Sample records for resolving vulnerability u-098

  1. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    Vulnerability Scanning Policy 1 Introduction Vulnerability scanning is an important and necessary and can alert system administrators to potentially serious problems. However vulnerability scanning also to compromise system security. The following policy details the conditions under which vulnerability scans may

  2. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  3. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  4. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  5. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  6. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  7. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  8. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  9. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  10. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  11. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  12. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  13. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  14. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    Power Grid Vulnerability to Geographically Correlated Failures ­ Analysis and Control Implications such as telecommunications networks [14]. The power grid is vulnerable to natural disasters, such as earthquakes, hurricanes [17], [34]. Thus, we focus on the vulnerability of the power grid to an outage of several lines

  15. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01T23:59:59.000Z

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  16. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  17. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy...

  18. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  19. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  20. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  1. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  2. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  3. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  4. attitudes perceived vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: BIODIVERSITY RESEARCH Assessing species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner-...

  5. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  6. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  7. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  8. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  9. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co [Institute of Environmental Studies, National University of Colombia, Bogota (Colombia); Duarte, Oscar, E-mail: ogduartev@unal.edu.co [Department of Electrical and Electronics Engineering, National University of Colombia, Bogota (Colombia); Requena, Ignacio, E-mail: requena@decsai.ugr.es [Department of Computer Science and Artificial Intelligence, University of Granada (Spain); Zamorano, Montserrat, E-mail: zamorano@ugr.es [Department of Civil Engineering, University of Granada (Spain)

    2012-01-15T23:59:59.000Z

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  11. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  12. Structural Vulnerability Assessment of Electric Power Grids

    E-Print Network [OSTI]

    Koç, Yakup; Kooij, Robert E; Brazier, Frances M T

    2013-01-01T23:59:59.000Z

    Cascading failures are the typical reasons of black- outs in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Complex Networks are widely used to investigate the grid vulnerability. Yet, these purely topological metrics fail to capture the real behaviour of power grids. This paper proposes a metric, the effective graph resistance, as a vulnerability measure to de- termine the critical components in a power grid. Differently than the existing purely topological measures, the effective graph resistance accounts for the electrical properties of power grids such as power flow allocation according to Kirchoff laws. To demonstrate the applicability of the effective graph resistance, a quantitative vulnerability assessment of the IEEE 118 buses power system is performed. The simulation results verify the effectiveness of the effect...

  13. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  14. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  15. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  16. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect (OSTI)

    SETH, S.S.

    2000-05-17T23:59:59.000Z

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  17. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  18. Bluetooth Vulnerabilities ECE 478 Winter 05

    E-Print Network [OSTI]

    Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee #12;Topics · What is Bluetooth? · History ­ Automobiles #12;What is Bluetooth? · Short-range (10m-100m) wireless specification · Operating at 2.4GHz radio 2Mb/s #12;History · Named from Danish King Harold Bluetooth from the 10th century ­ instrumental

  19. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  20. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  1. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  2. PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Hultman, Nathan E.

    PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE A Quantitative Approach R. H. Moss A. L. Brenkert E@ntis.fedworld.gov Online ordering: http://www.ntis.gov/ordering.htm #12;iii EXECUTIVE SUMMARY The PNNL Vulnerability

  3. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect (OSTI)

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  4. DECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL

    E-Print Network [OSTI]

    Wang, Hai

    , telecommunications, water supply, wastewater, electric power and other energy infrastructure. Event databasesDECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL INFRASTRUCTURE Zimmerman, R interdependencies, extreme events, vulnerability assessment 1 Introduction The provision of infrastructure services

  5. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  6. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    supply systems are vulnerable to many forms of terrorist acts, most of the vulnerability analysis studies on these systems have been for chemical and biological threats. Because of the interdependency of water supply infrastructure and emergency fire...

  7. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  8. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  9. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  10. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  11. TIME-RESOLVED VIBRATIONAL SPECTROSCOPY

    SciTech Connect (OSTI)

    Andrei Tokmakoff, MIT (Conference Chair) [Conference Chair; Paul Champion, Northeastern University; Edwin J. Heilweil, NIST; Keith A. Nelson, MIT; Larry Ziegler, Boston University

    2009-05-14T23:59:59.000Z

    This document contains the Proceedings from the 14th International Conference on Time-Resolved Vibrational Spectroscopy, which was held in Meredith, NH from May 9-14, 2009. The study of molecular dynamics in chemical reaction and biological processes using time-resolved spectroscopy plays an important role in our understanding of energy conversion, storage, and utilization problems. Fundamental studies of chemical reactivity, molecular rearrangements, and charge transport are broadly supported by the DOE�s Office of Science because of their role in the development of alternative energy sources, the understanding of biological energy conversion processes, the efficient utilization of existing energy resources, and the mitigation of reactive intermediates in radiation chemistry. In addition, time-resolved spectroscopy is central to all five of DOE�s grand challenges for fundamental energy science. The Time-Resolved Vibrational Spectroscopy conference is organized biennially to bring the leaders in this field from around the globe together with young scientists to discuss the most recent scientific and technological advances. The latest technology in ultrafast infrared, Raman, and terahertz spectroscopy and the scientific advances that these methods enable were covered. Particular emphasis was placed on new experimental methods used to probe molecular dynamics in liquids, solids, interfaces, nanostructured materials, and biomolecules.

  12. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  13. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power...

  15. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  16. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Assessing Vulnerability of Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing...

  17. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  18. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  19. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  20. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    DMZs, the corporate network, and the outside. In an on-site assessment, while scanning for vulnerabilities on the CS network, the assessment team discovered IP addresses...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Belgium) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Belgium Coordinates...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Czech Republic) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Czech Republic...

  6. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  7. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.

  8. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  9. Importance-Scanning Worm Using Vulnerable-Host Distribution

    E-Print Network [OSTI]

    Ji, Chuanyi

    Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen School of Electrical scanning. The distribution of vulnerable hosts on the Internet, however, is highly non- uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent

  10. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  11. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  12. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  13. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011 The following) section on Chemical-Terrorism Vulnerability Information (CVI) 6 CFR 27.400. The Program Manager's comments.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating

  14. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  15. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  16. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10T23:59:59.000Z

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  17. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  18. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  19. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  20. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  1. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  2. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  3. Researchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    , electrical power supply chains and telecommunications networks. University of Massachusetts Amherst components like roads, electrical power stations or transmission lines are destroyed and captures how usersResearchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability Natural disasters

  4. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power, smart grid, critical infrastructure, emergency and disaster pre- paredness, mergers for the determination of network vulnerability and robustness, since critical infrastructure networks from transportation, telecommunications, supply chains, to financial and electric power ones, provide the ties

  5. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  6. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  7. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  8. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01T23:59:59.000Z

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  9. A New Way to Resolve Cepheid Binaries

    E-Print Network [OSTI]

    Nancy Remage Evans; Derck Massa

    2002-03-29T23:59:59.000Z

    We have measured the centroid shift of low resolution HST FOC spectra as the dominant star changes from the Cepheid to the hot companion. With this approach we have resolved the AW Per system and marginally resolved the U Aql system.

  10. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  11. Time-Resolved Photoluminescence and Photovoltaics

    SciTech Connect (OSTI)

    Metzger, W. K.; Ahrenkiel, R. K.; Dippo, P.; Geisz, J.; Wanlass, M. W.; Kurtz, S.

    2005-01-01T23:59:59.000Z

    The time-resolved photoluminescence (TRPL) technique and its ability to characterize recombination in bulk photovoltaic semiconductor materials are reviewed. Results from a variety of materials and a few recent studies are summarized and compared.

  12. T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:

  13. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergyDepartment

  14. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability

  15. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    SciTech Connect (OSTI)

    Kvaerner, Jens [Bioforsk-Norwegian Institute for Agricultural and Environmental Research, Soil and Environmental Division, Frederik A. Dahls vei 20, N-1432 As (Norway)]. E-mail: jens.kvarner@bioforsk.no; Swensen, Grete [NIKU, Norwegian Institute for Cultural Heritage Research, Storgata 2, P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: grete.swensen@niku.no; Erikstad, Lars [NINA, Norwegian Institute for Nature Research, Dronningens gt. 13., P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: lars.erikstad@nina.no

    2006-07-15T23:59:59.000Z

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended.

  16. DOE Successfully Resolves Three Enforcement Cases and Files Yet...

    Office of Environmental Management (EM)

    Successfully Resolves Three Enforcement Cases and Files Yet Another DOE Successfully Resolves Three Enforcement Cases and Files Yet Another September 29, 2010 - 5:24pm Addthis The...

  17. Vibrational Cooling in A Cold Ion Trap: Vibrationally Resolved...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vibrational Cooling in A Cold Ion Trap: Vibrationally Resolved Photoelectron Spectroscopy of Cold C60- Anions. Vibrational Cooling in A Cold Ion Trap: Vibrationally Resolved...

  18. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  19. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  20. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  1. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  2. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  3. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  4. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01T23:59:59.000Z

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  5. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  6. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  7. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect (OSTI)

    Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

    1995-03-01T23:59:59.000Z

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  8. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  9. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  10. A case study of social vulnerability mapping: issues of scale and aggregation

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15T23:59:59.000Z

    This study uses geographic information systems to determine if the aggregation of census block data are better than census block group data for analyzing social vulnerability. This was done by applying a social vulnerability method that used census...

  11. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

    E-Print Network [OSTI]

    Narasayya, Vivek

    programs by exploiting browser vulnerabilities are a serious emerging threat. In response, we have-management methodology to cybersecurity: instead of directly detecting the acts of vulnerability exploits, the system

  12. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  13. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  14. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  15. Energy resolved X-ray grating interferometry

    SciTech Connect (OSTI)

    Thuering, T.; Stampanoni, M. [Swiss Light Source, Paul Scherrer Institut, Villigen PSI (Switzerland) [Swiss Light Source, Paul Scherrer Institut, Villigen PSI (Switzerland); Institute for Biomedical Engineering, Swiss Federal Institute of Technology, Zurich (Switzerland); Barber, W. C.; Iwanczyk, J. S. [DxRay, Inc., Northridge, California 91324 (United States)] [DxRay, Inc., Northridge, California 91324 (United States); Seo, Y.; Alhassen, F. [UCSF Physics Research Laboratory, Department of Radiology and Biomedical Imaging, University of California, San Francisco, California 94143 (United States)] [UCSF Physics Research Laboratory, Department of Radiology and Biomedical Imaging, University of California, San Francisco, California 94143 (United States)

    2013-05-13T23:59:59.000Z

    Although compatible with polychromatic radiation, the sensitivity in X-ray phase contrast imaging with a grating interferometer is strongly dependent on the X-ray spectrum. We used an energy resolving detector to quantitatively investigate the dependency of the noise from the spectral bandwidth and to consequently optimize the system-by selecting the best energy band matching the experimental conditions-with respect to sensitivity maximization and, eventually, dose. Further, since theoretical calculations of the spectrum are usually limited due to non-ideal conditions, an energy resolving detector accurately quantifies the spectral changes induced by the interferometer including flux reduction and beam hardening.

  16. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  17. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  18. Cloud Tracking in Cloud-Resolving Models

    E-Print Network [OSTI]

    Plant, Robert

    Cloud Tracking in Cloud-Resolving Models RMetS Conference 4th September 2007 Bob Plant Department of Meteorology, University of Reading, UK #12;Introduction Obtain life cycle statistics for clouds in CRM simulations What is the distribution of cloud lifetimes? What factors determine the lifetime of an individual

  19. 6, 1184511875, 2006 A new SIze REsolved

    E-Print Network [OSTI]

    Boyer, Edmond

    the aerosol size distribution into sections and solves the GDE by splitting coagulation and condensation Interactive Discussion EGU that affect the aerosol size/composition distribution are therefore crucial. ThreeACPD 6, 11845­11875, 2006 A new SIze REsolved Aerosol Model E. Debry et al. Title Page Abstract

  20. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  1. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  2. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  3. aur spatially resolved: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nearest star-forming regions (140 pc). Large, 6-10m ground-based telescopes with mid-infrared instruments can resolve these systems. In this paper, we spatially resolve the 0.88"...

  4. Polarization- and Azimuth-Resolved Infrared Spectroscopy of Water...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Azimuth-Resolved Infrared Spectroscopy of Water on TiO2(110): Anisotropy and the Hydrogen-Bonding Network. Polarization- and Azimuth-Resolved Infrared Spectroscopy of Water on...

  5. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  6. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  7. V-062: Asterisk Two Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote

  8. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  9. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartmentWireshark

  10. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities | DepartmentEnergy

  11. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department of

  12. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery

  13. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment of

  14. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  15. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  16. Vulnerability of nuclear power plant structures to large external fires

    SciTech Connect (OSTI)

    Bennett, D.E.

    1983-08-01T23:59:59.000Z

    This report examines the inherent vulnerability of nuclear power plant structures to the thermal environments arising from large, external fires. The inherent vulnerability is the capacity of the concrete safety-related structures to absorb thermal loads without exceeding the appropriate thermal and structural design criteria. The potential sources of these thermal environments are large, offsite fires arising from accidents involving the transportation or storage of large quantities of flammable gases or liquids. A realistic thermal response analysis of a concrete panel was performed using three limiting criteria: temperature at the first rebar location, erosion and ablation of the front (exterior) surface due to high heat fluxes, and temperature at the back (interior) surface. The results of this analysis yield a relationship between incident heat flux and the maximum allowable exposure duration. Example calculations for the break of a 0.91 m (3') diameter high-pressure natural gas pipeline and a 1 m/sup 2/ hole in a 2-1/2 million gallon gasoline tank show that the resulting fires do not pose a significant hazard for ranges of 500 m or greater.

  17. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  18. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  19. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  20. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  1. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  2. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  4. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  5. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  6. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  7. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  8. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  9. Resolving the BLR in NGC 3783

    E-Print Network [OSTI]

    P. Lira; M. Kishimoto; A. Robinson; S. Young; D. Axon; M. Elvis; A. Lawrence; B. Peterson

    2006-12-21T23:59:59.000Z

    We present results from very high signal-to-noise spectropolarimetric observations of the Seyfert 1 galaxy NGC 3783. Position Angle (PA) changes across the Balmer lines show that the scatterer is resolving the Broad-Emission Line Region (BLR). A broad component seen in polarized light and located bluewards from the H$\\beta$ line very likely corresponds to HeII$\\lambda4686$. The lack of PA changes across this line suggests that the region responsible for this emission appears to the scatterer as unresolved as the continuum source, in agreement with the stratified BLR structure determined from reverberation mapping.

  10. Time-resolved ion energy distribution meas

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2, 2003 (NextTime-Resolved Study of Bondingresolved

  11. Resolved Sideband Cooling of a Micromechanical Oscillator

    E-Print Network [OSTI]

    A. Schliesser; R. Rivière; G. Anetsberger; O. Arcizet; T. J. Kippenberg

    2007-09-26T23:59:59.000Z

    Micro- and nanoscale opto-mechanical systems provide radiation pressure coupling of optical and mechanical degree of freedom and are actively pursued for their ability to explore quantum mechanical phenomena of macroscopic objects. Many of these investigations require preparation of the mechanical system in or close to its quantum ground state. Remarkable progress in ground state cooling has been achieved for trapped ions and atoms confined in optical lattices. Imperative to this progress has been the technique of resolved sideband cooling, which allows overcoming the inherent temperature limit of Doppler cooling and necessitates a harmonic trapping frequency which exceeds the atomic species' transition rate. The recent advent of cavity back-action cooling of mechanical oscillators by radiation pressure has followed a similar path with Doppler-type cooling being demonstrated, but lacking inherently the ability to attain ground state cooling as recently predicted. Here we demonstrate for the first time resolved sideband cooling of a mechanical oscillator. By pumping the first lower sideband of an optical microcavity, whose decay rate is more than twenty times smaller than the eigen-frequency of the associated mechanical oscillator, cooling rates above 1.5 MHz are attained. Direct spectroscopy of the motional sidebands reveals 40-fold suppression of motional increasing processes, which could enable reaching phonon occupancies well below unity (cooling as reported here should find widespread use in opto-mechanical cooling experiments. Apart from ground state cooling, this regime allows realization of motion measurement with an accuracy exceeding the standard quantum limit.

  12. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  13. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  14. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  15. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  16. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  17. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  18. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    nega- tive pressures (Dixon and Joly, 1895; Briggs, 1950) allows plants to power the movement of water to withstand tension-induced cavitation is typ- ically inferred from "vulnerability curves" generatedVulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels

  19. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  20. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  1. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  2. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  3. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  4. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  5. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  6. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  7. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  8. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  9. ANGLE-RESOLVED PHOTOEMISSION STUDIES OF Ag, Au, AND Pt

    E-Print Network [OSTI]

    Davis, R.F.

    2010-01-01T23:59:59.000Z

    under Contract W-7405-ENG-48 ANGLE-RESOLVED PHOTOEMISSIONEnergy under Contract No. W-7405-Eng-48. It was performed at

  10. Determination of Surface Exciton Energies by Velocity Resolved...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Exciton Energies by Velocity Resolved Atomic Desorption. Abstract: We have developed a new method for determining surface exciton band energies in alkali halides based on...

  11. angle resolved thermal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    spectroscopy ARPES groups have Lombardi, John R. 18 Molecular dynamics simulations of thermal conductivity of carbon nanotubes: Resolving the effects of computational parameters...

  12. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26T23:59:59.000Z

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  13. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  14. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L., E-mail: jalonne@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 109 S. Observatory, SPH II, Rm. M6314, Ann Arbor, MI 48109 (United States); Sanchez, Brisa N., E-mail: brisa@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Jolliet, Olivier, E-mail: ojolliet@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Zhang, Zhenzhen, E-mail: zhzh@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Parker, Edith A., E-mail: Edith-Parker@uiowa.edu [University of Michigan School of Public Health, Health Behavior and Health Education Department, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Timothy Dvonch, J., E-mail: dvonch@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 1415 Washington Heights, 6642 SPH Tower, Ann Arbor, MI 48109 (United States); O'Neill, Marie S., E-mail: marieo@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6631 SPH Tower, 1415 Washington Heights, Ann Arbor, MI 48109 (United States)

    2012-01-15T23:59:59.000Z

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  15. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  16. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  17. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  18. RESOLVE Upgrades for on Line Lattice Error Analysis

    SciTech Connect (OSTI)

    Lee, M.; Corbett, J.; White, G.; /SLAC; Zambre, Y.; /Unlisted

    2011-08-25T23:59:59.000Z

    We have increased the speed and versatility of the orbit analysis process by adding a command file, or 'script' language, to RESOLVE. This command file feature enables us to automate data analysis procedures to detect lattice errors. We describe the RESOLVE command file and present examples of practical applications.

  19. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  20. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  1. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  2. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  3. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  4. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability · Adaptation and Vulnerability · Transboundary Cooperation ­ Conflict · Irrigation Performance and Policy · River Basin Management · Water Allocation · Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  5. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  6. DNA repair modulates the vulnerability of the developing brain to alkylating agents

    E-Print Network [OSTI]

    Samson, Leona D.

    Neurons of the developing brain are especially vulnerable to environmental agents that damage DNA (i.e., genotoxicants), but the mechanism is poorly understood. The focus of the present study is to demonstrate that DNA ...

  7. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  8. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  9. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01T23:59:59.000Z

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to further characterise...

  10. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  11. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  12. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    through a social vulnerability perspective they all can be seen as lacking access to vital economic and social resources, possessing lim- ited autonomy and power, and having low levels of social capital (Morrow, 1999). They also, for socio- historical... of these socially vulnerable populations, but we do not yet know what parts of the community infrastructure are most critical to support their resilience in the post- disaster context. Given the dearth of empirical studies that actu- ally explore how disaster...

  13. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    and Hydrological Science iii ABSTRACT Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico. (August 2009) Maria del Rosario Sanchez Flores, B.S., Monterrey Tech.; M.S., Instituto Matias Romero Co-Chairs of Advisory Committee: Dr... this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer...

  14. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  15. On quasi-free dynamics on the resolvent algebra

    E-Print Network [OSTI]

    Hajime Moriya

    2014-05-18T23:59:59.000Z

    The resolvent algebra is a new C*-algebra of the canonical commutation relations of a boson field given by Buchholz-Grundling. We study analytic properties of quasi-free dynamics on the resolvent algebra. Subsequently we consider a supersymmetric quasi-free dynamics on the graded C*-algebra made of a Clifford (fermion) algebra and a resolvent (boson) algebra. We establish an infinitesimal supersymmetry formula upon the GNS Hilbert space for any regular state satisfying some mild requirement which is standard in quantum field theory. We assert that the supersymmetric dynamics is given as a C*-dynamics.

