

236

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

237

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

238

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

239

A comparison of Nannochloropsis salina growth performance in two outdoor pond designs: conventional raceways versus the ARID pond with superior temperature management  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

A comparison of Nannochloropsis salina growth performance in two outdoor pond designs: conventional raceways versus the ARID pond with superior temperature management

Crowe, Braden [Pacific Northwest National Laboratory; Attalah, Said [University of Arizona; Agrawal, Shweta [University of Arizona; Waller, Peter [University of Arizona; Ryan, Randy [University of Arizona.edu; Van Wagenen, Jon [Pacific Northwest National Laboratory; Chavis, Aaron [Pacific Northwest National Laboratory; Kyndt, John [University of Arizona; Kacira, Murat [University of Arizona; Ogden, Kim L. [University of Arizona; Huesemann, Michael [Pacific Northwest National Laboratory

2012-01-01T23:59:59.000Z

240

Front lighted optical tooling method and apparatus  

DOE Patents [OSTI]

An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

Stone, W.J.

1983-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

242

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

243

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

244

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

245

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

246

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

247

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

248

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

249

Eucalyptus kraft black liquor enhances growth and productivity of Spirulina in outdoor cultures  

SciTech Connect (OSTI)

Mass cultivation of microalgae for commercial applications suffers from poor productivities when measured against laboratory results or theoretical projections. In an effort to reduce this gap it was discovered that addition of eucalyptus kraft black liquor (BL) enhanced biomass productivity in outdoor cultures of Spirulina by increasing growth rate by 38% and biomass yield by 43%. BL treatment resulted in elevation of nitrogen assimilating enzyme activities and efficiency of phosphate utilization. Analyses of forenoon and afternoon oxygen production rates (OPRs) indicated higher photosynthetic and respiratory activity in BL-treated cultures compared to untreated cultures. 20 refs., 1 fig., 2 tabs.

Chauhan, V.S.; Singh, G.; Ramamurthy, V. [Thapar Institute of Engineering and Technology, Patiala (India)

1995-07-01T23:59:59.000Z

250

A survey and comparative analysis of selected university outdoor recreation/education centers  

E-Print Network [OSTI]

of the survey schedule can be found in Appendix A. Methods of Data Collection The method of data collection utilized in this study was the on-site personal interview. As a method of data collection in survey studies, the personal interview has been held...- search technique was an on-site population status survey based on a 3x2x2 classification scheme using an interview data collection technique. It was concluded that major outdoor recreation/education centers (O'RECs) develop on the basis of individual...

Brewer, Randy Carter

1984-01-01T23:59:59.000Z

251

An Assessment of the U.S. Residential Lighting Market  

SciTech Connect (OSTI)

This report provides background data upon which residential lighting fixture energy conservation programs can be built. The current stock of residential lighting is described by usage level, lamp wattage, fixture type, and location within the house. Data are discussed that indicate that 25% of residential fixtures are responsible for 80% of residential lighting energy use, and that justify targeting these fixtures as candidates for retrofit with energy-efficient fixtures. Fixtures determined to have the highest energy use are hardwired ceiling fixtures in kitchens, living/family rooms, dining rooms, and outdoors. An assessment of the market for residential fixtures shows that nearly half of new residential fixtures are imported, 61% of new fixtures sold are hardwired, and about half of all new fixtures sold are for ceiling installation.

Jennings, Judy; Brown, Rich; Moezzi, Mithra; Mills, Evan; Sardinsky, Robert

1995-10-01T23:59:59.000Z

252

Light Computing  

E-Print Network [OSTI]

A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

Gordon Chalmers

2006-10-13T23:59:59.000Z

253

Trial Demonstration of Area Lighting Retrofit: Yuma Border Patrol, Yuma Arizona  

SciTech Connect (OSTI)

The Yuma Sector Border Patrol Area is a high flux lighting application in a high temperature environment, presenting a formidable challenge for light-emitting diodes (LEDs). This retrofit is an Energy Savings Performance Contract ENABLE project under the U.S. Department of Energy (DOE) Federal Energy Management Program. If high flux LED technology performs well in a region with high ambient temperature and solar radiation, it can perform well in most outdoor environments. The design process for the Yuma retrofit has already provided valuable knowledge to CBP and DOE. The LED lighting system selected for the retrofit is expected to reduce energy consumption 69% compared to the incumbent quartz metal halide (QMH) lighting system. If the LED lighting system is installed, GATEWAY will continue to document and disseminate information regarding the installation and long-term performance so that others may also gain valuable knowledge from the Yuma Sector Border Patrol Area lighting retrofit.