  16. Time-Resolved Research (XSD) | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    14-ID-B is operated as a partnership between BioCARS and XSD and is specialized in ultrafast time resolved techniques such as laser pump high-flux x-ray probe in both pink...

  17. Proceedings of the RESOLVE Workshop 2006 Blacksburg, VA

    E-Print Network [OSTI]

    Edwards, Stephen H.

    #12;ii #12;iii Preface and Grade Resolve/C++ Programs ....................................6 Stephen H. Edwards, Virginia Tech Some Joan Krone, Denison University, and William F. Ogden, The Ohio State University Issues in the Creation

  18. Passive background correction method for spatially resolved detection

    DOE Patents [OSTI]

    Schmitt, Randal L. (Tijeras, NM); Hargis, Jr., Philip J. (Albuquerque, NM)

    2011-05-10T23:59:59.000Z

    A method for passive background correction during spatially or angularly resolved detection of emission that is based on the simultaneous acquisition of both the passive background spectrum and the spectrum of the target of interest.

  19. Building America Webinar: Resolving Codes and Standards Issues...

    Office of Environmental Management (EM)

    to Energy Innovations Building America Webinar: Resolving Codes and Standards Issues to Energy Innovations May 20, 2015 3:00PM to 4:30PM EDT Join us for a free webinar that will...

  20. EGR Spatial Uniformity & Cylinder-Resolved Transients-Measurements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an EGR probe for assessing steady-state spatial uniformity and cylinder-resolved EGR dynamics. p-27yoo.pdf More Documents & Publications CumminsORNL-FEERC CRADA: NOx Control &...

  1. Time-Resolved Molecular Characterization of Limonene/Ozone Aerosol...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    time intervals using a cascade impactor. The SOA samples were extracted into acetonitrile and analyzed using a HR-ESI-MS instrument with a resolving power of 100,000 (m...

  2. A tool for phase resolved spectroscopy with ISGRI

    E-Print Network [OSTI]

    A. Segreto; C. Ferrigno

    2007-09-26T23:59:59.000Z

    INTEGRAL observations provide a large amount of data on accreting binary systems. The interpretation of the spectral emission of these sources needs timing analysis and phase resolved spectroscopy, which are really cumbersome tasks if performed with tools based on the imaging extraction methods usually used for coded mask instruments. Here we present a software for the ISGRI instrument which allows to extract in a fast way, light curves, pulse profiles, and phase resolved spectra, making data reduction a much easier task.

  3. Seventh international conference on time-resolved vibrational spectroscopy

    SciTech Connect (OSTI)

    Dyer, R.B.; Martinez, M.A.D.; Shreve, A.; Woodruff, W.H. [comps.

    1997-04-01T23:59:59.000Z

    The International Conference on Time-Resolved Vibrational Spectroscopy (TRVS) is widely recognized as the major international forum for the discussion of advances in this rapidly growing field. The 1995 conference was the seventh in a series that began at Lake Placid, New York, 1982. Santa Fe, New Mexico, was the site of the Seventh International Conference on Time-Resolved Vibrational Spectroscopy, held from June 11 to 16, 1995. TRVS-7 was attended by 157 participants from 16 countries and 85 institutions, and research ranging across the full breadth of the field of time-resolved vibrational spectroscopy was presented. Advances in both experimental capabilities for time-resolved vibrational measurements and in theoretical descriptions of time-resolved vibrational methods continue to occur, and several sessions of the conference were devoted to discussion of these advances and the associated new directions in TRVS. Continuing the interdisciplinary tradition of the TRVS meetings, applications of time-resolved vibrational methods to problems in physics, biology, materials science, and chemistry comprised a large portion of the papers presented at the conference.

  4. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  5. THE DEBRIS DISK AROUND {gamma} DORADUS RESOLVED WITH HERSCHEL

    SciTech Connect (OSTI)

    Broekhoven-Fiene, Hannah; Matthews, Brenda C.; Booth, Mark; Kavelaars, J. J.; Koning, Alice [Department of Physics and Astronomy, University of Victoria, Victoria, BC V8W 3P6 (Canada)] [Department of Physics and Astronomy, University of Victoria, Victoria, BC V8W 3P6 (Canada); Kennedy, Grant M.; Wyatt, Mark C. [Institute of Astronomy, University of Cambridge, Madingley Road, Cambridge CB3 0HA (United Kingdom)] [Institute of Astronomy, University of Cambridge, Madingley Road, Cambridge CB3 0HA (United Kingdom); Sibthorpe, Bruce [UK Astronomy Technology Center, Royal Observatory, Blackford Hill, Edinburgh EH9 3HJ (United Kingdom)] [UK Astronomy Technology Center, Royal Observatory, Blackford Hill, Edinburgh EH9 3HJ (United Kingdom); Lawler, Samantha M. [Department of Physics and Astronomy, University of British Columbia, 6224 Agricultural Road, Vancouver, BC V6T 1Z1 (Canada)] [Department of Physics and Astronomy, University of British Columbia, 6224 Agricultural Road, Vancouver, BC V6T 1Z1 (Canada); Qi, Chenruo [Herzberg Institute of Astrophysics, National Research Council of Canada, Victoria, BC V9E 2E7 (Canada)] [Herzberg Institute of Astrophysics, National Research Council of Canada, Victoria, BC V9E 2E7 (Canada); Su, Kate Y. L.; Rieke, George H. [Steward Observatory, University of Arizona, 933 North Cherry Avenue, Tucson, AZ 85721 (United States)] [Steward Observatory, University of Arizona, 933 North Cherry Avenue, Tucson, AZ 85721 (United States); Wilner, David J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)] [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Greaves, Jane S. [School of Physics and Astronomy, University of St. Andrews, North Haugh, St. Andrews KY16 9SS (United Kingdom)] [School of Physics and Astronomy, University of St. Andrews, North Haugh, St. Andrews KY16 9SS (United Kingdom)

    2013-01-01T23:59:59.000Z

    We present observations of the debris disk around {gamma} Doradus, an F1V star, from the Herschel Key Programme DEBRIS (Disc Emission via Bias-free Reconnaissance in the Infrared/Submillimetre). The disk is well resolved at 70, 100, and 160 {mu}m, resolved along its major axis at 250 {mu}m, detected but not resolved at 350 {mu}m, and confused with a background source at 500 {mu}m. It is one of our best resolved targets and we find it to have a radially broad dust distribution. The modeling of the resolved images cannot distinguish between two configurations: an arrangement of a warm inner ring at several AU (best fit 4 AU) and a cool outer belt extending from {approx}55 to 400 AU or an arrangement of two cool, narrow rings at {approx}70 AU and {approx}190 AU. This suggests that any configuration between these two is also possible. Both models have a total fractional luminosity of {approx}10{sup -5} and are consistent with the disk being aligned with the stellar equator. The inner edge of either possible configuration suggests that the most likely region to find planets in this system would be within {approx}55 AU of the star. A transient event is not needed to explain the warm dust's fractional luminosity.

  6. Calculating Nuclear Power Plant Vulnerability Using Integrated Geometry and Event/Fault-Tree Models

    SciTech Connect (OSTI)

    Peplow, Douglas E. [Oak Ridge National Laboratory (United States); Sulfredge, C. David [Oak Ridge National Laboratory (United States); Sanders, Robert L. [Oak Ridge National Laboratory (United States); Morris, Robert H. [Oak Ridge National Laboratory (United States); Hann, Todd A. [Defense Threat Reduction Agency (United States)

    2004-01-15T23:59:59.000Z

    Since the events of September 11, 2001, the vulnerability of nuclear power plants to terrorist attacks has become a national concern. The results of vulnerability analysis are greatly influenced by the computational approaches used. Standard approximations used in fault-tree analysis are not applicable for attacks, where high component failure probabilities are expected; two methods that do work with high failure probabilities are presented. Different blast modeling approaches can also affect the end results. Modeling the structural details of facility buildings and the geometric layout of components within the buildings is required to yield meaningful results.

  7. Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures

    SciTech Connect (OSTI)

    Bickford, W.E.

    1994-09-15T23:59:59.000Z

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

  8. THE ALGOL TRIPLE SYSTEM SPATIALLY RESOLVED AT OPTICAL WAVELENGTHS

    SciTech Connect (OSTI)

    Zavala, R. T.; Hutter, D. J. [U.S. Naval Observatory, Flagstaff Station, 10391 W. Naval Obs. Rd., Flagstaff, AZ 86001 (United States); Hummel, C. A. [European Organization for Astronomical Research in the Southern Hemisphere, Karl-Schwarzschild-Str. 2, 85748 Garching bei Muenchen (Germany); Boboltz, D. A.; Ojha, R. [U.S. Naval Observatory, 3450 Massachusetts Ave. NW, Washington DC 20392 (United States); Shaffer, D. B. [Lowell Observatory, 1400 W. Mars Hill Rd., Flagstaff, AZ 86001 (United States); Tycner, C. [Department of Physics, Central Michigan University, Mt. Pleasant, MI 48859 (United States); Richards, M. T., E-mail: bzavala@nofs.navy.mi, E-mail: djh@nofs.navy.mi, E-mail: chummel@eso.or, E-mail: dboboltz@usno.navy.mi, E-mail: rojha@usno.navy.mi, E-mail: shaffer@alumni.caltech.ed, E-mail: c.tycner@cmich.ed, E-mail: mrichards@astro.psu.ed [Department of Astronomy and Astrophysics, Pennsylvania State University, 525 Davey Lab, University Park, PA 19104 (United States)

    2010-05-20T23:59:59.000Z

    Interacting binaries typically have separations in the milliarcsecond regime, and hence it has been challenging to resolve them at any wavelength. However, recent advances in optical interferometry have improved our ability to discern the components in these systems and have now enabled the direct determination of physical parameters. We used the Navy Prototype Optical Interferometer to produce for the first time images resolving all three components in the well-known Algol triple system. Specifically, we have separated the tertiary component from the binary and simultaneously resolved the eclipsing binary pair, which represents the nearest and brightest eclipsing binary in the sky. We present revised orbital elements for the triple system, and we have rectified the 180{sup 0} ambiguity in the position angle of Algol C. Our directly determined magnitude differences and masses for this triple star system are consistent with earlier light curve modeling results.

  9. Arctic sea ice trends and narwhal vulnerability Kristin L. Laidre a,*, Mads Peter Heide-Jrgensen b

    E-Print Network [OSTI]

    Laidre, Kristin L.

    risk assess- ments as this may exceed the natural response capacity of the species. Ó 2004 Elsevier Ltd; Risk assessment; Vulnerability 1. Introduction Significant physical and biological shifts have recently climate change require that species vulnerability be incorporated into population risk models, especially

  10. More information from http://www.researchandmarkets.com/reports/1054243/ Fragile Networks: Identifying Vulnerabilities and Synergies in an

    E-Print Network [OSTI]

    Nagurney, Anna

    and Links in Financial Networks. Chapter 7: Dynamic Networks, the Internet, and Electric Power. Chapter 8: Identifying Vulnerabilities and Synergies in an Uncertain World Description: A unified treatment of the vulnerabilities that exist in real-world network systems?--with tools to identify synergies for mergers

  11. Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    (river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

  12. A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo

    E-Print Network [OSTI]

    Bullo, Francesco

    of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph in the power network model. The study of dynamical systems in descriptor form has received sensible attention

  13. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  14. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  15. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  16. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

  17. Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1

    E-Print Network [OSTI]

    and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

  18. Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass

    E-Print Network [OSTI]

    '. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

  19. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory was supported by Electric Power Research Center (EPRC) at Iowa State University. C.-W. Ten, C.-C. Liu, and M

  20. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack was supported by the Electric Power Research Center (EPRC) at Iowa State University. Paper no. TPWRS-00963- 2007

  1. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  2. Vulnerability of national economies to the impacts of climate change on fisheries

    E-Print Network [OSTI]

    Reynolds, John D.

    economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

  3. Vulnerability of the New York City Metropolitan Area to Coastal Hazards,

    E-Print Network [OSTI]

    moved from a manufacturing to a service industry-based economy. Mid-town and Lower Manhattan are two on Long Island, NY, and the north- ern New Jersey shore. Beaches and coastal wetlands provide recreational at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

  4. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies, NM, USA Abstract--Modern power grids rely heavily on their control systems operating over and blackouts remain possible if the initial disturbances in the power grid are accompanied by other system

  5. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  6. Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste

    E-Print Network [OSTI]

    Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

  7. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08T23:59:59.000Z

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  8. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

  9. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

  10. American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE

    E-Print Network [OSTI]

    Pockman, William T.

    1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

  11. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  12. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  13. From Sustainability to Transformation: dynamics and diversity in reflexive governance of vulnerability, Andy Stirling

    E-Print Network [OSTI]

    Sussex, University of

    of vulnerability, Andy Stirling From "Broadening Out" Appraisal to "Opening Up" Commitments This chapter turns our-technical choice (Stirling, 2008a). Organizational, cultural, political, and economic forces structure our implications (Stirling, 2008b). In this way, we can extend attention to alternative trajectories reflecting

  14. Time resolved ultraviolet absorption spectroscopy of pulsed fluorocarbon plasmas

    E-Print Network [OSTI]

    Gleason, Karen K.

    Time resolved ultraviolet absorption spectroscopy of pulsed fluorocarbon plasmas Brett A. Cruden.1063/1.1334936 I. INTRODUCTION The study of fluorocarbon plasmas is of great interest for their applications in silicon dioxide etching.1,2 Recently, at- tention has been paid to using fluorocarbon plasmas to pro- duce

  15. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01T23:59:59.000Z

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  16. APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation

    E-Print Network [OSTI]

    Brownstone, Rob

    on built infrastructure. It will examine the evolution of the term vulnerability and explore current infrastructure vulnerabilities (potential for increased moisture damage to buildings or interruptions in electrical power generation) (Berry et al., 2008; Canadian Council of Professional Engineers, 2008

  17. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

  18. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    SciTech Connect (OSTI)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15T23:59:59.000Z

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  19. Selection effects in resolving Galactic binaries with LISA

    E-Print Network [OSTI]

    M. J. Benacquista; S. L. Larson; B. E. Taylor

    2007-03-01T23:59:59.000Z

    Using several realisations of the Galactic population of close white dwarf binaries, we have explored the selection bias for resolved binaries in the LISA data stream. We have assumed a data analysis routine that is capable of identifying binaries that have a signal to noise ratio of at least 5 above a confusion foreground of unresolved binaries. The resolved population of binaries is separated into a subpopulation over 1000 binaries that have a measureable chirp and another subpopulation over 20,000 binaries that do not. As expected, the population of chirping binaries is heavily skewed toward high frequency, high chirp mass systems, with little or no preference for nearby systems. The population of non-chirping binaries is still biased toward frequencies above about 1 mHz. There is an overabundance of higher mass systems than is present in the complete Galactic population.

  20. Resolvent estimates and local decay of waves on conic manifolds

    E-Print Network [OSTI]

    Dean Baskin; Jared Wunsch

    2012-10-01T23:59:59.000Z

    We consider manifolds with conic singularites that are isometric to $\\mathbb{R}^{n}$ outside a compact set. Under natural geometric assumptions on the cone points, we prove the existence of a logarithmic resonance-free region for the cut-off resolvent. The estimate also applies to the exterior domains of non-trapping polygons via a doubling process. The proof of the resolvent estimate relies on the propagation of singularities theorems of Melrose and the second author to establish a "very weak" Huygens' principle, which may be of independent interest. As applications of the estimate, we obtain a exponential local energy decay and a resonance wave expansion in odd dimensions, as well as a lossless local smoothing estimate for the Schr{\\"o}dinger equation.

  1. Ultrafast Time-Resolved Electron Diffraction with Megavolt Electron Beams

    SciTech Connect (OSTI)

    Hastings, J.B.; /SLAC; Rudakov, F.M.; /Brown U.; Dowell, D.H.; Schmerge, J.F.; /SLAC; Cardoza, J.D.; /Brown U.; Castro, J.M.; Gierman, S.M.; Loos, H.; /SLAC; Weber, P.M.; /Brown U.

    2006-10-24T23:59:59.000Z

    An rf photocathode electron gun is used as an electron source for ultrafast time-resolved pump-probe electron diffraction. We observed single-shot diffraction patterns from a 160 nm Al foil using the 5.4 MeV electron beam from the Gun Test Facility at the Stanford Linear Accelerator. Excellent agreement with simulations suggests that single-shot diffraction experiments with a time resolution approaching 100 fs are possible.

  2. Resolving to Make Earth Day Last All Year

    Broader source: Energy.gov [DOE]

    What was your New Year's resolution this year? Maybe you resolved to get back into the gym and finally lose those last pesky pounds. Maybe, like me, you resolved to finally break down and buy that new furnace. Or maybe you liked Chris' idea, and you resolved do whatever you could to save energy and money this year. When we talk about saving energy throughout the year, it's easy to forget that we're not just energy users when we're at home. Many of us spend a large part of our days at work, and the energy we use there is significant. According to ENERGY STAR, the energy needed to support just one office worker for a day produces twice as much greenhouse gas emissions as that person's drive to work. Handily, there are a lot of resources available to help you tackle that energy usage at work, and Earth Day (coming up on April 22nd) can be the perfect time to launch a campaign to make the change.

  3. Angle-resolved effective potentials for disk-shaped molecules

    E-Print Network [OSTI]

    Thomas Heinemann; Karol Palczynski; Joachim Dzubiella; Sabine H. L. Klapp

    2014-10-22T23:59:59.000Z

    We present an approach for calculating coarse-grained angle-resolved effective pair potentials for uniaxial molecules. For integrating out the intramolecular degrees of freedom we apply umbrella sampling and steered dynamics techniques in atomistically-resolved molecular dynamics (MD) computer simulations. Throughout this study we focus on disk-like molecules such as coronene. To develop the methods we focus on integrating out the van-der-Waals and intramolecular interactions, while electrostatic charge contributions are neglected. The resulting coarse-grained pair potential reveals a strong temperature and angle dependence. In the next step we fit the numerical data with various Gay-Berne-like potentials to be used in more efficient simulations on larger scales. The quality of the resulting coarse-grained results is evaluated by comparing their pair and many-body structure as well as some thermodynamic quantities self-consistently to the outcome of atomistic MD simulations of many particle systems. We find that angle-resolved potentials are essential not only to accurately describe crystal structures but also for fluid systems where simple isotropic potentials start to fail already for low to moderate packing fractions. Further, in describing these states it is crucial to take into account the pronounced temperature dependence arising in selected pair configurations due to bending fluctuations.

  4. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20T23:59:59.000Z

    in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Chair of Committee, Gary Wingenbach Committee Members, Theresa P. Murphrey Leonardo Lombardini Head of Department, John Elliot December 2014 Major Subject...; (c) health; (d) social networks; (e) food; (f) water; and (g) natural disasters and climate variability (Hahn et al., 2009). The Hahn et al. (2009) study took this vulnerability framework a step further by determining which secondary components...

  5. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  6. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4;DepartmentVulnerabilities |Department

  7. High Mass Accuracy and High Mass Resolving Power FT-ICR Secondary...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    High Mass Accuracy and High Mass Resolving Power FT-ICR Secondary Ion Mass Spectrometry for Biological Tissue Imaging. High Mass Accuracy and High Mass Resolving Power FT-ICR...

  8. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-10-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  9. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01T23:59:59.000Z

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  11. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15T23:59:59.000Z

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  12. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01T23:59:59.000Z

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  15. Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but

    E-Print Network [OSTI]

    Mencuccini, Maurizio

    Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

  16. LABORATORY CHARACTERIZATION OF A SIZE-RESOLVED CPC BATTERY TO INFER THE COMPOSITION OF FRESHLY FORMED

    E-Print Network [OSTI]

    Homes, Christopher C.

    LABORATORY CHARACTERIZATION OF A SIZE-RESOLVED CPC BATTERY TO INFER THE COMPOSITION OF FRESHLY. #12;Laboratory Characterization of a Size-Resolved CPC Battery to Infer the Composition of Freshly Abstract. A size-resolved condensation particle counter battery (SR-CPCb) was developed to infer

  17. Mesoscale-resolving simulations of summer and winter bora events in the Adriatic Sea

    E-Print Network [OSTI]

    Cushman-Roisin, Benoit

    Mesoscale-resolving simulations of summer and winter bora events in the Adriatic Sea Benoit CushmanCAST model on a 1.2-min grid (about 2-km resolution) and resolve the mesoscale variability because the grid-Roisin, B., and K. A. Korotenko (2007), Mesoscale-resolving simulations of summer and winter bora events

  18. Time resolved spectroscopy of the variable brown dwarf Kelu-1

    E-Print Network [OSTI]

    F. J. Clarke; C. G. Tinney; S. T. Hodgkin

    2003-01-09T23:59:59.000Z

    We report the results of observations designed to investigate the spectroscopic signatures of dust clouds on the L2 brown dwarf Kelu-1. Time resolved medium resolution spectra show no significant evidence of variability in the dust sensitive TiO, CrH and FeH bandheads on the timescale of 1--24 hours. We do however report periodic variability in the psuedo-equivelent width of H-alpha consistent with the 1.8 hour rotation period previously reported for this object Clarke, Tinney & Tolley (2002). Near-contemporaneous I-band photometry shows evidence for non-periodic variability at the level of 2%.