Wilkerson, Andrea M.; McCullough, Jeffrey J.

2014-12-30T23:59:59.000Z

254

Interference between electronic lighting and other appliances  

SciTech Connect (OSTI)

This paper presents empirical data from the laboratory and the field to provide an overview of electromagnetic interference between high-efficiency electronic lighting and certain other electronic devices, such as power-line carrier systems, security systems, and remote controls for televisions and VCRs. Reported cases involving both electronic lighting emissions and immunity in building power systems are summarized according to basic interference mechanisms. To illustrate the potential complexities of this problem, the paper describes a case where high-efficiency lighting interfered with a hearing aid. The hearing aid case includes a field survey, laboratory investigations, and recommended solutions to the problem.

Schwabe, R.J.; Zelingher, S. [New York Power Authority, New York, NY (United States); Key, T.; Phipps, K. [EPRI Power Electronics Applications Center, Knoxville, TN (United States)

1995-12-31T23:59:59.000Z

255

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

256

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

257

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

258

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

259

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

260

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

262

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

initiatives to be accomplished within the next five years using light technologies and best practices to provide enterprise-wide services in a cost effective and efficient...

263

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

264

Daily and Long Term Variations of Out-Door Gamma Dose Rate in Khorasan Province, Iran  

SciTech Connect (OSTI)

In Iran before 1996, only a few hot spots had been identified, no systematic study had been envisaged. Since then preparation of out-door environmental gamma radiation map of Iran was defined as a long term goal in our center, at the same time simultaneous monitoring of outdoor gamma level in Khorasan was also proposed. A Rados area monitoring system (AAM-90) including 10 intelligent RD-02 detector and all associated components were purchased. From 2003 gradually seven stations have been setup in Khorasan. For all seven stations monthly average and one hour daily average on four time intervals have been computed. Statistically no significant differences have been observed. This is also true for monthly averages. The overall average dose rate for present seven stations varies from 0.11 {mu}Sv{center_dot}h{sup -1} for Ferdows, to 0.04 {mu}Sv{center_dot}h{sup -1} for Dargaz. Based on our data, 50 minutes sample in any time interval is an accurate sample size to estimate out door Gamma dose rate.

Toossi, M. T. Bahreyni; Bayani, SH. [Environmental dosimetery laboratory, Medical Physics Research Center, Mashad University of Medical Sciences, Mashad (Iran, Islamic Republic of)

2008-08-07T23:59:59.000Z

265

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

266

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

267

Relationships between forest management policies and outdoor recreation opportunities supplied on private forest lands in East Texas  

E-Print Network [OSTI]

RKLAT10NSHIPS BET( EEN FOyugST K'. NAGENENT POLICIES AND OUTDOOR P"CREATION OPPORTUNITIES SUPPLIED ON PRIVATE FOREST IJNDS IN EAST TEXAS A Thcsi. s RENNETIi NAFNE PRESTR13GE Submitted to the Graduate College of the Texas A&N Un i ve rs ity... in partial fulfillment of the require sents for the degree of BASTER OF SCIENCF, Nay 1968 Najor Subject: Range Sc! ence (Recreation and Parks) RELATIONSHIPS BETWEEN FOREST MANAGEMENT POLICIES AND OUTDOOR RECREATION OPPORTUNITIES SUPPLIED ON PRIVATE...

Prestridge, Kenneth Wayne

1968-01-01T23:59:59.000Z

268

Direct Analysis of JV-Curves Applied to an Outdoor-Degrading CdTe Module (Presentation)  

SciTech Connect (OSTI)

We present the application of a phenomenological four parameter equation to fit and analyze regularly measured current density-voltage JV curves of a CdTe module during 2.5 years of outdoor operation. The parameters are physically meaningful, i.e. the short circuit current density Jsc, open circuit voltage Voc and differential resistances Rsc, and Roc. For the chosen module, the fill factor FF degradation overweighs the degradation of Jsc and Voc. Interestingly, with outdoor exposure, not only the conductance at short circuit, Gsc, increases but also the Gsc(Jsc)-dependence. This is well explained with an increase in voltage dependent charge carrier collection in CdTe.

Jordan, D; Kurtz, S.; Ulbrich, C.; Gerber, A.; Rau, U.

2014-03-01T23:59:59.000Z

269

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

270

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

271

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

272

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

273

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

274

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

275

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

276

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

277

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

278

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

279

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

280

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

282

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

283

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

284

Lai, D., Guo, D., Hou, Y., Lin, C., and Chen, Q. 2014. "Studies of Outdoor Thermal Comfort in Northern China," Building and Environment, 77, 110-118  

E-Print Network [OSTI]

. In addition, revitalizing outdoor spaces will lead to energy saving inside buildings. As people spend more in Northern China," Building and Environment, 77, 110-118 Studies of Outdoor Thermal Comfort in Northern China comfort, while the Predicted Mean Vote (PMV) overestimated it. The neutral Physiological Equivalent

Chen, Qingyan "Yan"

285

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

286

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

287

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

288

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

289

Sandia National Laboratories: Stray Light  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErikGroundbreakingStandards Solar ThermochemicalStorage Protected:Stray Light

290

Shedding Light on Nanocrystal Defects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2)Sharing Smart Grid Experiences throughandShedding Light on

291

Shedding Light on Nanocrystal Defects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2)Sharing Smart Grid Experiences throughandShedding Light

292

Visitor ParkingP Blue Light Security Phones  

E-Print Network [OSTI]

Hensley Residence Hall 15 Tennis Courts/Parking Garage*7 Cole Residence Hall 16 Dorothy Williamson Clock8 Entrance The Vern Express (Connects the Foggy Bottom & Mount Vernon campuses) GW Police P To: Mac

Vertes, Akos

293

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

294

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

295

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

296

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

297

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

298

Lighting Inventory Lighting Theatre and Drama  

E-Print Network [OSTI]

Lighting Inventory Lighting Theatre and Drama Description Totals R.Halls Wells- Metz Light ERS ETC SourceFour 25 25 50 degree ERS Strand Lighting 64 14 24 12 14 36 degree ERS ETC Source Four 15 15 36 degree ERS Strand Lighting 124 60 58 2 4 26 degree ERS ETC SourceFour 2 2 26 degree ERS Strand

Indiana University

299

Dual LED/incandescent security fixture  

DOE Patents [OSTI]

A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

Gauna, Kevin Wayne

2005-06-21T23:59:59.000Z

300

Lighting system with thermal management system having point contact synthetic jets  

DOE Patents [OSTI]

Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

2013-12-10T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

302

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

303

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

304

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

305

Geoscience research for energy security  

SciTech Connect (OSTI)

This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

Not Available

1987-02-01T23:59:59.000Z

306

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

307

Light Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceEfeedstocks and the climateLife a Light

308

Light' Darkness  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceEfeedstocks and the climateLifeLight to

309

Light Water Reactor Sustainability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Light Water Reactor Sustainability Program ACCOMPLISHMENTS REPORT 2013 Accomplishments Report | Light Water Reactor Sustainability 2 T he mission of the Light Water Reactor...

310

Light Water Reactor Sustainability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 Light Water Reactor Sustainability ACCOMPLISHMENTS REPORT 2014 Accomplishments Report | Light Water Reactor Sustainability 2 T he mission of the Light Water Reactor...

311

Hybrid Indoor and Outdoor Tracking for Mobile 3D Mixed Reality Wayne Piekarski, Ben Avery, Bruce H. Thomas, Pierre Malbezin  

E-Print Network [OSTI]

Hybrid Indoor and Outdoor Tracking for Mobile 3D Mixed Reality Wayne Piekarski, Ben Avery, Bruce H@tinmith.net, bruce.thomas@unisa.edu.au, pierre@tinmith.net Abstract This paper describes a new hybrid tracking system, in most cases an arrow navigation cue and a hand held World-in-Miniature model are used to provide

Thomas, Bruce

312

A Mechanically Stable, Low Profile, Omni-Directional Solar-Cell Integrated Antenna for Outdoor Wireless Sensor Nodes  