  19. The Dark Energy Survey: Prospects for Resolved Stellar Populations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rossetto, Bruno M; Santiago, Basilio X; Girardi, Leo; Camargo, Julio I.B.; Balbinot, Eduardo; da Costa, Luiz N; Yanny, Brian; Maia, Marcio A.G.; Makler, Martin; Ogando, Ricardo L.C.; et al

    2011-05-06T23:59:59.000Z

    Wide angle and deep surveys, regardless of their primary purpose, always sample a large number of stars in the Galaxy and in its satellite system. We here make a forecast of the expected stellar sample resulting from the Dark Energy Survey and the perspectives that it will open for studies of Galactic structure and resolved stellar populations in general. An estimated 1.2 x 10{sup 8} stars will be sampled in DES grizY filters in the southern equatorial hemisphere. This roughly corresponds to 20% of all DES sources. Most of these stars belong to the stellar thick disk and halo ofmore »the Galaxy.« less

  20. Variational theory for site resolved protein folding free energy surfaces

    E-Print Network [OSTI]

    John J. Portman; Shoji Takada; Peter G. Wolynes

    1999-01-18T23:59:59.000Z

    We present a microscopic variational theory for the free energy surface of a fast folding protein that allows folding kinetics to be resolved to the residue level using Debye-Waller factors as local order parameters. We apply the method to lambda-repressor and compare with site directed mutagenesis experiments. The formation of native structure and the free energy profile along the folding route are shown to be well described by the capillarity approximation but with some fine structure due to local folding topology.

  1. High intrinsic energy resolution photon number resolving detectors

    E-Print Network [OSTI]

    Lolli, L; Portesi, C; Monticone, E; Rajteri, M

    2013-01-01T23:59:59.000Z

    Transition Edge Sensors (TESs) are characterized by the intrinsic figure of merit to resolve both the energy and the statistical distribution of the incident photons. These properties lead TES devices to become the best single photon detector for quantum technology experiments. For a TES based on titanium and gold has been reached, at telecommunication wavelength, an unprecedented intrinsic energy resolution (0.113 eV). The uncertainties analysis of both energy resolution and photon state assignment has been discussed. The thermal properties of the superconductive device have been studied by fitting the bias curve to evaluate theoretical limit of the energy resolution.

  2. Time-resolved fluorescence decay measurements for flowing particles

    DOE Patents [OSTI]

    Deka, C.; Steinkamp, J.A.

    1999-06-01T23:59:59.000Z

    Time-resolved fluorescence decay measurements are disclosed for flowing particles. An apparatus and method for the measurement and analysis of fluorescence for individual cells and particles in flow are described, wherein the rapid measurement capabilities of flow cytometry and the robust measurement and analysis procedures of time-domain fluorescence lifetime spectroscopy are combined. A pulse-modulated CW laser is employed for excitation of the particles. The characteristics and the repetition rate of the excitation pulses can be readily adjusted to accommodate for fluorescence decays having a wide range of lifetimes. 12 figs.

  3. The Dark Energy Survey: Prospects for Resolved Stellar Populations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rossetto, Bruno M [Rio de Janeiro Observ.; Santiago, Basilio X [Rio Grande do Sul U.; Rio de Janeiro Observ.; Girardi, Leo [Padua Observ.; Rio de Janeiro Observ.; Camargo, Julio I.B. [Rio de Janeiro Observ.; Balbinot, Eduardo [Rio Grande do Sul U.; Rio de Janeiro Observ.; da Costa, Luiz N [Rio de Janeiro Observ.; Yanny, Brian [Fermilab; Maia, Marcio A.G. [Rio de Janeiro Observ.; Makler, Martin [Rio de Janeiro, CBPF; Rio de Janeiro Observ.; Ogando, Ricardo L.C. [Rio de Janeiro Observ.; Pellegrini, Paulo S [Rio de Janeiro Observ.; Rio de Janeiro Observ.

    2011-05-06T23:59:59.000Z

    Wide angle and deep surveys, regardless of their primary purpose, always sample a large number of stars in the Galaxy and in its satellite system. We here make a forecast of the expected stellar sample resulting from the Dark Energy Survey and the perspectives that it will open for studies of Galactic structure and resolved stellar populations in general. An estimated 1.2 x 10{sup 8} stars will be sampled in DES grizY filters in the southern equatorial hemisphere. This roughly corresponds to 20% of all DES sources. Most of these stars belong to the stellar thick disk and halo of the Galaxy.

  4. Resolve to Save Energy This Year | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you wantJoin us for| DepartmentReduce Hot Water UseComplexResolve to

  5. Resolve to Save Energy This Year | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative JC3 RSS September 9,Award RecipientsActMission toResearchResolve to Save Energy This

  6. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2, 2003 (NextTime-Resolved Study of Bonding in Liquid

  7. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2, 2003 (NextTime-Resolved Study of Bonding in

  8. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2, 2003 (NextTime-Resolved Study of Bonding

  9. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis ofwas publishedThreeTime-Resolved Study of

  10. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis ofwas publishedThreeTime-Resolved Study

  11. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis ofwas publishedThreeTime-Resolved

  12. Time-resolved pump-probe experiments at the LCLS

    SciTech Connect (OSTI)

    Glownia, James; /SLAC /Stanford U., Appl. Phys. Dept.; Cryan, J.; /SLAC /Stanford U., Phys. Dept.; Andreasson, J.; /Uppsala U.; Belkacem, A.; /LBNL, Berkeley; Berrah, N.; /Western Michigan U.; Blaga, C.L.; /Ohio State U.; Bostedt, C.; Bozek, J.; /SLAC; DiMauro, L.F.; /Ohio State U.; Fang, L.; /Western Michigan U.; Frisch, J.; /SLAC; Gessner, O.; /LBNL; Guhr, M.; /SLAC; Hajdu, J.; /Uppsala U.; Hertlein, M.P.; /LBNL; Hoener, M.; /Western Michigan U. /LBNL; Huang, G.; Kornilov, O.; /LBNL; Marangos, J.P.; /Imperial Coll., London; March, A.M.; /Argonne; McFarland, B.K.; /SLAC /Stanford U., Phys. Dept. /SLAC /IRAMIS, Saclay /Stanford U., Phys. Dept. /Georgia Tech /Argonne /Kansas State U. /SLAC /Stanford U., Phys. Dept. /SLAC /Stanford U., Appl. Phys. Dept. /Stanford U., Appl. Phys. Dept. /SLAC /LBNL /Argonne /SLAC /SLAC /Stanford U., Appl. Phys. Dept. /Stanford U., Phys. Dept.; ,

    2011-08-12T23:59:59.000Z

    The first time-resolved x-ray/optical pump-probe experiments at the SLAC Linac Coherent Light Source (LCLS) used a combination of feedback methods and post-analysis binning techniques to synchronize an ultrafast optical laser to the linac-based x-ray laser. Transient molecular nitrogen alignment revival features were resolved in time-dependent x-ray-induced fragmentation spectra. These alignment features were used to find the temporal overlap of the pump and probe pulses. The strong-field dissociation of x-ray generated quasi-bound molecular dications was used to establish the residual timing jitter. This analysis shows that the relative arrival time of the Ti:Sapphire laser and the x-ray pulses had a distribution with a standard deviation of approximately 120 fs. The largest contribution to the jitter noise spectrum was the locking of the laser oscillator to the reference RF of the accelerator, which suggests that simple technical improvements could reduce the jitter to better than 50 fs.

  13. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    SciTech Connect (OSTI)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01T23:59:59.000Z

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

  14. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01T23:59:59.000Z

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  15. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01T23:59:59.000Z

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  16. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department

  17. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |

  18. V-061: IBM SPSS Modeler XML Document Parsing Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote Users

  19. V-080: Apple iOS Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment

  20. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |

  1. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of Energy Cisco|

  2. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment ofWordPress

  3. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe

  4. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple has

  5. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59CapabilityVulnerabilities | Department1: IBM

  6. Nanoscale spatially resolved infrared spectra from single microdroplets

    E-Print Network [OSTI]

    Müller, Thomas; Kulik, Andrzej J; Shimanovich, Ulyana; Mason, Thomas O; Knowles, Tuomas P J; Dietler, Giovanni

    2014-01-01T23:59:59.000Z

    Droplet microfluidics has emerged as a powerful platform allowing a large number of individual reactions to be carried out in spatially distinct microcompartments. Due to their small size, however, the spectroscopic characterisation of species encapsulated in such systems remains challenging. In this paper, we demonstrate the acquisition of infrared spectra from single microdroplets containing aggregation-prone proteins. To this effect, droplets are generated in a microfluidic flow-focussing device and subsequently deposited in a square array onto a ZnSe prism using a micro stamp. After drying, the solutes present in the droplets are illuminated locally by an infrared laser through the prism, and their thermal expansion upon absorption of infrared radiation is measured with an atomic force microscopy tip, granting nanoscale resolution. Using this approach, we resolve structural differences in the amide bands of the spectra of monomeric and aggregated lysozyme from single microdroplets with picolitre volume.

  7. Time-resolved neutron imaging at ANTARES cold neutron beamline

    E-Print Network [OSTI]

    Tremsin, A S; Tittelmeier, K; Schillinger, B; Schulz, M; Lerche, M; Feller, W B

    2015-01-01T23:59:59.000Z

    In non-destructive evaluation with X-rays light elements embedded in dense, heavy (or high-Z) matrices show little contrast and their structural details can hardly be revealed. Neutron radiography, on the other hand, provides a solution for those cases, in particular for hydrogenous materials, owing to the large neutron scattering cross section of hydrogen and uncorrelated dependency of neutron cross section on the atomic number. The majority of neutron imaging experiments at the present time is conducted with static objects mainly due to the limited flux intensity of neutron beamline facilities and sometimes due to the limitations of the detectors. However, some applications require the studies of dynamic phenomena and can now be conducted at several high intensity beamlines such as the recently rebuilt ANTARES beam line at the FRM-II reactor. In this paper we demonstrate the capabilities of time resolved imaging for repetitive processes, where different phases of the process can be imaged simultaneously and...

  8. Electronic properties of linear carbon chains: Resolving the controversy

    SciTech Connect (OSTI)

    Al-Backri, Amaal [Physics Department, Lancaster University, LA1 4YB Lancaster (United Kingdom) [Physics Department, Lancaster University, LA1 4YB Lancaster (United Kingdom); College of Science, Baghdad University, Al-Jaderyia Campus, Baghdad (Iraq); Zólyomi, Viktor; Lambert, Colin J. [Physics Department, Lancaster University, LA1 4YB Lancaster (United Kingdom)] [Physics Department, Lancaster University, LA1 4YB Lancaster (United Kingdom)

    2014-03-14T23:59:59.000Z

    Literature values for the energy gap of long one-dimensional carbon chains vary from as little as 0.2 eV to more than 4 eV. To resolve this discrepancy, we use the GW many-body approach to calculate the band gap E{sub g} of an infinite carbon chain. We also compute the energy dependence of the attenuation coefficient ? governing the decay with chain length of the electrical conductance of long chains and compare this with recent experimental measurements of the single-molecule conductance of end-capped carbon chains. For long chains, we find E{sub g} = 2.16 eV and an upper bound for ? of 0.21 Å{sup ?1}.

  9. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30T23:59:59.000Z

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  10. Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability 

    E-Print Network [OSTI]

    Crossley, Janet Ruth

    2008-01-01T23:59:59.000Z

    needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

  11. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C. (Lawrence Berkeley National Laboratory); Pinar, Ali; Lesieutre, Bernard (Lawrence Berkeley National Laboratory); Donde, Vaibhav (ABB Inc., Raleigh NC)

    2009-03-01T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  12. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  13. Electrically Detected Electron-Spin-Echo Envelope Modulation: A Highly Sensitive Technique for Resolving Complex Interface Structures

    E-Print Network [OSTI]

    Schmidt, Wolf Gero

    for Resolving Complex Interface Structures Felix Hoehne,* Jinming Lu, Andre R. Stegner, Martin Stutzmann

  14. The effects of aging on the fire vulnerability of nuclear power plant components

    SciTech Connect (OSTI)

    Nowlen, S.P.

    1988-01-01T23:59:59.000Z

    Sandia National Laboratories, under the sponsorship of the US Nuclear Regulatory Commission, has initiated an effort to identify and investigate potential nuclear power plant fire safety issues associated with plant aging. The issues of potential concern, which have been identified are the effects of aging on (1) the vulnerability of electrical equipment to fire induced damage; (2) the propensity with which electrical equipment will initiate, or contribute to the severity of, fires; and (3) the integrity of passive fire protection features. Efforts in this program were initiated late in fiscal year 1988. For fiscal year 1989 efforts will focus on the investigation of the effects of aging on cable damageability and cable flammability. This paper presents the findings of a limited review of past electrical equipment fire aging research and a summary of planned activities for fiscal year 1989. 11 refs., 4 figs.

  15. System vulnerability as a concept to assess power system dynamic security

    SciTech Connect (OSTI)

    Fouad, A.A.; Qin Zhou; Vittal, V. (Iowa State Univ., Ames, IA (United States))

    1994-05-01T23:59:59.000Z

    The concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. This new concept combines information on the level of security and its trend with changing system condition. In this paper the transient energy function (TEF) method is used as a tool of analysis. The energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity ([partial derivative][Delta]V/[partial derivative]p) to a changing system parameter p as an indicator of its trend. The thresholds for acceptable levels of the security indicator ([Delta]V) and its trend ([partial derivative][Delta]V/[partial derivative]p) are related to the stability limits of a critical system parameter. A method is proposed to determine these thresholds using heuristic techniques derived from operating practices and policies for a change in plant generation. Results from the IEEE 50 generator test system are presented to illustrate the procedure.

  16. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26T23:59:59.000Z

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  17. LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis

    SciTech Connect (OSTI)

    Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

    1986-01-01T23:59:59.000Z

    At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

  18. Resolved Atomic Super-clouds in Spiral Galaxies

    E-Print Network [OSTI]

    Robert Braun

    1995-12-13T23:59:59.000Z

    High quality data are presented of neutral hydrogen emission and absorption in the fields of eleven of the nearest spiral galaxies. Multi-configuration VLA observations have provided angular resolution of 6~arcsec (corresponding to about 100~pc at the average galaxy distance of 3.5~Mpc) and velocity resolution of 6~km~s$^{-1}$, while accurately recovering the total line flux detected previously with filled apertures. Previous experience suggests that this physical resolution is sufficient to at least marginally resolve the \\ion{H}{1} super-cloud population which delineates regions of active star formation. A high brightness filamentary network of \\ion{H}{1} super-clouds is seen in each galaxy. Emission brightness temperatures in excess of 200~Kelvin are sometimes detected at large radii, even in relatively face-on systems. All galaxies display a systematic increase in the observed brightness temperature of super-clouds with radius, followed by a flattening and subsequent decline. In the few instances where background continuum sources allow detection of \\ion{H}{1} absorption, the indicative spin temperatures are consistent with the super-cloud brightness temperature seen in emission at similar radii. These data suggest substantial opacity of the \\ion{H}{1} in the super-cloud network.

  19. DUST GRAIN EVOLUTION IN SPATIALLY RESOLVED T TAURI BINARIES

    SciTech Connect (OSTI)

    Skemer, Andrew J.; Close, Laird M.; Hinz, Philip M.; Hoffmann, William F.; Males, Jared R. [Steward Observatory, Department of Astronomy, University of Arizona, Tucson, AZ 85721 (United States); Greene, Thomas P. [NASA Ames Research Center, Moffett Field, CA 94035 (United States)

    2011-10-10T23:59:59.000Z

    Core-accretion planet formation begins in protoplanetary disks with the growth of small, interstellar medium dust grains into larger particles. The progress of grain growth, which can be quantified using 10 {mu}m silicate spectroscopy, has broad implications for the final products of planet formation. Previous studies have attempted to correlate stellar and disk properties with the 10 {mu}m silicate feature in an effort to determine which stars are efficient at grain growth. Thus far there does not appear to be a dominant correlated parameter. In this paper, we use spatially resolved adaptive optics spectroscopy of nine T Tauri binaries as tight as 0.''25 to determine if basic properties shared between binary stars, such as age, composition, and formation history, have an effect on dust grain evolution. We find with 90%-95% confidence that the silicate feature equivalent widths of binaries are more similar than those of randomly paired single stars, implying that shared properties do play an important role in dust grain evolution. At lower statistical significance, we find with 82% confidence that the secondary has a more prominent silicate emission feature (i.e., smaller grains) than the primary. If confirmed by larger surveys, this would imply that spectral type and/or binarity are important factors in dust grain evolution.

  20. Mass Resolving Power Requirement for Molecular Formula Determination of Fossil Oils

    E-Print Network [OSTI]

    Weston, Ken

    Mass Resolving Power Requirement for Molecular Formula Determination of Fossil Oils Chang Samuel numbers based on the molecular formulas determined from accurate mass measurement.1 We have reported of molecular formulas of the components is reviewed. The resolving power required for overlapping compound

  1. Frequency domain phase-resolved optical Doppler and Doppler variance tomography

    E-Print Network [OSTI]

    Chen, Zhongping

    ), is capable of measuring micro- flows using the optical Doppler effect [1,2]. Early ODT systems were unableFrequency domain phase-resolved optical Doppler and Doppler variance tomography Lei Wang a phase-resolved optical Doppler tomography (ODT) was developed with Doppler variance imag- ing capability

  2. Cloud Tracking in Cloud-Resolving Models R. S. Plant1

    E-Print Network [OSTI]

    Plant, Robert

    Cloud Tracking in Cloud-Resolving Models R. S. Plant1 1 Department of Meteorology, University. INTRODUCTION In recent years Cloud Resolving Models (CRMs) have become an increasingly important tool for CRM data, which allows one to investigate statistical prop- erties of the lifecycles of the "clouds

  3. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  4. Running Head: Ecosystem Energy and Conservation1 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3

    E-Print Network [OSTI]

    Hansen, Andrew J.

    1 Running Head: Ecosystem Energy and Conservation1 2 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3 Management Strategies4 5 Andrew James Hansen6 Ecology property, ecosystem energy levels, which,14 while once widely recognized as important, has received little

  5. Abstract--This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Abstract--This paper looks into the vulnerabilities of the electric power grid and associated analysis of interdependencies in a critical infrastructure (CI), i.e. the smart grid for electricity in the functionality of the communication system yields a faulty condition in the electric power grid, and find

  6. Time-resolved diagnostics for concrete target response

    SciTech Connect (OSTI)

    Baum, D.W.; Kuklo, R.M.; Reaugh, J.E.; Simonson, S.C.

    1996-05-01T23:59:59.000Z

    In order to facilitate the design of advanced penetrating weapons for defeating land targets, the interaction of concrete with high-velocity penetrators needs to be better characterized. To aid in this effort, three new types of time-resolved diagnostics are being developed and have been used in two experiments and one demonstration: fiber optic arrays to localize penetrators in space and time, Fabry-Perot velocimetry to record the concrete particle velocity, which is related to the pressure, at specific locations within concrete targets, and micropower impulse radar to provide a non-intrusive measure of the penetrator position-time history in a target. The two experiments used the fiber optic array and the Fabry-Perot velocimeter to diagnose the response of concrete to penetration by a Viper shaped charge jet. The results were analyzed using the CALE continuum mechanics simulation program, for which a preliminary model of the material properties of concrete was developed. The fiber optic arrays recorded the bow shock at locations 6.4 and 16.9 cm from the front surfaces. The Fabry-Perot velocimeter measured a free-surface velocity of 0.13 km/s at a distance of 3 cm and obliquity 70{degree} from the jet, which was moving at an interface velocity of 4.0 km/s at a depth of 29 cm. These values imply a pressure of about 6.6 kbar at that location. The demonstration used micropower impulse radar with a pulse repetition frequency of 0.25 MHz and a cell size of 30 ps to detect and record the motion of a metal penetrator simulant moving inside a cylindrical concrete target.