E-Print Network [OSTI]

sensor network standard is proposed by integrating a circular array of slot antennas with solar cells. IIA Mechanically Stable, Low Profile, Omni-Directional Solar-Cell Integrated Antenna for Outdoor Wireless Sensor Nodes T. Wu, R.L. Li, and M. M. Tentzeris School of Electrical and Computer Engineering

Tentzeris, Manos

313

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

314

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

315

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

316

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

317

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

318

Measuring the Optical Performance of Evacuated Receivers via an Outdoor Thermal Transient Test: Preprint  

SciTech Connect (OSTI)

Modern parabolic trough solar collectors operated at high temperatures to provide the heat input to Rankine steam power cycles employ evacuated receiver tubes along the collector focal line. High performance is achieved via the use of a selective surface with a high absorptance for incoming short-wave solar radiation and a low emittance for outgoing long-wave infrared radiation, as well as the use of a hard vacuum to essentially eliminate convective and conductive heat losses. This paper describes a new method that determines receiver overall optical efficiency by exposing a fluid-filled, pre-cooled receiver to one sun outdoors and measuring the slope of the temperature curve at the point where the receiver temperature passes the glass envelope temperature (that is, the point at which there is no heat gain or loss from the absorber). This transient test method offers the potential advantages of simplicity, high accuracy, and the use of the actual solar spectrum.

Kutscher, C.; Burkholder, F.; Netter, J.

2011-08-01T23:59:59.000Z

319

E-Print Network 3.0 - area glare sources Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

...2 C. Cherokee County, Georgia's Outdoor Lighting and Road Glare Ordinance... County, Ga., Outdoor...

320

Sustainable Office Lighting Options  

E-Print Network [OSTI]

Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

Massachusetts at Amherst, University of

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

322

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

323

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

324

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

325

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

326

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

327

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

328

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

329

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

330

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

331

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

332

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

333

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

334

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

335

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

336

Sandia National Laboratories: Lighting Developments to 2030  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS ExhibitIowa StateClimateLighting Developments to 2030 Lighting

337

Promoting India's development: energy security and climate security are convergent goals  

SciTech Connect (OSTI)

This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

2009-01-01T23:59:59.000Z

338

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

339

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

340

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

342

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

343

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

344

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

345

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

346

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

347

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

348

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

349

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

350

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

351

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

352

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

353

Fiber optic security seal including plural Bragg gratings  

DOE Patents [OSTI]

An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings. 2 figs.

Forman, P.R.

1994-09-27T23:59:59.000Z

354

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

355

Contract Provisions and Ratchets: Utility Security or Customer Equity?  

E-Print Network [OSTI]

CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

Penkala, B. A.

356

Real-Time Measurement of Rates of Outdoor Airflow into HVACSystems: A Field Study of Three Technologies  

SciTech Connect (OSTI)

Technologies for real-time continuous measurement of the flow rates of outdoor air (OA) into HVAC systems are now available commercially. Our prior papers reported on laboratory-based evaluations of these measurement technologies and this document describes the methods and results of a field study of the accuracy of three of these technologies. From the field study data, we determined that neither wind speed nor wind direction have an important adverse impact on measurement accuracy. The field study confirmed that these three measurement technologies can provide reasonably accurate measurements of outdoor air intake rates in field settings, if the pressure signals are measured with high accuracy. Some of the pressure transducers marketed for use with commercial HVAC systems were determined to be sufficiently accurate for this application. Given the significant impact of OA flow rates on both energy use and occupant health, more widespread use of technologies that provide for real time measurements of OA flow rates seems warranted.

Fisk, William J.; Sullivan, Douglas P.; Faulkner, David

2005-09-01T23:59:59.000Z

357

Lighting Options for Homes.  

SciTech Connect (OSTI)

This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

Baker, W.S.

1991-04-01T23:59:59.000Z

358

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

359

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

360

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

362

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

363

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

364

A comparative study of staffing patterns at selected agencies providing outdoor adventure programs for youth-at-risk  

E-Print Network [OSTI]

split between a bachelor's degree and a master's degree. The most preferred experiences and certifications across all three levels were counseling and outdoor experience and first aid certification. Thirty-nine percent of the staff were hired... through referrals and thirty-eight percent of the new staff training was conducted on-the-job. Sixty-one percent of the on-going staff training was conducted by agency personnel. The salaries and benefits proved to be quite diverse among the agencies...

Keck, Mary A.

1988-01-01T23:59:59.000Z

365

Mobile lighting apparatus  

DOE Patents [OSTI]

A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

2013-05-14T23:59:59.000Z

366

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

367

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

368

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

369

Evaluation of surface sampling method performance for Bacillus Spores on clean and dirty outdoor surfaces.  

SciTech Connect (OSTI)

Recovery of Bacillus atrophaeous spores from grime-treated and clean surfaces was measured in a controlled chamber study to assess sampling method performance. Outdoor surfaces investigated by wipe and vacuum sampling methods included stainless steel, glass, marble and concrete. Bacillus atrophaeous spores were used as a surrogate for Bacillus anthracis spores in this study designed to assess whether grime-coated surfaces significantly affected surface sampling method performance when compared to clean surfaces. A series of chamber tests were carried out in which known amounts of spores were allowed to gravitationally settle onto both clean and dirty surfaces. Reference coupons were co-located with test coupons in all chamber experiments to provide a quantitative measure of initial surface concentrations of spores on all surfaces, thereby allowing sampling recovery calculations. Results from these tests, carried out under both low and high humidity conditions, show that spore recovery from grime-coated surfaces is the same as or better than spore recovery from clean surfaces. Statistically significant differences between method performance for grime-coated and clean surfaces were observed in only about half of the chamber tests conducted.

Wilson, Mollye C.; Einfeld, Wayne; Boucher, Raymond M.; Brown, Gary Stephen; Tezak, Matthew Stephen

2011-06-01T23:59:59.000Z

370

Uncertainty Estimate for the Outdoor Calibration of Solar Pyranometers: A Metrologist Perspective  

SciTech Connect (OSTI)

Pyranometers are used outdoors to measure solar irradiance. By design, this type of radiometer can measure the; total hemispheric (global) or diffuse (sky) irradiance when the detector is unshaded or shaded from the sun disk, respectively. These measurements are used in a variety of applications including solar energy conversion, atmospheric studies, agriculture, and materials science. Proper calibration of pyranometers is essential to ensure measurement quality. This paper describes a step-by-step method for calculating and reporting the uncertainty of the calibration, using the guidelines of the ISO 'Guide to the Expression of Uncertainty in Measurement' or GUM, that is applied to the pyranometer; calibration procedures used at the National Renewable Energy Laboratory (NREL). The NREL technique; characterizes a responsivity function of a pyranometer as a function of the zenith angle, as well as reporting a single; calibration responsivity value for a zenith angle of 45 ..deg... The uncertainty analysis shows that a lower uncertainty can be achieved by using the response function of a pyranometer determined as a function of zenith angle, in lieu of just using; the average value at 45..deg... By presenting the contribution of each uncertainty source to the total uncertainty; users will be able to troubleshoot and improve their calibration process. The uncertainty analysis method can also be used to determine the uncertainty of different calibration techniques and applications, such as deriving the uncertainty of field measurements.

Reda, I.; Myers, D.; Stoffel, T.

2008-12-01T23:59:59.000Z

371

EK101 Engineering Light Smart Lighting  

E-Print Network [OSTI]

EK101 Engineering Light Smart Lighting Homework for 9/10 1. Make an estimate (using if the patent is granted.) 3. What is a lumen? A lux? How are the two related? How would you use a lux meter, (Lux, Lumens/m2) Luminous Flux: Perceivable light power from a source, (Lumens) Use the lux meter

Bifano, Thomas

372

Measuring Light Reflectance of BGO Crystal Surfaces  

E-Print Network [OSTI]

by the National Nuclear Security Administration, Office ofby the National Nuclear Security Administration, Office of

Janecek, Martin

2009-01-01T23:59:59.000Z

373

Specific light in sculpture  

E-Print Network [OSTI]

Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

Powell, John William

1989-01-01T23:59:59.000Z

374

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

375

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

376

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

377

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

378

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

379

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

380

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

382

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

383

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

384

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

385

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

386

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

387

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

388

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

389

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

390

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

391

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

392

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

393

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

394

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

395

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

396

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

397

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

398

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

399

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

400

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

402

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

403

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

404

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

405

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

406

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

407

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

408

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

409

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

410

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

411

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

412

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

413

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

414

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

415

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

416

Front lighted optical tooling method and apparatus  

DOE Patents [OSTI]

An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument. A method of measuring a radius of curvature of an unknown surface includes positioning the spherometer on a surface between the surface and a depth measuring optical instrument. As the spherometer is frontally illuminated, the distance from the depth measuring instrument to the fiducial mark and the underlying surface are alternately measured and the difference in these measurements is used as the sagittal height to calculate a radius of curvature.