  7. Angle-resolved photoemission spectroscopy (ARPES) studies of cuprate superconductors

    SciTech Connect (OSTI)

    Palczewski, Ari Deibert

    2010-12-15T23:59:59.000Z

    This dissertation is comprised of three different angle-resolved photoemission spectroscopy (ARPES) studies on cuprate superconductors. The first study compares the band structure from two different single layer cuprates Tl{sub 2}Ba{sub 2}CuO{sub 6+{delta}} (Tl2201) T{sub c,max} {approx} 95 K and (Bi{sub 1.35}Pb{sub 0.85})(Sr{sub 1.47}La{sub 0.38})CuO{sub 6+{delta}} (Bi2201) T{sub c,max} {approx} 35 K. The aim of the study was to provide some insight into the reasons why single layer cuprate's maximum transition temperatures are so different. The study found two major differences in the band structure. First, the Fermi surface segments close to ({pi},0) are more parallel in Tl2201 than in Bi2201. Second, the shadow band usually related to crystal structure is only present in Bi2201, but absent in higher T{sub c} Tl2201. The second study looks at the different ways of doping Bi{sub 2}Sr{sub 2}CaCu{sub 2}O{sub 8+{delta}} (Bi2212) in-situ by only changing the post bake-out vacuum conditions and temperature. The aim of the study is to systematically look into the generally overlooked experimental conditions that change the doping of a cleaved sample in ultra high vacuum (UHV) experiments. The study found two major experimental facts. First, in inadequate UHV conditions the carrier concentration of Bi2212 increases with time, due to the absorption of oxygen from CO{sub 2}/CO molecules, prime contaminants present in UHV systems. Second, in a very clean UHV system at elevated temperatures (above about 200 K), the carrier concentration decreases due to the loss of oxygen atoms from the Bi-O layer. The final study probed the particle-hole symmetry of the pseudogap phase in high temperature superconducting cuprates by looking at the thermally excited bands above the Fermi level. The data showed a particle-hole symmetric pseudogap which symmetrically closes away from the nested FS before the node. The data is consistent with a charge density wave (CDW) origin of the pseudogap, similar to STM checkerboard patterns in the pseudogap state.

  8. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01T23:59:59.000Z

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  9. 3D Atmospheric Radiative Transfer for Cloud System-Resolving Models: Forward Modelling and Observations

    SciTech Connect (OSTI)

    Howard Barker; Jason Cole

    2012-05-17T23:59:59.000Z

    Utilization of cloud-resolving models and multi-dimensional radiative transfer models to investigate the importance of 3D radiation effects on the numerical simulation of cloud fields and their properties.

  10. Automatic Selection of Mask and Arterial Phase Images for Temporally Resolved MR Digital

    E-Print Network [OSTI]

    Zabih, Ramin

    angiography (CEMRA) has become a routine clinical tool for pretreat- ment mapping of vasculature (1). Among data acquisition techniques for CEMRA, the time-resolved strategy offers a very useful option for many

  11. Layer resolved magnetic domain imaging of epitaxial heterostructures in large applied magnetic fields

    E-Print Network [OSTI]

    Zohar, S.; Choi, Y.; Love, D. M.; Mansell, R.; Barnes, C. H. W.; Keavney, D. J.; Rosenberg, R. A.

    2015-02-19T23:59:59.000Z

    We use X-ray Excited Luminescence Microscopy to investigate the elemental and layer resolved magnetic reversal in an interlayer exchange coupled (IEC) epitaxial Fe/Cr wedge/Co heterostructure. The transition from strongly coupled parallel Co...

  12. Resolving Cancer Heterogeneity by Single Cell Sequencing (7th Annual SFAF Meeting, 2012)

    ScienceCinema (OSTI)

    Xu, Xun [BGI

    2013-02-11T23:59:59.000Z

    Xun Xu on "Resolving Cancer Heterogeneity by Single Cell Sequencing" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

  13. Undersampling to accelerate time-resolved MRI velocity measurement of carotid blood flow 

    E-Print Network [OSTI]

    Tao, Yuehui

    2009-01-01T23:59:59.000Z

    Time-resolved velocity information of carotid blood flow can be used to estimate haemodynamic conditions associated with carotid artery disease leading to stroke. MRI provides high-resolution measurement of such information ...

  14. Westinghouse Pays $50,000 Civil Penalty to Resolve Light Bulb...

    Broader source: Energy.gov (indexed) [DOE]

    here. Addthis Related Articles DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another Air-Con Agrees to Pay Civil Penalty to Resolve...

  15. Space-time resolved electrokinetics in cylindrical and semi-cylindrical microchannels

    E-Print Network [OSTI]

    Michele Campisi

    2007-05-03T23:59:59.000Z

    It is shown show how to employ Bessel-Fourier series in order to obtain a complete space-time resolved description of electrokinetic phenomena in cylindrical and semi-cylindrical microfluidic channels.

  16. SciTech Connect: Validations of Time-Resolved X-Ray Emissions...

    Office of Scientific and Technical Information (OSTI)

    Validations of Time-Resolved X-Ray Emissions Spectroscopy for Analysis of Mn-Based Natural and Artifical Sunlight-to-Energy Assemblies Citation Details In-Document Search Title:...

  17. Proceedings of the Fourteenth International Conference on Time-Resolved Vibrational Spectroscopy (TRVS XIV)

    E-Print Network [OSTI]

    Tokmakoff, Andrei

    2011-08-31T23:59:59.000Z

    Abstracts of presentations made at the Fourteenth International Conference on Time-Resolved Vibrational Spectroscopy (TRVS XIV) held May 9-14, 2009 in Meredith, New Hampshire. TRVS is a series of biennial conferences ...

  18. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01T23:59:59.000Z

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  19. Automation of the Laguerre Expansion Technique for Analysis of Time-resolved Fluorescence Spectroscopy Data

    E-Print Network [OSTI]

    Dabir, Aditi Sandeep

    2010-07-14T23:59:59.000Z

    AUTOMATION OF THE LAGUERRE EXPANSION TECHNIQUE FOR ANALYSIS OF TIME-RESOLVED FLUORESCENCE SPECTROSCOPY DATA A Thesis by ADITI SANDEEP DABIR Submitted to the Office of Graduate Studies of Texas A&M University in partial... fulfillment of the requirements for the degree of MASTER OF SCIENCE December 2009 Major Subject: Biomedical Engineering AUTOMATION OF THE LAGUERRE EXPANSION TECHNIQUE FOR ANALYSIS OF TIME-RESOLVED FLUORESCENCE SPECTROSCOPY DATA A Thesis...

  20. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-01-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  1. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  2. ANGLE-RESOLVED PHOTOEMISSION STUDIES OF Ag, Au, AND Pt

    SciTech Connect (OSTI)

    Davis, R.F.; Mills, K.A.; Thornton, G.; Kevan, S.D.; Shirley, D.A.

    1980-06-01T23:59:59.000Z

    An important question regarding the technique of angle-resolved photoemission (ARP) is the extent to which it can be used to determine experimental valence-band dispersion relations E{sub i}({rvec k}) for single crystalline solids. In the case of the 3d and 4d transition metals, studies of copper, nickel, palladium, and silver, show that a model based on the assumption of direct interband transitions (direct-transition model) may be used, in conjunction with an appropriate final-state dispersion relation E{sub f}({rvec k}), to elucidate E{sub i}({rvec k}) for these materials along several high symmetry lines (primarily {Gamma}{Lambda}L) in k-space. To answer this question more generally, we have undertaken an extensive study of the valence band structures of other transition metals along various k-space lines. To date, studies have been extended to the (111) faces of the 5d metals Pt and Au along with the Pt(100) ((5 x 20) surface structure) face, and the (110) and (100) faces of Ag. The experiments were all conducted at SSRL, using synchrotron radiation in the range 6 eV < h{nu} < 34 eV. The results of these studies, combined with our previous Ag(111) work at these energies, allow us to invoke important conclusions concerning the relationships between ARP data, E{sub i}({rvec k}) and E{sub f}({rvec k}) for these materials. Several are summarized. For each crystal face investigated, the direct-transition model, along with a simple quasi-free-electron E{sub f}({rvec k}), was sufficient to determine experimental E{sub i}({rvec k}) relations along the appropriate k-space line that were in general agreement with theoretical RAPW band structure calculations. Essentially, we required E{sub f}({rvec k}) to be of the form (h{sup 2}/2m*)|{rvec k} + {rvec G}|{sup 2} + V{sub o}, where {rvec G} is a reciprocal lattice vector, fitting this relation to the appropriate calculated bulk conduction band near the center of the line under investigation, with the inner potential V{sub o} and the reduced mass m* as free parameters. An additional shift of V{sub o} was necessary for Ag(110) and Pt(100) data, to obtain better agreement with theoretical bands. While generally excellent agreement between experimental and theoretical bands was found for Ag, as was the case for other 3d and 4d metals, substantial disagreement was observed for Pt and Au in parts of the Brillouin zone. This is probably an indication that further theoretical work is needed for these more complicated elements. The agreement in Ag is illustrated by Fig. 1, where experimental and theoretical bands are compared for all three high-symmetry directions. The determinations of E{sub i}({rvec k}) for the {Lambda} directions were relatively simple because peaks in the ARP spectra of (111) faces were essentially all attributable to primary direct transition. However, the {Sigma}, {Sigma}{prime}, and {Delta} directions were complicated by secondary emission peaks and dispersionless density-of-states (DOS) features in the spectra of the (100) and (110) faces. Peak intensity resonances associated with the bulk conduction band structure near {Lambda} were observed for each crystal face, and these simplified the assignment of peaks in the ARP spectra. The relationship between these resonances, which appear to be rather general phenomena, and E{sub f}({rvec k}), will be discussed. In summary, it is clear from these and other studies that the ARP technique, in conjunction with the direct-transition model, is generally applicable to valence band mapping in single crystals, provided that a suitable final-state dispersion relation can be calculated. However, complications like those observed in the ARP spectra of Ag, Pt, and Au may make the determination of E{sub i}({rvec k}) relations considerably more difficult for more complicated systems.

  3. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

    2011-04-08T23:59:59.000Z

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  4. HST resolved image and spectra of z=2 QSO 1345+584

    E-Print Network [OSTI]

    J. B. Hutchings

    1998-04-07T23:59:59.000Z

    The QSO 1345+584 has been spatially resolved by direct images and in spectral images, and has extended flux asymmetrically to the W, where its inner radio structure is seen. The brightest knots in the resolved flux correspond closely with knots in the curved radio jet, and the brightest knot has velocity of approach of some 3000 km/s with respect to the nucleus. Other parts of the line-emitting material appear to follow a systematic velocity field with values up to 1000 km/s with respect to the nucleus. The signal from the resolved continuum is not detected spectroscopically but accounts for 2/3 of the (rest UV) flux, so that it is likely to originate in hot stars. The QSO lies in or behind a compact group of galaxies of comparable brightness and irregular and knotty morphology, which probably form a dense physical group with very young stellar populations.

  5. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  6. Resolving Remoter Nuclear Spins in a Noisy Bath by Dynamical Decoupling Design

    E-Print Network [OSTI]

    Wenchao Ma; Fazhan Shi; Kebiao Xu; Pengfei Wang; Xiangkun Xu; Xing Rong; Chenyong Ju; Chang-Kui Duan; Nan Zhao; Jiangfeng Du

    2015-06-16T23:59:59.000Z

    We experimentally resolve several weakly coupled nuclear spins in diamond using a series of novelly designed dynamical decoupling controls. Some nuclear spin signals, hidden by decoherence under ordinary dynamical decoupling controls, are shifted forward in time domain to the coherence time range and thus rescued from the fate of being submerged by the noisy spin bath. In this way, more and remoter single nuclear spins are resolved. Additionally, the field of detection can be continuously tuned on sub-nanoscale. This method extends the capacity of nanoscale magnetometry and may be applicable in other systems for high-resolution noise spectroscopy.

  7. Time-resolved photoluminescence from defects in n-type GaN

    SciTech Connect (OSTI)

    Reshchikov, M. A., E-mail: mreshchi@vcu.edu [Physics Department, Virginia Commonwealth University, Richmond, Virginia 23284 (United States)

    2014-03-14T23:59:59.000Z

    Point defects in GaN were studied with time-resolved photoluminescence (PL). The effects of temperature and excitation intensity on defect-related PL have been investigated theoretically and experimentally. A phenomenological model, based on rate equations, explains the dependence of the PL intensity on excitation intensity, as well as the PL lifetime and its temperature dependence. We demonstrate that time-resolved PL measurements can be used to find the concentrations of free electrons and acceptors contributing to PL in n-type semiconductors.

  8. Predicting the probability of elevated nitrate concentrations in the Puget Sound Basin: Implications for aquifer susceptibility and vulnerability

    SciTech Connect (OSTI)

    Tesoriero, A.J.; Voss, F.D. [Geological Survey, Tacoma, WA (United States). Water Resources Div.

    1997-11-01T23:59:59.000Z

    The occurrence and distribution of elevated nitrate concentrations in ground water in the Puget Sound Basin, Washington, were determined by examining existing data from more than 3,000 wells. Models that estimate the probability that a well has an elevated nitrate concentration were constructed by relating the occurrence of elevated nitrate concentrations to both natural and anthropogenic variables using logistic regression. The variables that best explain the occurrence of elevated nitrate concentrations were well depth, surficial geology, and the percentage of urban and agricultural land within a radius of 3.2 kilometers of the well. From these relations, logistic regression models were developed to assess aquifer susceptibility and ground-water vulnerability. Both models performed well at predicting the probability of elevated nitrate concentrations in an independent data set. This approach to assessing aquifer susceptibility and ground-water vulnerability has the advantages of having both model variables and coefficient values determined on the basis of existing water quality information and does not depend on the assignment of variables and weighting factors based on qualitative criteria.

  9. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01T23:59:59.000Z

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  10. A Lagrangian VOF tensorial penalty method for the DNS of resolved particle-laden flows.

    E-Print Network [OSTI]

    Boyer, Edmond

    for incompressible flows interacting with resolved particles on a fixed structured grid. A specific Eulerian volume laden flows are simulated, namely the flow across a fixed array of cylinders and the fluidization method, Lagrangian VOF, fluidized beds, collision and lubrication models 1 hal-00678353,version1-12Mar

  11. Distribution and direct radiative forcing of carbonaceous and sulfate aerosols in an interactive size-resolving

    E-Print Network [OSTI]

    Distribution and direct radiative forcing of carbonaceous and sulfate aerosols in an interactive size-resolving aerosol­climate model Dongchul Kim,1 Chien Wang,1 Annica M. L. Ekman,2 Mary C. Barth,3 August 2008. [1] A multimode, two-moment aerosol model has been incorporated in the NCAR CAM3 to develop

  12. Convective-Resolving Regional Climate Simulations for the Amazon Basin: Comparison with TRMM Rainfall Data

    E-Print Network [OSTI]

    Kinney, Nichole 1987-

    2012-08-21T23:59:59.000Z

    the Weather Research and Forecasting (WRF) model are computed at 4-km grid spacing, which reasonably resolves most convective systems. Simulations are computed for both the DJF and MAM seasons as averaged over 2005-2008, with a model domain covering...

  13. Resolving a distribution of charge into intrinsic multipole moments: A rankwise distributed multipole analysis

    E-Print Network [OSTI]

    Bourne, Philip E.

    Resolving a distribution of charge into intrinsic multipole moments: A rankwise distributed multipole analysis Apostol Gramada* and Philip E. Bourne Skaggs School of Pharmacy and Pharmaceutical multipole analysis of an arbitrary distribution of charge and its surrounding field. Using the superposition

  14. Deep and optically resolved imaging through scattering media by space-reversed propagation

    E-Print Network [OSTI]

    Peyré, Gabriel

    Deep and optically resolved imaging through scattering media by space-reversed propagation W to the objective working distance. By combining Laser Optical Feedback Imaging (LOFI) with Acoustic Photon Taging. © 2010 Optical Society of America OCIS Codes: (090.1995) , (170.0110), (170.1065), (180.1790), (290

  15. Vibrationally resolved transitions in ion-molecule and atom-molecular ion slow collisions

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The data tables and interactive graphs made available here contain theoretical integral cross sections for vibrational excitation and vibrationally resolved charge transfer from vibrationally excited states of H2 and H2+ with protons and hydrogen atoms, respectively. [From http://www-cfadc.phy.ornl.gov/h2mol/home.html] (Specialized Interface)

  16. http://resolver.caltech.edu/CaltechOH:OH_Mead_C CARVER A. MEAD

    E-Print Network [OSTI]

    http://resolver.caltech.edu/CaltechOH:OH_Mead_C CARVER A. MEAD (1934­ ) INTERVIEWED BY SHIRLEY K in the 1960s with Amnon Yariv and Charles Wilts. Discusses his friendship with Gordon Moore and work on design must be submitted in writing to the University Archivist. Preferred citation Mead, Carver A. Interview

  17. Measuring sheet resistance of CIGS solar cell's window layer by spatially resolved electroluminescence imaging

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1/12 Measuring sheet resistance of CIGS solar cell's window layer by spatially resolved model to simulate the behavior of CIGS solar cells based on the spread sheet resistance effect on the determination of the window layer sheet resistance in CIGS solar cells, but our approach could be transferred

  18. Time-resolved photoelectron imaging of large anionic methanol clusters: ,,Methanol...n

    E-Print Network [OSTI]

    Neumark, Daniel M.

    Time-resolved photoelectron imaging of large anionic methanol clusters: ,,Methanol...n - ,,nÈ145; published online 27 June 2007 The dynamics of an excess electron in size-selected methanol clusters electron6­11 and its cluster counterparts,12­18 water n - . The solvated electron in liquid methanol has

  19. Fossil mammals resolve regional patterns of Eurasian climate change over 20 million years

    E-Print Network [OSTI]

    Jernvall, Jukka

    Fossil mammals resolve regional patterns of Eurasian climate change over 20 million years Mikael Institute, Russian Academy of Sciences, Moscow, Russia and 7 Department of Geography, Beijing University proxy that can be used to constrain the regional details of vegetation and climate models. Keywords

  20. The archetypal one-neutron halo nucleus 11Be: controversy resolved.

    E-Print Network [OSTI]

    over the purity of states in 11Be resolved using measurements at different energies. · Impressive statistics and resolution achieved using a "batch-mode" beam of the long-lived isotope 10Be. · Transfer, 865-974-4022, kgrzywac@utk.edu Funding sources: DOE Office of Science, Office of Nuclear Physics

  1. Molecularly Resolved Images of Peptide-Functionalized Gold Surfaces by Scanning Tunneling Microscopy

    E-Print Network [OSTI]

    Webb, Lauren J.

    Molecularly Resolved Images of Peptide-Functionalized Gold Surfaces by Scanning Tunneling propargylglycine unnatural functional groups 20 Å apart and an alkanethiol self-assembled monolayer (SAM) on a gold-terminated surfaces were imaged by scanning tunneling microscopy (STM) using a low tunneling current of 10 p

  2. Structure in Nascent Carbon Nanotubes Revealed by Spatially Resolved Raman Spectroscopy

    E-Print Network [OSTI]

    or filtration [1], supercapacitors [2], composite materials [3,4]. They are mainly prepared by CVD (Chemical1 Structure in Nascent Carbon Nanotubes Revealed by Spatially Resolved Raman Spectroscopy Périne: The understanding of carbon nanotubes (CNT) growth is crucial for the control of their production. In particular

  3. Conceptual understanding of climate change with a globally resolved energy balance model

    E-Print Network [OSTI]

    Dommenget, Dietmar

    Conceptual understanding of climate change with a globally resolved energy balance model Dietmar on the surface energy balance by very simple repre- sentations of solar and thermal radiation, the atmospheric and cold regions to warm more than other regions. Keywords Climate dynamics Á Climate change Á Climate

  4. The uses of alternative dispute resolution to resolve genetic disputes. Final report

    SciTech Connect (OSTI)

    Stein, Robert E.

    2003-01-01T23:59:59.000Z

    The report sets out lessons learned while carrying out the study. It concludes that genetic disputes will increase in number and that ADR processes including mediation, arbitration, the use of independent experts and court-appointed masters can be helpful in resolving them. It suggests additional effort on bioremediation, and workplace disputes and training for ADR neutrals.

  5. Time-Resolved Magnetic Flux and AC-Current Distributions in Superconducting YBCO Thin Films and

    E-Print Network [OSTI]

    Shaw, Leah B.

    Time-Resolved Magnetic Flux and AC-Current Distributions in Superconducting YBCO Thin Films magnetic field. We study the interaction behavior of YBCO thin films in an ac transport current and a dc the calibrated field profiles. The current density evolution in YBCO thin films is studied by TRMOI as a function

  6. Theoretical studies of time-resolved spectroscopy of protein Jonathan D. Hirst,*a

    E-Print Network [OSTI]

    Onufriev, Alexey

    Theoretical studies of time-resolved spectroscopy of protein folding Jonathan D. Hirst,*a Samita desirable as theoretical and experimental studies begin to probe protein folding events reliably on the nanosecond timescale. Introduction Protein folding is generally rapid and strongly co-operative.1,2 Knowledge

  7. ZERO ENERGY ASYMPTOTICS OF THE RESOLVENT IN THE LONG RANGE CASE

    E-Print Network [OSTI]

    Skibsted, Erik

    ZERO ENERGY ASYMPTOTICS OF THE RESOLVENT IN THE LONG RANGE CASE S. FOURNAIS AND E. SKIBSTED at zero energy, for a much wider class of potentials. Our basic assumption is a sign condition at infinity at zero energy for a SchrË?odinger operator H = -# + V on H = L 2 (R d ) recalling the notation R(#) = (H

  8. Resolving unwanted couplings through interactive exploration of co-evolving software entities An experience report

    E-Print Network [OSTI]

    van Vliet, Hans

    how interactive visualizations can support the process of analyzing the identified unwanted couplings of coupling between entities is then replaced by a more dynamic one. Entities that change together becauseResolving unwanted couplings through interactive exploration of co-evolving software entities

  9. Compact cryogenic Kerr microscope for time-resolved studies of electron spin transport in microstructures

    E-Print Network [OSTI]

    van der Wal, Caspar H.

    Compact cryogenic Kerr microscope for time-resolved studies of electron spin transport with 1 m spatial resolution. The microscope was designed to study spin transport, a critical issue-temperature optical microscope, elec- tromagnet and cryogenic cell with cold finger to measure continuous-wave cw

  10. THE JOURNAL OF CHEMICAL PHYSICS 139, 124113 (2013) Time-resolved broadband Raman spectroscopies: A unified

    E-Print Network [OSTI]

    Mukamel, Shaul

    2013-01-01T23:59:59.000Z

    be defined as a change of the energy of the electromagnetic field S = - dt d dt a i (t)ai(t) = I 2 ¯ - dt and frequency resolved Raman techniques have been developed towards monitoring ex- cited and ground state the system with pulse Ej and deex- cites it with E i . We use complex pulse amplitudes. The elec- tronically

  11. Spatially resolved photoluminescence and Raman scattering experiments on the GaN/substrate interface

    E-Print Network [OSTI]

    Nabben, Reinhard

    Spatially resolved photoluminescence and Raman scattering experiments on the GaN experiments on the substrate interface region of wurtzite GaN layers. We show that the broad photoluminescence band with an intensity maximum at 2.4 eV is not an intrinsic property of GaN. We found

  12. Simulating the evolution of soot mixing state with a particle-resolved aerosol model

    E-Print Network [OSTI]

    West, Matthew

    to simulate the evolution of carbonaceous aerosols of different types due to coagulation and condensation moreover depended on the amount of sulfur in the fuel, and the size distribution and composition typicallySimulating the evolution of soot mixing state with a particle-resolved aerosol model N. Riemer,1 M

  13. Understanding global secondary organic aerosol amount and size-resolved condensational behavior

    E-Print Network [OSTI]

    Understanding global secondary organic aerosol amount and size-resolved condensational behavior and Adams, 2009b) ·Condensation, coagulation, nucleation ·40 size bins (1 nm ­ 10 µm) ·Nucleation rates the aerosol mass distribution. However, recent closure studies with field measurements show that a significant

  14. Time-resolved dynamics in acetonitrile cluster anions CH3CN Ryan M. Young a

    E-Print Network [OSTI]

    Neumark, Daniel M.

    Time-resolved dynamics in acetonitrile cluster anions ðCH3CN�� n Ryan M. Young a , Graham B December 2009 a b s t r a c t Excited state dynamics of acetonitrile cluster anions, ðCH3CN�� n , were, antiparallel solvent molecules [19,20]. Evidence for two electron solvation motifs in acetonitrile also comes

  15. Resolving Isomeric Peptide Mixtures: A Combined HPLC/Ion Mobility-TOFMS Analysis of a

    E-Print Network [OSTI]

    Clemmer, David E.

    of the relatively low density of the buffer gas (compared with condensed-phase separations), mobilities of ions to incorporate the gas-phase separation between condensed-phase separation methods and MS detectionResolving Isomeric Peptide Mixtures: A Combined HPLC/Ion Mobility-TOFMS Analysis of a 4000

  16. Meyers DR-1 GSA Data Repository Item for: "Resolving Milankovitchian Controversies

    E-Print Network [OSTI]

    Meyers, Stephen R.

    Meyers DR-1 GSA Data Repository Item for: "Resolving Milankovitchian Controversies: The Triassic Latemar Limestone and the Eocene Green River Formation" Stephen R. Meyers Department of Geological" (Meyers, 2008). Topics addressed here include: (1) an introduction to the ASM methodology, (2) specific

  17. Spectroscopic Properties of a Self-Assembled Zinc Porphyrin Tetramer II. Time-Resolved Fluorescence Spectroscopy

    E-Print Network [OSTI]

    van Stokkum, Ivo

    Spectroscopic Properties of a Self-Assembled Zinc Porphyrin Tetramer II. Time-Resolved Fluorescence tetramer [Part I], with a 1 ns rotational correlation time at 10 °C. The initial fluorescence anisotropy of the monomer is found to be 0.1. In the tetramer an additional depolarization process occurs with a correlation

  18. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wolfsberg, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Macknick, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Middleton, Richard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01T23:59:59.000Z

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  19. Laser wavelength effects on the charge state resolved ion energy distributions from laser-produced Sn plasma

    E-Print Network [OSTI]

    Najmabadi, Farrokh

    Laser wavelength effects on the charge state resolved ion energy distributions from laser of laser wavelength on the charge state resolved ion energy distributions from laser-produced Sn plasma freely expanding into vacuum are investigated. Planar Sn targets are irradiated at laser wavelengths

  20. Excited electron dynamics in bulk ytterbium: Time-resolved two-photon photoemission and GW+T ab initio calculations

    E-Print Network [OSTI]

    Aeschlimann, Martin

    relaxation dynamics is played by the electronic structure of the system close to the Fermi level. For exampleExcited electron dynamics in bulk ytterbium: Time-resolved two-photon photoemission and GW+T ab November 2007 The excited electron dynamics in ytterbium is investigated by means of the time-resolved two

  1. http://resolver.caltech.edu/CaltechOH:OH_Gell-Mann_M Photo ID RFB70.2-4

    E-Print Network [OSTI]

    Dervan, Peter B.

    http://resolver.caltech.edu/CaltechOH:OH_Gell-Mann_M Photo ID RFB70.2-4 MURRAY GELL-MANN (b. 1929, with Murray Gell-Mann, Robert Andrews Millikan Professor of Theoretical Physics, emeritus. Dr. Gell Wasserburg; works on dispersion relations and pseudoscalar meson theory #12;http://resolver.caltech.edu/CaltechOH:OH_Gell

  2. Topological Performance Measures as Surrogates for Physical Flow Models for Risk and Vulnerability Analysis for Electric Power Systems

    E-Print Network [OSTI]

    LaRocca, Sarah; Hassel, Henrik; Guikema, Seth

    2013-01-01T23:59:59.000Z

    Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist which can be used to this end. However, there are relatively few studies comparing the implications of using different modeling approaches in the context of comprehensive risk analysis of critical infrastructures. Thus in this paper, we suggest a classification of these models, which span from simple topologically-oriented models to advanced physical flow-based models. Here, we focus on electric power systems and present a study aimed at understanding the tradeoffs between simplicity and fidelity in models used in the context of risk analysis. Specifically, the purpose of this pa...

  3. Method for enhancing the resolving power of ion mobility separations over a limited mobility range

    DOE Patents [OSTI]

    Shvartsburg, Alexandre A; Tang, Keqi; Smith, Richard D

    2014-09-23T23:59:59.000Z

    A method for raising the resolving power, specificity, and peak capacity of conventional ion mobility spectrometry is disclosed. Ions are separated in a dynamic electric field comprising an oscillatory field wave and opposing static field, or at least two counter propagating waves with different parameters (amplitude, profile, frequency, or speed). As the functional dependencies of mean drift velocity on the ion mobility in a wave and static field or in unequal waves differ, only single species is equilibrated while others drift in either direction and are mobility-separated. An ion mobility spectrum over a limited range is then acquired by measuring ion drift times through a fixed distance inside the gas-filled enclosure. The resolving power in the vicinity of equilibrium mobility substantially exceeds that for known traveling-wave or drift-tube IMS separations, with spectra over wider ranges obtainable by stitching multiple segments. The approach also enables low-cutoff, high-cutoff, and bandpass ion mobility filters.

  4. Revealing Carrier-Envelope Phase through Frequency Mixing and Interference in Frequency Resolved Optical Gating

    E-Print Network [OSTI]

    Snedden, Edward W; Jamison, Steven P

    2015-01-01T23:59:59.000Z

    We demonstrate that full temporal characterisation of few-cycle electromagnetic pulses, including retrieval of the carrier envelope phase (CEP), can be directly obtained from Frequency Resolved Optical Gating (FROG) techniques in which the interference between non-linear frequency mixing processes is resolved. We derive a framework for this scheme, defined Real Domain-FROG (ReD-FROG), as applied to the cases of interference between sum and difference frequency components and between fundamental and sum/difference frequency components. A successful numerical demonstration of ReD-FROG as applied to the case of a self-referenced measurement is provided. A proof-of-principle experiment is performed in which the CEP of a single-cycle THz pulse is accurately obtained and demonstrates the possibility for THz detection beyond the bandwidth limitations of electro-optic sampling.

  5. Time-resolved fuel injector flow characterisation based on 3D laser Doppler vibrometry

    E-Print Network [OSTI]

    Crua, Cyril

    2015-01-01T23:59:59.000Z

    In order to enable investigations of the fuel flow inside unmodified injectors, we have developed a new experimental approach to measure time-resolved vibration spectra of diesel nozzles using a three dimensional laser vibrometer. The technique we propose is based on the triangulation of the vibrometer and fuel pressure transducer signals, and enables the quantitative characterisation of quasi-cyclic internal flows without requiring modifications to the injector, the working fluid, or limiting the fuel injection pressure. The vibrometer, which uses the Doppler effect to measure the velocity of a vibrating object, was used to scan injector nozzle tips during the injection event. The data were processed using a discrete Fourier transform to provide time-resolved spectra for valve-closed-orifice, minisac and microsac nozzle geometries, and injection pressures ranging from 60 to 160MPa, hence offering unprecedented insight into cyclic cavitation and internal mechanical dynamic processes. A peak was consistently f...

  6. A new method for deriving the stellar birth function of resolved stellar populations

    E-Print Network [OSTI]

    Gennaro, Mario; Brown, Tom; Gordon, Karl

    2015-01-01T23:59:59.000Z

    We present a new method for deriving the stellar birth function (SBF) of resolved stellar populations. The SBF (stars born per unit mass, time, and metallicity) is the combination of the initial mass function (IMF), the star-formation history (SFH), and the metallicity distribution function (MDF). The framework of our analysis is that of Poisson Point Processes (PPPs), a class of statistical models suitable when dealing with points (stars) in a multidimensional space (the measurement space of multiple photometric bands). The theory of PPPs easily accommodates the modeling of measurement errors as well as that of incompleteness. Compared to most of the tools used to study resolved stellar populations, our method avoids binning stars in the color-magnitude diagram and uses the entirety of the information (i.e., the whole likelihood function) for each data point; the proper combination of the individual likelihoods allows the computation of the posterior probability for the global population parameters. This inc...

  7. Angle-resolved scattering spectroscopy of explosives using an external cavity quantum cascade laser

    SciTech Connect (OSTI)

    Suter, Jonathan D.; Bernacki, Bruce E.; Phillips, Mark C.

    2012-04-01T23:59:59.000Z

    Investigation of angle-resolved scattering from solid explosives residues on a car door for non-contact sensing geometries. Illumination with a mid-infrared external cavity quantum cascade laser tuning between 7 and 8 microns was detected both with a sensitive single point detector and a hyperspectral imaging camera. Spectral scattering phenomena were discussed and possibilities for hyperspectral imaging at large scattering angles were outlined.

  8. Enforcement actions: Significant actions resolved; Quarterly progress report, October--December 1993: Volume 12, No. 4

    SciTech Connect (OSTI)

    NONE

    1994-03-01T23:59:59.000Z

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

  9. FROM RESOLVENT ESTIMATES TO DAMPED WAVES HANS CHRISTIANSON, EMMANUEL SCHENCK, ANDRAS VASY, AND JARED WUNSCH

    E-Print Network [OSTI]

    Vasy, András

    On a compact, connected Riemannian manifold without boundary (X, g), we consider the non-selfadjoint Schr of the resolvent of P(h), Rz(h) := (P(h) - z)-1 for z in a complex h-dependent neighborhood of 1. For non with the rate of the energy decay of the solution of the damped wave equation on X : (1.2) 2 t + g + a(x)t u

  10. Frequency Resolved Nanoscale Chemical Imaging of 4,4'-Dimercaptostilbene on Silver

    SciTech Connect (OSTI)

    El-Khoury, Patrick Z.; Ueltschi, Tyler W.; Mifflin, Amanda L.; Hu, Dehong; Hess, Wayne P.

    2014-11-26T23:59:59.000Z

    Non-resonant tip-enhanced Raman images of 4,4'-dimercaptostilbene on silver reveal that different vibrational resonances of the reporter are selectively enhanced at different sites on the metal substrate. Sequentially recorded images track molecular diffusion within the diffraction-limited laser spot which illuminates the substrate. In effect, the recorded time resolved (?t = 10 s) pixelated images (25 nm x 8 cm-1) broadcast molecule-local field interactions which take place on much finer scales.

  11. High-harmonic XUV source for time- and angle-resolved photoemission spectroscopy

    SciTech Connect (OSTI)

    Dakovski, Georgi L [Los Alamos National Laboratory; Li, Yinwan [Los Alamos National Laboratory; Durakiewicz, Tomasz [Los Alamos National Laboratory; Rodriguez, George [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    We present a laser-based apparatus for visible pump/XUV probe time- and angle-resolved photoemission spectroscopy (TRARPES) utilizing high-harmonic generation from a noble gas. Femtosecond temporal resolution for each selected harmonic is achieved by using a time-delay-compensated monochromator (TCM). The source has been used to obtain photoemission spectra from insulators (UO{sub 2}) and ultrafast pump/probe processes in semiconductors (GaAs).

  12. Absolute calibration of photon-number-resolving detectors with an analog output using twin beams

    SciTech Connect (OSTI)

    Pe?ina, Jan, E-mail: jan.perina.jr@upol.cz [RCPTM, Joint Laboratory of Optics of Palacký University and Institute of Physics AS CR, 17. listopadu 12, 77146 Olomouc (Czech Republic); Haderka, Ond?ej [Joint Laboratory of Optics of Palacký University and Institute of Physics AS CR, 17. listopadu 12, 771 46 Olomouc (Czech Republic); Allevi, Alessia [Dipartimento di Scienza e Alta Tecnologia, Università degli Studi dell'Insubria, I-22100 Como (Italy); Bondani, Maria [Istituto di Fotonica e Nanotecnologie, CNR-IFN, I-22100 Como (Italy)

    2014-01-27T23:59:59.000Z

    A method for absolute calibration of a photon-number resolving detector producing analog signals as the output is developed using a twin beam. The method gives both analog-to-digital conversion parameters and quantum detection efficiency for the photon fields. Characteristics of the used twin beam are also obtained. A simplified variant of the method applicable to fields with high signal to noise ratios and suitable for more intense twin beams is suggested.

  13. Resolving the ambiguities: An industrial hygiene Indoor Air Quality (IAQ) symposium

    SciTech Connect (OSTI)

    Gammage, R.B.

    1995-01-01T23:59:59.000Z

    Resolving the Ambiguities: An Industrial Hygiene (IAQ) Symposium was a one-day event designed to inform practicing industrial hygienists about highlight presentations made at Indoor Air `93. A broad range of topics was presented by invited speakers. Topics included were attempts to deal with guidelines and standards, questionnaires, odors and sensory irritation, respiratory allergies, neuroses, sick building syndrome (SBS), and multiple chemical sensitivity (MCS).

  14. ZERO ENERGY ASYMPTOTICS OF THE RESOLVENT FOR A CLASS OF SLOWLY DECAYING POTENTIALS

    E-Print Network [OSTI]

    ZERO ENERGY ASYMPTOTICS OF THE RESOLVENT FOR A CLASS OF SLOWLY DECAYING POTENTIALS S. FOURNAIS and on the possible existence of zero­energy eigenstates and/or a re­ sonance state. For the `long­range' case, V (x AND E. SKIBSTED Abstract. We prove a limiting absorption principle at zero en­ ergy for two­body Schr

  15. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  16. D-brane Potentials in the Warped Resolved Conifold and Natural Inflation

    E-Print Network [OSTI]

    Zachary Kenton; Steven Thomas

    2015-02-27T23:59:59.000Z

    In this paper we obtain a model of Natural Inflation from string theory with a Planckian decay constant. We investigate D-brane dynamics in the background of the warped resolved conifold (WRC) throat approximation of Type IIB string compactifications on Calabi-Yau manifolds. When we glue the throat to a compact bulk Calabi-Yau, we generate a D-brane potential which is a solution to the Laplace equation on the resolved conifold. We can exactly solve this equation, including dependence on the angular coordinates. The solutions are valid down to the tip of the resolved conifold, which is not the case for the more commonly used deformed conifold. This allows us to exploit the effect of the warping, which is strongest at the tip. We inflate near the tip using an angular coordinate of a D5-brane in the WRC which has a discrete shift symmetry, and feels a cosine potential, giving us a model of Natural Inflation, from which it is possible to get a Planckian decay constant whilst maintaining control over the backreaction. This is because the decay constant for a wrapped brane contains powers of the warp factor, and so can be made large, while the wrapping parameter can be kept small enough so that backreaction is under control.

  17. Measuring the x-ray resolving power of bent potassium acid phthalate diffraction crystals

    SciTech Connect (OSTI)

    Haugh, M. J., E-mail: haughmj@nv.doe.gov; Jacoby, K. D. [National Security Technologies, LLC, Livermore, California 94550 (United States); Wu, M.; Loisel, G. P. [Sandia National Laboratories, Albuquerque, New Mexico 87123 (United States)

    2014-11-15T23:59:59.000Z

    This report presents the results from measuring the X-ray resolving power of a curved potassium acid phthalate (KAP(001)) spectrometer crystal using two independent methods. It is part of a continuing effort to measure the fundamental diffraction properties of bent crystals that are used to study various characteristics of high temperature plasmas. Bent crystals like KAP(001) do not usually have the same diffraction properties as corresponding flat crystals. Models that do exist to calculate the effect of bending the crystal on the diffraction properties have simplifying assumptions and their accuracy limits have not been adequately determined. The type of crystals that we measured is being used in a spectrometer on the Z machine at Sandia National Laboratories in Albuquerque, New Mexico. The first technique for measuring the crystal resolving power measures the X-ray spectral line width of the characteristic lines from several metal anodes. The second method uses a diode X-ray source and a double crystal diffractometer arrangement to measure the reflectivity curve of the KAP(001) crystal. The width of that curve is inversely proportional to the crystal resolving power. The measurement results are analyzed and discussed.

  18. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

  19. Time-resolved spectroscopy on epitaxial graphene in the infrared spectral range: relaxation dynamics and saturation behavior

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Time-resolved spectroscopy on epitaxial graphene in the infrared spectral range: relaxation graphene samples performed in a wide spectral range, namely from the near signatures of the highly doped graphene layers at the interface to Si

  20. Flammable Gas Refined Safety Analysis Tool Software Verification and Validation Report for Resolve Version 2.5

    SciTech Connect (OSTI)

    BRATZEL, D.R.

    2000-09-28T23:59:59.000Z

    The purpose of this report is to document all software verification and validation activities, results, and findings related to the development of Resolve Version 2.5 for the analysis of flammable gas accidents in Hanford Site waste tanks.

  1. Pixel Array Detector for Time-Resolved X-ray Science, September 1, 1997 - September 14, 2000

    SciTech Connect (OSTI)

    Gruner, Sol M.

    2000-11-07T23:59:59.000Z

    Progress on the design, fabrication, testing and assembly of two-layer Pixel Array Detectors (PADs) is described. The PADs are developed for challenging time-resolved X-ray imaging applications at synchrotron radiation X-ray sources.