Stone, William J. (Kansas City, MO)

1985-06-18T23:59:59.000Z

417

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

418

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

419

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

420

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

422

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

423

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

424

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

425

Lighting and Daylight Harvesting  

E-Print Network [OSTI]

exposing us to the latest products and technologies. Daylight Harvesting A system of controlling the direction and the quantity of light both natural and artificial within a given space. This implies: Control of fenestration in terms of size..., transmission and direction. Control of reflected light within a space. Control of electric light in terms of delivery and amount Daylight harvesting systems are typically designed to maintain a minimum recommended light level. This light level...

Bos, J.

2011-01-01T23:59:59.000Z

426

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

427

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

428

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

429

Apartment Hunting Checklist FURNITURE AND APPLIANCES  

E-Print Network [OSTI]

), close and lock? Hallway & outdoor lighting sufficient? STATE OF REPAIR Doors & windows fit securely light fixture covers broken or missing? Covers on light switches & electrical outlets? Electrical to be replaced? Cleaned? Enough light in each room? Need lamps? DON'T FORGET TO CHECK Enough electrical outlets

Kravets, Robin

430

Results of First Outdoor Comparison Between Absolute Cavity Pyrgeometer (ACP) and Infrared Integrating Sphere (IRIS) Radiometer at PMOD (Presentation)  

SciTech Connect (OSTI)

The ACP and IRIS are developed to establish a world reference for calibrating pyrgeometers with traceability to SI units. The two radiometers are unwindowed with negligible spectral dependence, and traceable to SI units through the temperature scale (ITS-90). The first outdoor comparison between the two designs was held from January 28 to February 8, 2013 at the Physikalisch-Metorologisches Observatorium Davos (PMOD). The difference between the irradiance measured by ACP and that of IRIS was within 1 W/m2. A difference of 5 W/m2 was observed between the irradiance measured by ACP&IRIS and that of the interim World Infrared Standard Group (WISG).

Reda, I.; Grobner, J.; Wacker, S.; Stoffel, T.

2013-03-01T23:59:59.000Z

431

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

432

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

433

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

434

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

435

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

436

Unconditionally secure bit commitment by causally independent encryptions  

E-Print Network [OSTI]

We propose a new classical bit commitment protocol using the relativistic constraint that signals cannot travel faster than the speed of light $c$. This protocol is unconditionally secure against both classical or quantum attacks. The sender (Alice) and the receiver (Bob) each controls two secure stations separated by a large distance $d$, and they communicate by exchanging classical information only. Alice commits by sending from her stations two causally independent encrypted messages to the neighboring Bob's stations, after that the protocol is out of her control and she plays no role in the unveiling phase. The commitment remains concealed for a period of $\\Delta t=d/2c$. This protocol requires only limited communication resources and is readily implementable with current technologies.

Chi-Yee Cheung

2014-04-28T23:59:59.000Z

437

Statistical Methods for Degradation Data with Dynamic Covariates Information and an Application to Outdoor  

E-Print Network [OSTI]

inverter that are used in solar panel arrays can gather and transmit information on the output of power and environmental variables such as, the loss of light output from an LED array, the decrease of power output, which we refer to as dynamic covariate information. For example, even a small device like a power

438

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

439

Building boundary is necessary for the real estate industry, flood management, and homeland security applications.  