  2. Absolute spin calibration of an electron spin polarimeter by spin-resolved photoemission from the Au(111) surface states

    SciTech Connect (OSTI)

    Cacho, Cephise M. [Sincrotrone Trieste, Strada Statale 14, km 163,5 in AREA Science Park, 34012 Basovizza, Trieste (Italy); Photon Science Department, Science and Technology Facilities Council, Daresbury WA4 4AD (United Kingdom); Vlaic, Sergio [Dipartimento di Fisica, Universita di Trieste, via Valerio 2, 34127 Trieste (Italy); Malvestuto, Marco; Ressel, Barbara [Sincrotrone Trieste, Strada Statale 14, km 163,5 in AREA Science Park, 34012 Basovizza, Trieste (Italy); Seddon, Elaine A. [Photon Science Department, Science and Technology Facilities Council, Daresbury WA4 4AD (United Kingdom); Parmigiani, Fulvio [Sincrotrone Trieste, Strada Statale 14, km 163,5 in AREA Science Park, 34012 Basovizza, Trieste (Italy); Dipartimento di Fisica, Universita di Trieste, via Valerio 2, 34127 Trieste (Italy)

    2009-04-15T23:59:59.000Z

    Here we report the absolute characterization of a spin polarimeter by measuring the Sherman function with high precision. These results have been obtained from the analysis of the spin and angle-resolved photoemission spectra of Au(111) surface states. The measurements have been performed with a 250 kHz repetition rate Ti:sapphire amplified laser system combined with a high energy-, angle-, and spin-resolving time-of-flight electron spectrometer.

  3. Role of electron-electron interference in ultrafast time-resolved imaging of electronic wavepackets

    SciTech Connect (OSTI)

    Dixit, Gopal [Center for Free-Electron Laser Science, DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Santra, Robin [Center for Free-Electron Laser Science, DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Department of Physics, University of Hamburg, D-20355 Hamburg (Germany)

    2013-04-07T23:59:59.000Z

    Ultrafast time-resolved x-ray scattering is an emerging approach to image the dynamical evolution of the electronic charge distribution during complex chemical and biological processes in real-space and real-time. Recently, the differences between semiclassical and quantum-electrodynamical (QED) theory of light-matter interaction for scattering of ultrashort x-ray pulses from the electronic wavepacket were formally demonstrated and visually illustrated by scattering patterns calculated for an electronic wavepacket in atomic hydrogen [G. Dixit, O. Vendrell, and R. Santra, Proc. Natl. Acad. Sci. U.S.A. 109, 11636 (2012)]. In this work, we present a detailed analysis of time-resolved x-ray scattering from a sample containing a mixture of non-stationary and stationary electrons within both the theories. In a many-electron system, the role of scattering interference between a non-stationary and several stationary electrons to the total scattering signal is investigated. In general, QED and semiclassical theory provide different results for the contribution from the scattering interference, which depends on the energy resolution of the detector and the x-ray pulse duration. The present findings are demonstrated by means of a numerical example of x-ray time-resolved imaging for an electronic wavepacket in helium. It is shown that the time-dependent scattering interference vanishes within semiclassical theory and the corresponding patterns are dominated by the scattering contribution from the time-independent interference, whereas the time-dependent scattering interference contribution do not vanish in the QED theory and the patterns are dominated by the scattering contribution from the non-stationary electron scattering.

  4. Enforcement actions: Significant actions resolved material licensees. Quarterly progress report, April 1995--June 1995

    SciTech Connect (OSTI)

    NONE

    1995-08-01T23:59:59.000Z

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1995) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to material licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

  5. Time-resolved measurements of double layer evolution in expanding plasma

    SciTech Connect (OSTI)

    Scime, E. E.; Biloiu, I. A.; Carr, J. Jr.; Thakur, S. Chakraborty; Galante, M.; Hansen, A.; Houshmandyar, S.; Keesee, A. M.; McCarren, D.; Sears, S. [Department of Physics, West Virginia University, Morgantown, West Virginia 26506 (United States); Biloiu, C. [Varian Associates, Gloucester, Massachusetts 01930 (United States); Sun, X. [Tri-Alpha Corporation, Foothill Ranch, California 92610 (United States)

    2010-05-15T23:59:59.000Z

    Observations in steady-state plasmas confirm predictions that formation of a current-free double layer in a plasma expanding into a chamber of larger diameter is accompanied by an increase in ionization upstream of the double layer. The upstream plasma density increases sharply at the same driving frequency at which a double layer appears. For driving frequencies at which no double layer appears, large electrostatic instabilities are observed. Time-resolved measurements in pulsed discharges indicate that the double layer initially forms for all driving frequencies. However, for particularly strong double layers, instabilities appear early in the discharge and the double layer collapses.

  6. Enforcement actions: Significant actions resolved reactor licensees. Semiannual progress report, July 1996--December 1996

    SciTech Connect (OSTI)

    NONE

    1997-04-01T23:59:59.000Z

    This compilation summarizes significant enforcement actions that have been resolved during the period (July-December 1996) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to reactor licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

  7. Time-Resolved Imaging and Manipulation of H{sub 2} Fragmentation in Intense Laser Fields

    SciTech Connect (OSTI)

    Ergler, Th.; Rudenko, A.; Feuerstein, B.; Zrost, K.; Schroeter, C.D.; Moshammer, R.; Ullrich, J. [Max-Planck-Institut fuer Kernphysik, D-69029 Heidelberg (Germany)

    2005-08-26T23:59:59.000Z

    We report on the experimental realization of time-resolved coincident Coulomb explosion imaging of H{sub 2} fragmentation in 10{sup 14} W/cm{sup 2} laser fields. Combining a high-resolution 'reaction microscope' and a fs pump-probe setup, we map the motion of wave packets dissociating via one- or two-photon channels, respectively, and observe a new region of enhanced ionization. The long-term interferometric stability of our system allows us to extend pump-probe experiments into the region of overlapping pulses, which offers new possibilities for the manipulation of ultrafast molecular fragmentation dynamics.

  8. Direct Surface Analysis of Time-Resolved Aerosol Impactor Samples with Ultrahigh-Resolution Mass Spectrometry

    E-Print Network [OSTI]

    Fuller, Stephen J.; Zhao, Yongjing; Cliff, Steven S.; Wexler, Anthony S.; Kalberer, Markus

    2012-10-18T23:59:59.000Z

    was assumed to be correct. Unfortunately due to the generally low peak intensities of the identified species MS-MS analysis for further structural identification was not possible. Only about 10-15% of the peaks contain a sulfur atom and are not further... 1 Direct surface analysis of time-resolved aerosol impactor samples with ultra-high resolution mass spectrometry Stephen J. Fuller 1, Yongjing Zhao2, Steven S. Cliff2, Anthony S. Wexler2, Markus Kalberer 1* 1 University of Cambridge, Department...

  9. Spatially resolvable optical emission spectrometer for analyzing density uniformity of semiconductor process plasma

    SciTech Connect (OSTI)

    Oh, Changhoon; Ryoo, Hoonchul; Lee, Hyungwoo; Hahn, Jae W. [Nano Photonics Laboratory, School of Mechanical Engineering, Yonsei University, 134 Sinchon-dong, Seodaemun-gu, Seoul 120-749 (Korea, Republic of); Kim, Se-Yeon; Yi, Hun-Jung [Manufacturing Technology Team, Memory Division, Semiconductor Business, Samsung Electronics, Hwasung-City, Gyeonggi-do 445-701 (Korea, Republic of)

    2010-10-15T23:59:59.000Z

    We proposed a spatially resolved optical emission spectrometer (SROES) for analyzing the uniformity of plasma density for semiconductor processes. To enhance the spatial resolution of the SROES, we constructed a SROES system using a series of lenses, apertures, and pinholes. We calculated the spatial resolution of the SROES for the variation of pinhole size, and our calculated results were in good agreement with the measured spatial variation of the constructed SROES. The performance of the SROES was also verified by detecting the correlation between the distribution of a fluorine radical in inductively coupled plasma etch process and the etch rate of a SiO{sub 2} film on a silicon wafer.

  10. Time-resolved energy transfer from single chloride-terminated nanocrystals to graphene

    SciTech Connect (OSTI)

    Ajayi, O. A., E-mail: oaa2114@columbia.edu, E-mail: cww2104@columbia.edu; Wong, C. W., E-mail: oaa2114@columbia.edu, E-mail: cww2104@columbia.edu [Optical Nanostructures Laboratory, Center for Integrated Science and Engineering, Solid-State Science and Engineering, Columbia University, New York, New York 10027 (United States); Department of Mechanical Engineering, Columbia University, New York, New York 10027 (United States); Anderson, N. C.; Wolcott, A.; Owen, J. S. [Department of Chemistry, Columbia University, New York, New York 10027 (United States); Cotlet, M. [Brookhaven National Laboratory, Upton, New York, New York 11973 (United States); Petrone, N.; Hone, J. [Department of Mechanical Engineering, Columbia University, New York, New York 10027 (United States); Gu, T.; Gesuele, F. [Optical Nanostructures Laboratory, Center for Integrated Science and Engineering, Solid-State Science and Engineering, Columbia University, New York, New York 10027 (United States)

    2014-04-28T23:59:59.000Z

    We examine the time-resolved resonance energy transfer of excitons from single n-butyl amine-bound, chloride-terminated nanocrystals to two-dimensional graphene through time-correlated single photon counting. The radiative biexponential lifetime kinetics and blinking statistics of the individual surface-modified nanocrystal elucidate the non-radiative decay channels. Blinking modification as well as a 4× reduction in spontaneous emission were observed with the short chloride and n-butylamine ligands, probing the energy transfer pathways for the development of graphene-nanocrystal nanophotonic devices.

  11. Enforcement actions: Significant actions resolved. Quarterly progress report, April--June 1993: Volume 12, No. 2

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

  12. On the spectrum of non-selfadjoint Schrödinger operators with compact resolvent

    E-Print Network [OSTI]

    Yaniv Almog; Bernard Helffer

    2014-10-19T23:59:59.000Z

    We determine the Schatten class for the compact resolvent of Dirichlet realizations, in unbounded domains, of a class of non-selfadjoint differential operators. This class consists of operators that can be obtained via analytic dilation from a Schr\\"odinger operator with magnetic field and a complex electric potential. As an application, we prove, in a variety of examples motivated by Physics, that the system of generalized eigenfunctions associated with the operator is complete, or at least the existence of an infinite discrete spectrum.

  13. Space- and Time-Resolved Mapping of Ionic Dynamic and Electroresistive Phenomena in Lateral Devices

    SciTech Connect (OSTI)

    Strelcov, Evgheni [ORNL; Jesse, Stephen [ORNL; Yen-Lin, Huang [National Chiao Tung University, Hsinchu, Taiwan; Yung-Chun, Teng [National Chiao Tung University, Hsinchu, Taiwan; Kravchenko, Ivan I [ORNL; Ying-Hao, Chu [National Chiao Tung University, Hsinchu, Taiwan; Kalinin, Sergei V [ORNL

    2013-01-01T23:59:59.000Z

    A novel scanning probe microscopy (SPM) based technique for probing local ionic and electronic transport and their dynamic behavior on the 10 ms 10 s scale is presented. The time-resolved Kelvin Probe Force Microscopy (tr-KPFM) allows mapping surface potential in both space and time domains, visualizing electronic and ionic charge dynamics and separating underlying processes based on their time responses. Here, tr-KPFM is employed to explore the interplay of the adsorbed surface ions and bulk oxygen vacancies and their role in the resistive switching in the Ca-substituted bismuth ferrite thin film.

  14. Time Resolved Collapse of a Folding Protein Observed with Small Angle X-Ray Scattering

    SciTech Connect (OSTI)

    Pollack, L.; Tate, M. W.; Finnefrock, A. C.; Kalidas, C.; Trotter, S.; Darnton, N. C.; Lurio, L.; Austin, R. H.; Batt, C. A.; Gruner, S. M. (and others)

    2001-05-21T23:59:59.000Z

    High-intensity, ''pink'' beam from an undulator was used in conjunction with microfabricated rapid-fluid mixing devices to monitor the early events in protein folding with time resolved small angle x-ray scattering. This Letter describes recent work on the protein bovine {beta} -lactoglobulin where collapse from an expanded to a compact set of states was directly observed on the millisecond time scale. The role of chain collapse, one of the initial stages of protein folding, is not currently understood. The characterization of transient, compact states is vital in assessing the validity of theories and models of the folding process.

  15. Resolve to Save Energy in the New Year | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCO OverviewRepository | Department of Energy RequestGasResidentialResolve

  16. Conditions for reliable time-resolved dosimetry of electronic portal imaging devices for fixed-gantry IMRT and VMAT

    SciTech Connect (OSTI)

    Yeo, Inhwan Jason; Patyal, Baldev; Mandapaka, Anant [Department of Radiation Medicine, Loma Linda University Medical Center, Loma Linda, California 92354 (United States); Jung, Jae Won [Department of Physics, East Carolina University, Greenville, North Carolina 27858 (United States); Yi, Byong Yong [Department of Radiation Oncology, University of Maryland School of Medicine, Baltimore, Maryland 21201 (United States); Kim, Jong Oh [Department of Radiation Oncology, University of Pittsburgh Cancer Institute, Pittsburgh, Pennsylvania 15232 (United States)

    2013-07-15T23:59:59.000Z

    Purpose: The continuous scanning mode of electronic portal imaging devices (EPID) that offers time-resolved information has been newly explored for verifying dynamic radiation deliveries. This study seeks to determine operating conditions (dose rate stability and time resolution) under which that mode can be used accurately for the time-resolved dosimetry of intensity-modulated radiation therapy (IMRT) beams.Methods: The authors have designed the following test beams with variable beam holdoffs and dose rate regulations: a 10 Multiplication-Sign 10 cm open beam to serve as a reference beam; a sliding window (SW) beam utilizing the motion of a pair of multileaf collimator (MLC) leaves outside the 10 Multiplication-Sign 10 cm jaw; a step and shoot (SS) beam to move the pair in step; a volumetric modulated arc therapy (VMAT) beam. The beams were designed in such a way that they all produce the same open beam output of 10 Multiplication-Sign 10 cm. Time-resolved ion chamber measurements at isocenter and time-resolved and integrating EPID measurements were performed for all beams. The time-resolved EPID measurements were evaluated through comparison with the ion chamber and integrating EPID measurements, as the latter are accepted procedures. For two-dimensional, time-resolved evaluation, a VMAT beam with an infield MLC travel was designed. Time-resolved EPID measurements and Monte Carlo calculations of such EPID dose images for this beam were performed and intercompared.Results: For IMRT beams (SW and SS), the authors found disagreement greater than 2%, caused by frame missing of the time-resolved mode. However, frame missing disappeared, yielding agreement better than 2%, when the dose rate of irradiation (and thus the frame acquisition rates) reached a stable and planned rate as the dose of irradiation was raised past certain thresholds (a minimum 12 s of irradiation per shoot used for SS IMRT). For VMAT, the authors found that dose rate does not affect the frame acquisition rate, thereby causing no frame missing. However, serious inplanar nonuniformities were found. This could be overcome by sacrificing temporal resolution (10 frames or 0.95 s/image): the continuous images agreed with ion chamber responses at the center of EPID and the calculation two-dimensionally in a time-resolved manner.Conclusions: The authors have determined conditions under which the continuous mode can be used for time-resolved dosimetry of fixed-gantry IMRT and VMAT and demonstrated it for VMAT.

  17. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Grills, David C.; Farrington, Jaime A.; Layne, Bobby H.; Preses, Jack M.; Bernstein, Herbert J.; Wishart, James F.

    2015-04-01T23:59:59.000Z

    When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of amore »unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330-1051 cm?¹. The response time of the TRIR detection setup is ?40 ns, with a typical sensitivity of ?100 µOD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. This new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.« less

  18. Progress in resolving Hanford Site high-level waste tank safety issues

    SciTech Connect (OSTI)

    Babad, H.; Eberlein, S.J.; Johnson, G.D.; Meacham, J.E.; Osborne, J.W.; Payne, M.A.; Turner, D.A.

    1995-02-01T23:59:59.000Z

    Interim storage of alkaline, high-level radioactive waste, from two generations of spent fuel reprocessing and waste management activities, has resulted in the accumulation of 238 million liters of waste in Hanford Site single and double-shell tanks. Before the 1990`s, the stored waste was believed to be: (1) chemically unreactive under its existing storage conditions and plausible accident scenarios; and (2) chemically stable. This paradigm was proven incorrect when detailed evaluation of tank contents and behavior revealed a number of safety issues and that the waste was generating flammable and noxious gases. In 1990, the Waste Tank Safety Program was formed to focus on identifying safety issues and resolving the ferrocyanide, flammable gas, organic, high heat, noxious vapor, and criticality issues. The tanks of concern were placed on Watch Lists by safety issue. This paper summarizes recent progress toward resolving Hanford Site high-level radioactive waste tank safety issues, including modeling, and analyses, laboratory experiments, monitoring upgrades, mitigation equipment, and developing a strategy to screen tanks for safety issues.

  19. Time-resolved particle velocity measurements at impact velocities of 10 km/s

    SciTech Connect (OSTI)

    Furnish, M.D.; Chhabildas, L.C.; Reinhart, W.D.

    1998-08-01T23:59:59.000Z

    Hypervelocity launch capabilities (9--16 km/s) with macroscopic plates have become available in recent years. It is now feasible to conduct instrumented plane-wave tests using this capability. Successfully conducting such tests requires a planar launch and impact at hypervelocities, appropriate triggering for recording systems, and time-resolved measurements of motion or stress at a particular point or set of points within the target or projectile during impact. The authors have conducted the first time-resolved wave-profile experiments using velocity interferometric techniques at impact velocities of 10 km/s. These measurements show that aluminum continues to exhibit normal release behavior to 161 GPa shock pressure, with complete loss of strength of the shocked state. These experiments have allowed a determination of shock-wave window transparency in conditions produced by a hypervelocity impact. In particular, lithium fluoride appears to lose transparency at a shock stress of 200 GPa; this appears to be the upper limit for conventional wave profile measurements using velocity interferometric techniques.

  20. Size-resolved parameterization of primary organic carbon in fresh marine aerosols

    SciTech Connect (OSTI)

    Long, Michael S [ORNL; Keene, William C [ORNL; Erickson III, David J [ORNL

    2009-12-01T23:59:59.000Z

    Marine aerosols produced by the bursting of artificially generated bubbles in natural seawater are highly enriched (2 to 3 orders of magnitude based on bulk composition) in marine-derived organic carbon (OC). Production of size-resolved particulate OC was parameterized based on a Langmuir kinetics-type association of OC to bubble plumes in seawater and resulting aerosol as constrained by measurements of aerosol produced from highly productive and oligotrophic seawater. This novel approach is the first to account for the influence of adsorption on the size-resolved association between marine aerosols and OC. Production fluxes were simulated globally with an eight aerosol-size-bin version of the NCAR Community Atmosphere Model (CAM v3.5.07). Simulated number and inorganic sea-salt mass production fell within the range of published estimates based on observationally constrained parameterizations. Because the parameterization does not consider contributions from spume drops, the simulated global mass flux (1.5 x 10{sup 3} Tg y{sup -1}) is near the lower limit of published estimates. The simulated production of aerosol number (2.1 x 10{sup 6} cm{sup -2} s{sup -1}) and OC (49 Tg C y{sup -1}) fall near the upper limits of published estimates and suggest that primary marine aerosols may have greater influences on the physiochemical evolution of the troposphere, radiative transfer and climate, and associated feedbacks on the surface ocean than suggested by previous model studies.

  1. Resolving the vacuum fluctuations of an optomechanical system using an artificial atom

    E-Print Network [OSTI]

    F. Lecocq; J. D. Teufel; J. Aumentado; R. W. Simmonds

    2015-02-20T23:59:59.000Z

    Heisenberg's uncertainty principle results in one of the strangest quantum behaviors: an oscillator can never truly be at rest. Even in its lowest energy state, at a temperature of absolute zero, its position and momentum are still subject to quantum fluctuations. Resolving these fluctuations using linear position measurements is complicated by the fact that classical noise can masquerade as quantum noise. On the other hand, direct energy detection of the oscillator in its ground state makes it appear motionless. So how can we resolve quantum fluctuations? Here, we parametrically couple a micromechanical oscillator to a microwave cavity to prepare the system in its quantum ground state and then amplify the remaining vacuum fluctuations into real energy quanta. Exploiting a superconducting qubit as an artificial atom, we measure the photon/phonon-number distributions during these optomechanical interactions. This provides an essential non-linear resource to, first, verify the ground state preparation and second, reveal the quantum vacuum fluctuations of the macroscopic oscillator's motion. Our results further demonstrate the ability to control a long-lived mechanical oscillator using a non-Gaussian resource, directly enabling applications in quantum information processing and enhanced detection of displacement and forces.

  2. Resolving Spacecraft Earth-Flyby Anomalies with Measured Light Speed Anisotropy

    E-Print Network [OSTI]

    Reginald T. Cahill

    2008-04-30T23:59:59.000Z

    Doppler shift observations of spacecraft, such as Galileo, NEAR, Cassini, Rosetta and MESSENGER in earth flybys, have all revealed unexplained speed `anomalies' - that the doppler-shift determined speeds are inconsistent with expected speeds. Here it is shown that these speed anomalies are not real and are actually the result of using an incorrect relationship between the observed doppler shift and the speed of the spacecraft - a relationship based on the assumption that the speed of light is isotropic in all frames, i.e. invariant. Taking account of the repeatedly measured light-speed anisotropy the anomalies are resolved. The Pioneer 10/11 anomalies are discussed, but not resolved. The spacecraft observations demonstrate again that the speed of light is not invariant, and is isotropic only with respect to a dynamical 3-space. The existing doppler shift data also offers a resource to characterise a new form of gravitational waves, the dynamical 3-space turbulence, that has also been detected by other techniques.

  3. Millifluidics for time-resolved mapping of the growth of gold nanostructures

    SciTech Connect (OSTI)

    Sai Krishna, Katla; Navin, Chelliah; Biswas, Sanchita; Singh, Varshni; Ham, Kyungmin; Bovencamp, L. S.; Theegala, Chandra; Miller, Jeffrey T; Spivey, James J.; Kumar, Challa S.S.R.

    2013-01-01T23:59:59.000Z

    Innovative in situ characterization tools are essential for understanding the reaction mechanisms leading to the growth of nanoscale materials. Though techniques, such as in situ transmission X-ray microscopy, fast single-particle spectroscopy, small-angle X-ray scattering, etc., are currently being developed, these tools are complex, not easily accessible, and do not necessarily provide the temporal resolution required to follow the formation of nanomaterials in real time. Here, we demonstrate for the first time the utility of a simple millifluidic chip for an in situ real time analysis of morphology and dimension-controlled growth of gold nano- and microstructures with a time resolution of 5 ms. The structures formed were characterized using synchrotron radiation-based in situ X-ray absorption spectroscopy, 3-D X-ray tomography, and high-resolution electron microscopy. These gold nanostructures were found to be catalytically active for conversion of 4-nitrophenol into 4-aminophenol, providing an example of the potential opportunities for time-resolved analysis of catalytic reactions. While the investigations reported here are focused on gold nanostructures, the technique can be applied to analyze the time-resolved growth of other types of nanostructured metals and metal oxides. With the ability to probe at least a 10-fold higher concentrations, in comparison with traditional microfluidics, the tool has potential to revolutionize a broad range of fields from catalysis, molecular analysis, biodefense, and molecular biology.

  4. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Grills, David C. [Brookhaven National Lab. (BNL), Upton, NY (United States); Farrington, Jaime A. [Brookhaven National Lab. (BNL), Upton, NY (United States); Layne, Bobby H. [Brookhaven National Lab. (BNL), Upton, NY (United States); Preses, Jack M. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bernstein, Herbert J. [Dowling College, Shirley, NY (United States); Wishart, James F. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-04-01T23:59:59.000Z

    When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of a unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330-1051 cm?¹. The response time of the TRIR detection setup is ?40 ns, with a typical sensitivity of ?100 µOD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. This new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.

  5. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

    2012-07-01T23:59:59.000Z

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  6. The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study

    SciTech Connect (OSTI)

    Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

    2006-12-15T23:59:59.000Z

    Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

  7. V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in the Windows NAT Driver PLATFORM: Windows Server 2012 ABSTRACT: This security update resolves a vulnerability in the Windows NAT Driver in Microsoft...

  8. A high-order harmonic generation apparatus for time- and angle-resolved photoelectron spectroscopy

    SciTech Connect (OSTI)

    Frietsch, B.; Gahl, C.; Teichmann, M.; Weinelt, M. [Freie Universität Berlin, Arnimallee 14, 14195 Berlin (Germany)] [Freie Universität Berlin, Arnimallee 14, 14195 Berlin (Germany); Carley, R. [Freie Universität Berlin, Arnimallee 14, 14195 Berlin (Germany) [Freie Universität Berlin, Arnimallee 14, 14195 Berlin (Germany); Max-Born-Institut, Max-Born-Str. 2a, 12489 Berlin (Germany); Döbrich, K. [Max-Born-Institut, Max-Born-Str. 2a, 12489 Berlin (Germany)] [Max-Born-Institut, Max-Born-Str. 2a, 12489 Berlin (Germany); Schwarzkopf, O.; Wernet, Ph. [Helmholtz-Zentrum Berlin für Materialien und Energie GmbH, Albert-Einstein-Str. 15, 12489 Berlin (Germany)] [Helmholtz-Zentrum Berlin für Materialien und Energie GmbH, Albert-Einstein-Str. 15, 12489 Berlin (Germany)

    2013-07-15T23:59:59.000Z

    We present a table top setup for time- and angle-resolved photoelectron spectroscopy to investigate band structure dynamics of correlated materials driven far from equilibrium by femtosecond laser pulse excitation. With the electron-phonon equilibration time being in the order of 1–2 ps it is necessary to achieve sub-picosecond time resolution. Few techniques provide both the necessary time and energy resolution to map non-equilibrium states of the band structure. Laser-driven high-order harmonic generation is such a technique. In our experiment, a grating monochromator delivers tunable photon energies up to 40 eV. A photon energy bandwidth of 150 meV and a pulse duration of 100 fs FWHM allow us to cover the k-space necessary to map valence bands at different k{sub z} and detect outer core states.

  9. Time-resolved temperature measurement and numerical simulation of millisecond laser irradiated silicon

    SciTech Connect (OSTI)

    Li Zewen; Zhang Hongchao; Shen Zhonghua; Ni Xiaowu [School of Science, Nanjing University of Science and Technology, Nanjing 210094 (China)

    2013-07-21T23:59:59.000Z

    Thermal process of 1064 nm millisecond pulsed Nd:YAG laser irradiated silicon was time-resolved temperature measured by an infrared radiation pyrometer, temperature evolutions of the spot center for wide range of laser energy densities were presented. The waveforms of temperature evolution curves contained much information about phase change, melting, solidification and vaporization. An axisymmetric numerical model was established for millisecond laser heating silicon. The transient temperature fields were obtained by using the finite element method. The numerical results of temperature evolutions of the spot center are in good agreement with the experimental results. Furthermore, the axial temperature distributions of the numerical results give a better understanding of the waveforms in the experimental results. The melting threshold, vaporizing threshold, melting duration, and melting depth were better identified by analyzing two kinds of results.

  10. Time resolved magneto-optical studies of ferromagnetic InMnSb films

    SciTech Connect (OSTI)

    Frazier, M.; Kini, R. N.; Nontapot, K.; Khodaparast, G. A. [Department of Physics, Virginia Tech, Blacksburg, Virginia 24061 (United States); Wojtowicz, T. [Institute of Physics, Polish Academy of Sciences 02-668 Warsaw (Poland); Liu, X.; Furdyna, J. K. [Department of Physics, University of Notre Dame, Notre Dame, Indiana 46556 (United States)

    2008-02-11T23:59:59.000Z

    We report time resolved magneto-optical measurements in InMnSb ferromagnetic films with 2% and 2.8% Mn contents grown by low temperature molecular beam epitaxy. In order to probe a possible interaction between the spins of photoexcited carriers and the Mn ions, we measured spin dynamics before and after aligning the Mn ions by applying an external magnetic field at temperatures above and below the samples' Curie temperatures. We observed no significant temperature or magnetic field dependence in the relaxation times and attribute the observed dynamics entirely to the relaxation of photoexcited electrons in the conduction band where the s-d coupling with the localized Mn ions is significantly weaker compared to the p-d exchange coupling. We observed several differences in the optical response of our InMnSb samples which could have been influenced mainly by the samples' growth conditions.

  11. Study of nanosecond laser-produced plasmas in atmosphere by spatially resolved optical emission spectroscopy

    SciTech Connect (OSTI)

    Wei, Wenfu; Wu, Jian; Li, Xingwen; Jia, Shenli; Qiu, Aici [State Key Laboratory of Electrical Insulation and Power Equipment, Xi'an Jiaotong University, No. 28 XianNing West Road, Xi'an, Shaanxi Province 710049 (China)] [State Key Laboratory of Electrical Insulation and Power Equipment, Xi'an Jiaotong University, No. 28 XianNing West Road, Xi'an, Shaanxi Province 710049 (China)

    2013-09-21T23:59:59.000Z

    We investigate the evolution of the species from both the target and the air, and the plasma parameter distribution of the nanosecond laser-produced plasmas in atmospheric air. The technique used is spatially resolved optical emission spectroscopy. It is argued that the N II from the air, which is distributed over a wider region than the target species in the early stages of the discharge, is primarily formed by the shock wave. The ionized species have a larger expansion velocity than the excited atoms in the first ?100 ns, providing direct evidence for space-charge effects. The electron density decreases with the distance from the target surface in the early stages of the discharge, and both the electron density and the excited temperature variation in the axial direction are found to become insignificant at later stages.

  12. Time-resolved measurement of plasma parameters by means of triple probe

    SciTech Connect (OSTI)

    Qayyum, A.; Ahmad, N.; Ahmad, S.; Deeba, Farah; Ali, Rafaqat; Hussain, S. [National Tokamak Fusion Program, 3329 Islamabad (Pakistan)] [National Tokamak Fusion Program, 3329 Islamabad (Pakistan)

    2013-12-15T23:59:59.000Z

    Triple Langmuir probe (TLP) diagnostic system with its necessary driving circuit is developed and successfully applies for time-resolved measurement of plasma parameters in the negative glow region of pulsating-dc discharge. This technique allows the instantaneous measurement of electron temperature [T{sub ?}], electron number density [n{sub ?}] as well as plasma fluctuations without any voltage or frequency sweep. In TLP configuration two probes are differentially biased and serve as a floating symmetric double probe whereas the third probe is simply floating into plasma to measure floating potential as a function of time and thus incorporates the effect of plasma fluctuations. As an example of the application to time-dependent plasmas, basic plasma parameters such as floating potential, electron temperature, and electron number density in low pressure air discharge are determined as a function of time for different fill pressure. The results demonstrate temporal evolution of plasma parameters and thus plasma generation progression for different fill pressures.

  13. An ultrafast angle-resolved photoemission apparatus for measuring complex materials

    SciTech Connect (OSTI)

    Smallwood, Christopher L.; Lanzara, Alessandra [Department of Physics, University of California, Berkeley, California 94720 (United States); Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Jozwiak, Christopher [Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Zhang Wentao [Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States)

    2012-12-15T23:59:59.000Z

    We present technical specifications for a high resolution time- and angle-resolved photoemission spectroscopy setup based on a hemispherical electron analyzer and cavity-dumped solid state Ti:sapphire laser used to generate pump and probe beams, respectively, at 1.48 and 5.93 eV. The pulse repetition rate can be tuned from 209 Hz to 54.3 MHz. Under typical operating settings the system has an overall energy resolution of 23 meV, an overall momentum resolution of 0.003 A{sup -1}, and an overall time resolution of 310 fs. We illustrate the system capabilities with representative data on the cuprate superconductor Bi{sub 2}Sr{sub 2}CaCu{sub 2}O{sub 8+{delta}}. The descriptions and analyses presented here will inform new developments in ultrafast electron spectroscopy.

  14. Introduction to theory and analysis of resolved (and unresolved) neutron resonances via SAMMY

    SciTech Connect (OSTI)

    Larson, N.M.

    1998-07-01T23:59:59.000Z

    Neutron cross-section data are important for two distinct purposes: first, they provide insight into the nature of matter, thus assisting in the understanding of fundamental physics; second, they are needed for practical applications (e.g., for calculating when and how a reactor will become critical, or how much shielding is needed for storage of nuclear materials, and for medical applications). Neutron cross section data in the resolved-resonance region are generally obtained by time-of-flight experiments, which must be carefully analyzed if they are to be properly understood and utilized. In this paper, important features of the analysis process are discussed, with emphasis on the particular technique used in the analysis code SAMMY. Other features of the code are also described; these include such topics as calculation of group cross sections (including covariance matrices), generation and fitting of integral quantities, and extensions into the unresolved-resonance region and higher-energy regions.

  15. MONSTIR II: A 32-channel, multispectral, time-resolved optical tomography system for neonatal brain imaging

    SciTech Connect (OSTI)

    Cooper, Robert J., E-mail: robert.cooper@ucl.ac.uk; Magee, Elliott; Everdell, Nick; Magazov, Salavat; Varela, Marta; Airantzis, Dimitrios; Gibson, Adam P.; Hebden, Jeremy C. [Biomedical Optics Research Laboratory, Department of Medical Physics and Bioengineering, University College London, London WC1E 6BT (United Kingdom)

    2014-05-15T23:59:59.000Z

    We detail the design, construction and performance of the second generation UCL time-resolved optical tomography system, known as MONSTIR II. Intended primarily for the study of the newborn brain, the system employs 32 source fibres that sequentially transmit picosecond pulses of light at any four wavelengths between 650 and 900 nm. The 32 detector channels each contain an independent photo-multiplier tube and temporally correlated photon-counting electronics that allow the photon transit time between each source and each detector position to be measured with high temporal resolution. The system's response time, temporal stability, cross-talk, and spectral characteristics are reported. The efficacy of MONSTIR II is demonstrated by performing multi-spectral imaging of a simple phantom.

  16. Substrate interactions with suspended and supported monolayer MoS?: Angle-resolved photoemission spectroscopy

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Jin, Wencan; Sadowski, Jerzy T.; Yeh, Po-Chun; Zaki, Nader; Zhang, Datong; Liou, Jonathan T.; Dadap, Jerry I.; Herman, Irving P.; Osgood, Jr., Richard M.; Sutter, Peter; et al

    2015-03-01T23:59:59.000Z

    We report the directly measured electronic structure of exfoliated monolayer molybdenum disulfide (MoS?) using micrometer-scale angle-resolved photoemission spectroscopy. Measurements of both suspended and supported monolayer MoS? elucidate the effects of interaction with a substrate. A suggested relaxation of the in-plane lattice constant is found for both suspended and supported monolayer MoS? crystals. For suspended MoS?, a careful investigation of the measured uppermost valence band gives an effective mass at ? and ? of 2.00m? and 0.43m?, respectively. We also measure an increase in the band linewidth from the midpoint of ?? to the vicinity of ? and briefly discuss itsmore »possible origin.« less

  17. Spatially and Temporally Resolved Studies of the Human Microbiome (2011 JGI User Meeting)

    SciTech Connect (OSTI)

    Knight, Rob [University of Colorado] [University of Colorado

    2011-03-23T23:59:59.000Z

    The U.S. Department of Energy Joint Genome Institute (JGI) invited scientists interested in the application of genomics to bioenergy and environmental issues, as well as all current and prospective users and collaborators, to attend the annual DOE JGI Genomics of Energy & Environment Meeting held March 22-24, 2011 in Walnut Creek, Calif. The emphasis of this meeting was on the genomics of renewable energy strategies, carbon cycling, environmental gene discovery, and engineering of fuel-producing organisms. The meeting features presentations by leading scientists advancing these topics. Rob Knight of the University of Colorado gives a presentation on "Spatially and Temporally Resolved Studies of the Human Microbiome" at the 6th annual Genomics of Energy & Environment Meeting on March 23, 2011

  18. Time-resolved soft x-ray spectra from laser-produced Cu plasma

    SciTech Connect (OSTI)

    Cone, K V; Dunn, J; Baldis, H A; May, M J; Purvis, M A; Scott, H A; Schneider, M B

    2012-05-02T23:59:59.000Z

    The volumetric heating of a thin copper target has been studied with time resolved x-ray spectroscopy. The copper target was heated from a plasma produced using the Lawrence Livermore National Laboratory's Compact Multipulse Terrawatt (COMET) laser. A variable spaced grating spectrometer coupled to an x-ray streak camera measured soft x-ray emission (800-1550 eV) from the back of the copper target to characterize the bulk heating of the target. Radiation hydrodynamic simulations were modeled in 2-dimensions using the HYDRA code. The target conditions calculated by HYDRA were post-processed with the atomic kinetics code CRETIN to generate synthetic emission spectra. A comparison between the experimental and simulated spectra indicates the presence of specific ionization states of copper and the corresponding electron temperatures and ion densities throughout the laser-heated copper target.

  19. Substrate interactions with suspended and supported monolayer MoS?: Angle-resolved photoemission spectroscopy

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Jin, Wencan [Columbia Univ., New York, NY (United States); Sadowski, Jerzy T. [Brookhaven National Lab. (BNL), Upton, NY (United States); Yeh, Po-Chun [Columbia Univ., New York, NY (United States); Zaki, Nader [Columbia Univ., New York, NY (United States); Zhang, Datong [Columbia Univ., New York, NY (United States); Liou, Jonathan T. [Columbia Univ., New York, NY (United States); Dadap, Jerry I. [Columbia Univ., New York, NY (United States); Herman, Irving P. [Columbia Univ., New York, NY (United States); Osgood, Jr., Richard M. [Columbia Univ., New York, NY (United States); Sutter, Peter [Brookhaven National Lab. (BNL), Upton, NY (United States); Barinov, Alexey [Elettra Sincrotrone Trieste, Basovizza, Trieste (Italy); Yablonskikh, Mikhail [Elettra Sincrotrone Trieste, Basovizza, Trieste (Italy)

    2015-03-01T23:59:59.000Z

    We report the directly measured electronic structure of exfoliated monolayer molybdenum disulfide (MoS?) using micrometer-scale angle-resolved photoemission spectroscopy. Measurements of both suspended and supported monolayer MoS? elucidate the effects of interaction with a substrate. A suggested relaxation of the in-plane lattice constant is found for both suspended and supported monolayer MoS? crystals. For suspended MoS?, a careful investigation of the measured uppermost valence band gives an effective mass at ? and ? of 2.00m? and 0.43m?, respectively. We also measure an increase in the band linewidth from the midpoint of ?? to the vicinity of ? and briefly discuss its possible origin.

  20. Spatially resolved measurement of high doses in microbeam radiation therapy using samarium doped fluorophosphate glasses

    SciTech Connect (OSTI)

    Okada, Go; Morrell, Brian; Koughia, Cyril; Kasap, Safa [Department of Electrical and Computer Engineering, University of Saskatchewan, Saskatoon, SK S7N 5A9 (Canada); Edgar, Andy; Varoy, Chris [School of Chemical and Physical Sciences and MacDiarmid Institute, Victoria University of Wellington, Kelburn Parade (New Zealand); Belev, George; Wysokinski, Tomasz [Canadian Light Source Inc., University of Saskatchewan, Saskatoon, SK S7N 0X4 (Canada); Chapman, Dean [Department of Anatomy and Cell Biology, University of Saskatchewan, Saskatoon, SK S7N 5E5 (Canada)

    2011-09-19T23:59:59.000Z

    The measurement of spatially resolved high doses in microbeam radiation therapy has always been a challenging task, where a combination of high dose response and high spatial resolution (microns) is required for synchrotron radiation peaked around 50 keV. The x-ray induced Sm{sup 3+}{yields} Sm{sup 2+} valence conversion in Sm{sup 3+} doped fluorophosphates glasses has been tested for use in x-ray dosimetry for microbeam radiation therapy. The conversion efficiency depends almost linearly on the dose of irradiation up to {approx}5 Gy and saturates at doses exceeding {approx}80 Gy. The conversion shows strong correlation with x-ray induced absorbance of the glass which is related to the formation of phosphorus-oxygen hole centers. When irradiated through a microslit collimator, a good spatial resolution and high ''peak-to-valley'' contrast have been observed by means of confocal photoluminescence microscopy.

  1. Time- and spectrally resolved measurements of laser-driven hohlraum radiation

    SciTech Connect (OSTI)

    Hessling, T.; Blazevic, A.; Stoehlker, T. [GSI Helmholtzzentrum fuer Schwerionenforschung GmbH, Planckstrasse 1, D-64291 Darmstadt (Germany); Frank, A.; Kraus, D.; Roth, M.; Schaumann, G.; Schumacher, D.; Hoffmann, D. H. H. [Institut fuer Kernphysik, Technische Universitaet Darmstadt, Schlossgartenstrasse 9, D-64289 Darmstadt (Germany)

    2011-07-15T23:59:59.000Z

    At the GSI Helmholtz center for heavy-ion research combined experiments with heavy ions and laser-produced plasmas are investigated. As a preparation to utilize indirectly heated targets, where a converter hohlraum provides thermal radiation to create a more homogeneous plasma, this converter target has to be characterized. In this paper the latest results of these measurements are presented. Small spherical cavities with diameters between 600 and 750 {mu}m were heated with laser energies up to 30 J at 532-nm wavelength. Radiation temperatures could be determined by time-resolved as well as time-integrated diagnostics, and maximum values of up to 35 eV were achieved.