E-Print Network [OSTI]

Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

Shan, Jie

440

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

442

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

443

Sandia National Laboratories: efficient LED lighting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1development Sandia, NRELdeep-waterbiofuels economicallyefficient LED lighting

444

alternative fuel light-duty vehicles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste andAnniversary, part 2Zenoss,AmineBroadbandLight-Duty Vehicles T

445

Sandia National Laboratories: Advanced Light Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguardsEngineersSandia/NewAdvanced Light Source

446

Kyler Nelson Light Timer  

E-Print Network [OSTI]

designated by the user, the Arduino board will dim the light to save energy. The user designates the time instance, the light is dimmed using pulse width modulation (PWM) in the Arduino's pin number 11

Kachroo, Pushkin

447

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

448

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

449

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

450

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

451

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

452

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

453

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

454

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

455

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

456

AIRPORT LIGHTING Session Highlights  

E-Print Network [OSTI]

AIRPORT LIGHTING Session Highlights In May 2002, the Airport Technical Assistance Program, also known as AirTAP, sponsored three airport-lighting training sessions at different locations in Minnesota information on airport lighting and navigational aid equipment selection, funding, maintenance, and operation

Minnesota, University of

457

Advanced Demand Responsive Lighting  

E-Print Network [OSTI]

Advanced Demand Responsive Lighting Host: Francis Rubinstein Demand Response Research Center demand responsive lighting systems ­ Importance of dimming ­ New wireless controls technologies · Advanced Demand Responsive Lighting (commenced March 2007) #12;Objectives · Provide up-to-date information

458

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

459

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

460

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

462

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

463

Light emitting device comprising phosphorescent materials for white light generation  

DOE Patents [OSTI]

The present invention relates to phosphors for energy downconversion of high energy light to generate a broadband light spectrum, which emit light of different emission wavelengths.

Thompson, Mark E.; Dapkus, P. Daniel

2014-07-22T23:59:59.000Z

464

Light Duty Combustion Research: Advanced Light-Duty Combustion...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and Vehicle...

465

Nike | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

and capability to zoom down the focal diameter during the laser pulse. Nike's deeper UV light allows it to produce higher ablation pressures than frequency tripled glass lasers...

466

Space & Security Power Systems Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Working with INL Community Outreach Visitor Information Calendar of Events ATR National Scientific User Facility Center for Advanced Energy Studies Light Water Reactor...

467

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

468

SECURITY AND CONTROL OF NUCLEAR EXPLOSIVES AND NUCLEAR WEAPONS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE Awards ,# , onLightThe

469

Transportation Safeguards & Security Test Bed (TSSTB) | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II:LIGHT-DUTYTransportation Safeguards and

470

Photonic crystal light source  

DOE Patents [OSTI]

A light source is provided by a photonic crystal having an enhanced photonic density-of-states over a band of frequencies and wherein at least one of the dielectric materials of the photonic crystal has a complex dielectric constant, thereby producing enhanced light emission at the band of frequencies when the photonic crystal is heated. The dielectric material can be a metal, such as tungsten. The spectral properties of the light source can be easily tuned by modification of the photonic crystal structure and materials. The photonic crystal light source can be heated electrically or other heating means. The light source can further include additional photonic crystals that exhibit enhanced light emission at a different band of frequencies to provide for color mixing. The photonic crystal light source may have applications in optical telecommunications, information displays, energy conversion, sensors, and other optical applications.

Fleming, James G. (Albuquerque, NM); Lin, Shawn-Yu (Albuquerque, NM); Bur, James A. (Corrales, NM)

2004-07-27T23:59:59.000Z

471

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

472

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

473

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

474

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

475

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

476

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

477

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

478

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

479

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

480

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "outdoor security lighting" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

482

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

483

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

484

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

485

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

486

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

487

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

488

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

489

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

490

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

491

Light extraction from organic light-emitting diodes for lighting applications by sand-blasting  

E-Print Network [OSTI]

Light extraction from organic light-emitting diodes for lighting applications by sand@ust.hk Abstract: Light extraction from organic light-emitting diodes (OLEDs) by scattering the light is one of the effective methods for large-area lighting applications. In this paper, we present a very simple and cost

492

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

493

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

494

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

495

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

496

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

497

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

498

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

499

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to encourage defection of all USSR nationals and key personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

500

SMART LIGHTING SYSTEMS ULTIMATE LIGHTING The Smart Lighting  

E-Print Network [OSTI]

Integration (Holistic Integrated Design) · Sensors as important as LEDs · Interconnected systems (human, building, grid) · Artistic Design Freedom · Lighting is Health, Entertainment, Information and Illumination Cost at any brightness · Chip level integrated electronics THE ERC RESEARCH COVERS THE ENTIRE SUPPLY

Linhardt, Robert J.