  2. Time-resolved photoelectrochemical measurements on surface-modified n- and p-InP electrodes

    SciTech Connect (OSTI)

    Cook, R.L.; Dempsey, P.F.; Sammells, A.F.

    1986-11-01T23:59:59.000Z

    Time-resolved photoelectrochemical measurements following illumination with a pulsed laser source have been performed on surface-modified n- and p-InP photoelectrodes. The rate of the initial fast transient photopotential decay was shown to be sensitive to the nature of the surface modification used. The chemisorption of Ru ions onto the n-InP surface reduced the rapid initial decay of the transient photopotential response observed on the unmodified n-InP surface. It is proposed that Ru/sup 3+/ chemisorption may effectively reduce surface trap density at the interface region. For p-InP either unmodified or modified by Co, Rh, Pt, Pb, Rh/Pt, or Co/Pt, the transient photopotential decay exhibited a two segment response. The fast initial decay was found dependent on the previous surface treatment of the p-InP electrode. The second slower decay, however, was found independent of previous surface treatments.

  3. Seismic imaging of reservoir flow properties: Resolving waterinflux and reservoir permeability

    SciTech Connect (OSTI)

    Vasco, D.W.; Keers, Henk

    2006-11-27T23:59:59.000Z

    Methods for geophysical model assessment, in particuale thecomputation of model parameter resolution, indicate the value and thelimitations of time-lapse data in estimating reservoir flow properties. Atrajectory-based method for computing sensitivities provides an effectivemeans to compute model parameter resolutions. We examine the commonsituation in which water encroaches into a resrvoir from below, as due tothe upward movement of an oil-water contact. Using straight-forwardtechniques we find that, by inclusing reflections off the top and bottomof a reservoir tens of meters thick, we can infer reservoir permeabilitybased upon time-lapse data. We find that, for the caseof water influxfrom below, using multiple time-lapse 'snapshots' does not necessarilyimprove the resolution of reservoir permeability. An application totime-lapse data from the Norne field illustrates that we can resolve thepermeability near a producing well using reflections from threeinterfaces associated with the reservoir.

  4. Spatially and Temporally Resolved Studies of the Human Microbiome (2011 JGI User Meeting)

    ScienceCinema (OSTI)

    Knight, Rob [University of Colorado

    2011-06-03T23:59:59.000Z

    The U.S. Department of Energy Joint Genome Institute (JGI) invited scientists interested in the application of genomics to bioenergy and environmental issues, as well as all current and prospective users and collaborators, to attend the annual DOE JGI Genomics of Energy & Environment Meeting held March 22-24, 2011 in Walnut Creek, Calif. The emphasis of this meeting was on the genomics of renewable energy strategies, carbon cycling, environmental gene discovery, and engineering of fuel-producing organisms. The meeting features presentations by leading scientists advancing these topics. Rob Knight of the University of Colorado gives a presentation on "Spatially and Temporally Resolved Studies of the Human Microbiome" at the 6th annual Genomics of Energy & Environment Meeting on March 23, 2011

  5. Site-resolved Imaging of Fermionic Lithium-6 in an Optical Lattice

    E-Print Network [OSTI]

    Parsons, Maxwell F; Mazurenko, Anton; Chiu, Christie S; Setiawan, Widagdo; Wooley-Brown, Katherine; Blatt, Sebastian; Greiner, Markus

    2015-01-01T23:59:59.000Z

    We demonstrate site-resolved imaging of individual fermionic lithium-6 atoms in a 2D optical lattice. To preserve the density distribution during fluorescence imaging, we simultaneously cool the atoms with 3D Raman sideband cooling. This laser cooling technique, demonstrated here for the first time for lithium-6 atoms, also provides a pathway to rapid low-entropy filling of an optical lattice. We are able to determine the occupation of individual lattice sites with a fidelity >95%, enabling direct, local measurement of particle correlations in Fermi lattice systems. This ability will be instrumental for creating and investigating low-temperature phases of the Fermi-Hubbard model, including antiferromagnets and d-wave superfluidity.

  6. Comparison of spatially resolved carrier lifetimes in mc-Si with solar cell and material characteristics

    SciTech Connect (OSTI)

    Glunz, S.W.; Hebling, C.; Warta, W.; Wettling, W. [Fraunhofer-Inst. fuer Solare Energiesysteme, Freiburg (Germany)

    1994-12-31T23:59:59.000Z

    The authors introduce a novel application of modulated free carrier absorption (MFCA) for measuring minority carrier lifetimes in multicrystalline silicon with high spatial resolution. The improved lateral resolution compared to other contactless techniques allows the correlation between these lifetime maps and solar cell characteristics as well as microscopic properties, like dislocations, precipitates, oxygen concentration, etc. Comparisons of the lifetime maps measured on the starting material and light beam induced current (LBIC) maps exhibit a very good qualitative correlation of the structures observed in both cases. In addition, correlations to microscopic characteristics like high dislocation density in regions with low lifetimes are investigated and a comparison with spatially resolved FT-IR measurements of the interstitial oxygen concentration is performed.

  7. Phase-resolved optical emission of dusty rf discharges: Experiment and simulation

    SciTech Connect (OSTI)

    Melzer, Andre; Huebner, Simon; Lewerentz, Lars; Schneider, Ralf [Institut fuer Physik, Ernst-Moritz-Arndt-Universiaet, D-17489 Greifswald (Germany); Matyash, Konstantin [Max-Planck Institut fuer Plasmaphysik, EURATOM Association, D-17491 Greifswald (Germany); Ikkurthi, Ramana [Institute for Plasma Research, Bhat, Ghandinagar, Gujarat (India)

    2011-03-15T23:59:59.000Z

    The spectral emission of atoms in a dusty radio frequence (rf) discharge plasma in argon and helium has been measured with a gated ICCD camera. The spatially and temporally resolved emission/excitation of the argon and helium atoms during the rf cycle in the dusty discharge was compared to the dust-free case. In the bulk plasma above the dust cloud, the emission is clearly enhanced in the dusty discharge with respect to the pure discharge, whereas in the sheath the emission is reduced. In addition, the emission of a dusty argon plasma is studied via particle-particle particle-mesh (P{sup 3}M) simulations. The rf dynamics with a single dust particle trapped in the sheath was calculated. Like in the experiment the dust modifies the atomic emission. The spatiotemporal excitation pattern of the experiment is reproduced and a detailed understanding of the difference in excitation of the discharge with and without dust is presented.

  8. New method for measuring time-resolved spectra of lanthanide emission using square-wave excitation

    SciTech Connect (OSTI)

    Qin, Feng [Condensed Matter Science and Technology Institute, Harbin Institute of Technology, Harbin 150080 (China); Zhao, Hua; Cai, Wei, E-mail: weicai@hit.edu.cn [School of Materials Science and Engineering, Harbin Institute of Technology, Harbin 150001 (China); Duan, Qianqian [College of Information Engineering, Taiyuan University of Technology, Taiyuan 030024 (China); Zhang, Zhiguo, E-mail: zhangzhiguo@hit.edu.cn [Condensed Matter Science and Technology Institute, Harbin Institute of Technology, Harbin 150080 (China); Laboratory of Sono- and Photo-Theranostic Technologies, Harbin Institute of Technology, Harbin 150080 (China); Cao, Wenwu, E-mail: dzk@psu.edu [Condensed Matter Science and Technology Institute, Harbin Institute of Technology, Harbin 150080 (China); Laboratory of Sono- and Photo-Theranostic Technologies, Harbin Institute of Technology, Harbin 150080 (China); Materials Research Institute, The Pennsylvania State University, University Park, Pennsylvania 16802 (United States)

    2013-11-15T23:59:59.000Z

    A method using modulated continuous wave (CW) visible laser to measure time-resolved fluorescence spectra of trivalent rare-earth ions has been developed. Electro-optic modulator was used to modulate the CW pumping laser with a rise time of 2 ?s. CW Nd{sup 3+} lasers were used as examples to present the method. Upconversion dynamic process of Ho{sup 3+} was studied utilizing a 532 nm CW laser. Quantum cutting dynamic process from Tb{sup 3+} to Yb{sup 3+} was analyzed by a 473 nm CW laser. This method can be applied to any CW laser such as He-Ne laser, Ar{sup +} laser, Kr{sup +} laser, Ti:sapphire laser, etc.

  9. Time-, frequency-, and wavevector-resolved x-ray diffraction from single molecules

    SciTech Connect (OSTI)

    Bennett, Kochise, E-mail: kcbennet@uci.edu; Biggs, Jason D.; Zhang, Yu; Dorfman, Konstantin E.; Mukamel, Shaul, E-mail: smukamel@uci.edu [University of California, Irvine, California 92697-2025 (United States)

    2014-05-28T23:59:59.000Z

    Using a quantum electrodynamic framework, we calculate the off-resonant scattering of a broadband X-ray pulse from a sample initially prepared in an arbitrary superposition of electronic states. The signal consists of single-particle (incoherent) and two-particle (coherent) contributions that carry different particle form factors that involve different material transitions. Single-molecule experiments involving incoherent scattering are more influenced by inelastic processes compared to bulk measurements. The conditions under which the technique directly measures charge densities (and can be considered as diffraction) as opposed to correlation functions of the charge-density are specified. The results are illustrated with time- and wavevector-resolved signals from a single amino acid molecule (cysteine) following an impulsive excitation by a stimulated X-ray Raman process resonant with the sulfur K-edge. Our theory and simulations can guide future experimental studies on the structures of nano-particles and proteins.

  10. Temperature Profiles and the Effect of AGN on Submillimeter Emission from BLAST Observations of Resolved Galaxies

    E-Print Network [OSTI]

    Wiebe, Donald V; Bock, James J; Chapin, Edward L; Devlin, Mark J; Dicker, Simon; Griffin, Matthew; Gundersen, Joshua O; Halpern, Mark; Hargrave, Peter C; Hughes, David H; Klein, Jeff; Marsden, Gaelen; Martin, Peter G; Mauskopf, Philip; Netterfield, Calvin B; Olmi, Luca; Pascale, Enzo; Patanchon, Guillaume; Rex, Marie; Scott, Douglas; Semisch, Christopher; Thomas, Nicholas; Truch, Matthew D P; Tucker, Carole; Tucker, Gregory S; Viero, Marco P

    2009-01-01T23:59:59.000Z

    Over the course of two flights, the Balloon-borne Large Aperture Submillimeter Telescope (BLAST) made resolved maps of seven nearby (BLAST05), BLAST observed a single nearby galaxy, NGC 4565. During the December 2006 flight from Antarctica (BLAST06), BLAST observed the nearby galaxies NGC 1097, NGC 1291, NGC 1365, NGC 1512, NGC 1566, and NGC 1808. We fit physical dust models to a combination of BLAST observations and other available data for the the galaxies with Spitzer data. We fit a modified blackbody to the remaining galaxies to obtain total dust mass and mean dust temperature. For the four galaxies with Spitzer data, we also produce maps and radial profiles of dust column density and temperature. We measure the fraction of BLAST detected flux originating from the central cores of these galaxies and use this to calculate a "core fraction", an upper limit on the "AGN fraction" of submillimeter detected galaxies. Fin...

  11. Time-resolved measurement of single pulse femtosecond laser-induced periodic surface structure formation

    E-Print Network [OSTI]

    Kafka, K R P; Li, H; Yi, A; Cheng, J; Chowdhury, E A

    2015-01-01T23:59:59.000Z

    Time-resolved diffraction microscopy technique has been used to observe the formation of laser-induced periodic surface structures (LIPSS) from the interaction of a single femtosecond laser pulse (pump) with a nano-scale groove mechanically formed on a single-crystal Cu substrate. The interaction dynamics (0-1200 ps) was captured by diffracting a time-delayed, frequency-doubled pulse from nascent LIPSS formation induced by the pump with an infinity-conjugate microscopy setup. The LIPSS ripples are observed to form sequentially outward from the groove edge, with the first one forming after 50 ps. A 1-D analytical model of electron heating and surface plasmon polariton (SPP) excitation induced by the interaction of incoming laser pulse with the groove edge qualitatively explains the time-evloution of LIPSS formation.

  12. Design considerations for a time-resolved tomographic diagnostic at DARHT

    SciTech Connect (OSTI)

    Morris I. Kaufman, Daniel Frayer, Wendi Dreesen, Douglas Johnson, Alfred Meidinger

    2006-08-01T23:59:59.000Z

    An instrument has been developed to acquire time-resolved tomographic data from the electron beam at the DARHT [Dual-Axis Radiographic Hydrodynamic Test] facility at Los Alamos National Laboratory. The instrument contains four optical lines of sight that view a single tilted object. The lens design optically integrates along one optical axis for each line of sight. These images are relayed via fiber optic arrays to streak cameras, and the recorded streaks are used to reconstruct the original two-dimensional data. Installation of this instrument into the facility requires automation of both the optomechanical adjustments and calibration of the instrument in a constrained space. Additional design considerations include compound tilts on the object and image planes.

  13. Spectrally resolved spatiotemporal features of quantum paths in high-order harmonic generation

    E-Print Network [OSTI]

    He, Lixin; Zhang, Qingbin; Zhai, Chunyang; Wang, Feng; Shi, Wenjing; Lu, Peixiang

    2015-01-01T23:59:59.000Z

    We experimentally disentangle the contributions of different quantum paths in high-order harmonic generation (HHG) from the spectrally and spatially resolved harmonic spectra. By adjusting the laser intensity and focusing position, we simultaneously observe the spectrum splitting, frequency shift and intensity-dependent modulation of harmonic yields both for the short and long paths. Based on the simulations, we discriminate the physical mechanisms of the intensity-dependent modulation of HHG due to the quantum path interference and macroscopic interference effects. Moreover, it is shown that the atomic dipole phases of different quantum paths are encoded in the frequency shift. In turn, it enables us to retrieve the atomic dipole phases and the temporal chirps of different quantum paths from the measured harmonic spectra. This result gives an informative mapping of spatiotemporal and spectral features of quantum paths in HHG.

  14. Tunable vacuum ultraviolet laser based spectrometer for angle resolved photoemission spectroscopy

    SciTech Connect (OSTI)

    Jiang, Rui; Mou, Daixiang; Wu, Yun; Huang, Lunan; Kaminski, Adam [Division of Materials Science and Engineering, Ames Laboratory, Ames, Iowa 50011 (United States) [Division of Materials Science and Engineering, Ames Laboratory, Ames, Iowa 50011 (United States); Department of Physics and Astronomy, Iowa State University, Ames, Iowa 50011 (United States); McMillen, Colin D.; Kolis, Joseph [Department of Chemistry, Clemson University, Clemson, South Carolina 29634 (United States)] [Department of Chemistry, Clemson University, Clemson, South Carolina 29634 (United States); Giesber, Henry G.; Egan, John J. [Advanced Photonic Crystals LLC, Fort Mill, South Carolina 29708 (United States)] [Advanced Photonic Crystals LLC, Fort Mill, South Carolina 29708 (United States)

    2014-03-15T23:59:59.000Z

    We have developed an angle-resolved photoemission spectrometer with tunable vacuum ultraviolet laser as a photon source. The photon source is based on the fourth harmonic generation of a near IR beam from a Ti:sapphire laser pumped by a CW green laser and tunable between 5.3 eV and 7 eV. The most important part of the set-up is a compact, vacuum enclosed fourth harmonic generator based on potassium beryllium fluoroborate crystals, grown hydrothermally in the US. This source can deliver a photon flux of over 10{sup 14} photon/s. We demonstrate that this energy range is sufficient to measure the k{sub z} dispersion in an iron arsenic high temperature superconductor, which was previously only possible at synchrotron facilities.

  15. Time-resolved broadband cavity-enhanced absorption spectroscopy for chemical kinetics.

    SciTech Connect (OSTI)

    Sheps, Leonid; Chandler, David W.

    2013-04-01T23:59:59.000Z

    Experimental measurements of elementary reaction rate coefficients and product branching ratios are essential to our understanding of many fundamentally important processes in Combustion Chemistry. However, such measurements are often impossible because of a lack of adequate detection techniques. Some of the largest gaps in our knowledge concern some of the most important radical species, because their short lifetimes and low steady-state concentrations make them particularly difficult to detect. To address this challenge, we propose a novel general detection method for gas-phase chemical kinetics: time-resolved broadband cavity-enhanced absorption spectroscopy (TR-BB-CEAS). This all-optical, non-intrusive, multiplexed method enables sensitive direct probing of transient reaction intermediates in a simple, inexpensive, and robust experimental package.

  16. Can a variable gravitational constant resolve the Faint Young Sun Paradox ?

    E-Print Network [OSTI]

    Varun Sahni; Yuri Shtanov

    2014-11-05T23:59:59.000Z

    Solar models suggest that four billion years ago the young Sun was about 25% fainter than it is today, rendering Earth's oceans frozen and lifeless. However, there is ample geophysical evidence that Earth had a liquid ocean teeming with life 4 Gyr ago. Since ${\\cal L_\\odot} \\propto G^7M_\\odot^5$, the Sun's luminosity ${\\cal L_\\odot}$ is exceedingly sensitive to small changes in the gravitational constant $G$. We show that a percent-level increase in $G$ in the past would have prevented Earth's oceans from freezing, resolving the faint young Sun paradox. Such small changes in $G$ are consistent with observational bounds on ${\\Delta G}/G$. Since ${\\cal L}_{\\rm SNIa} \\propto G^{-3/2}$, an increase in $G$ leads to fainter supernovae, creating tension between standard candle and standard ruler probes of dark energy. Precisely such a tension has recently been reported by the Planck team.

  17. Resolved debris disk emission around eta Tel: a young Solar System or ongoing planet formation?

    E-Print Network [OSTI]

    R. Smith; L. J. Churcher; M. C. Wyatt; M. M. Moerchen; C. M. Telesco

    2008-10-28T23:59:59.000Z

    60% of the A star members of the 12 Myr old beta Pictoris moving group (BPMG) show significant excess emission in the mid-infrared, several million years after the proto-planetary disk is thought to disperse. Theoretical models suggest this peak may coincide with the formation of Pluto-sized planetesimals in the disk, stirring smaller bodies into collisional destruction. Here we present resolved mid-infrared imaging of the disk of eta Tel (A0V in the BPMG) and consider its implications for the state of planet formation in this system. eta Tel was observed at 11.7 and 18.3um using T-ReCS on Gemini South. The resulting images were compared to simple disk models to constrain the radial distribution of the emitting material. The emission observed at 18.3um is shown to be significantly extended beyond the PSF along a position angle 8 degrees. This is the first time dust emission has been resolved around eta Tel. Modelling indicates that the extension arises from an edge-on disk of radius 0.5 arcsec (~24 AU). Combining the spatial constraints from the imaging with those from the spectral energy distribution shows that >50% of the 18um emission comes from an unresolved dust component at ~4 AU. The radial structure of the eta Tel debris disk is reminiscent of the Solar System, suggesting that this is a young Solar System analogue. For an age of 12Myr, both the radius and dust level of the extended cooler component are consistent with self-stirring models for a protoplanetary disk of 0.7 times minimum mass solar nebula. The origin of the hot dust component may arise in an asteroid belt undergoing collisional destruction, or in massive collisions in ongoing terrestrial planet formation.

  18. Time-resolved spectroscopy and photometry of the dwarf nova FS Aurigae in quiescence

    E-Print Network [OSTI]

    V. V. Neustroev

    2001-10-26T23:59:59.000Z

    We present results of non-simultaneous time-resolved photometric and spectroscopic observations of the little-studied dwarf nova FS Aur in quiescence. The spectrum of FS Aur shows strong and broad emission lines of hydrogen and HeI, and of weaker HeII 4686 and CIII/NIII blend, similar to other quiescent dwarf novae. All emission lines are single-peaked, however their form varies with orbital phase. Absorption lines from a late-type secondary are not detected. From the radial velocity measurements of the hydrogen lines H$_\\beta$ and H$_\\gamma$ we determined a most probable orbital period P=0.059+-0.002. This period agrees well with the 0.0595+-0.0001 estimate by Thorstensen et al. (1996). On the other hand, the period of photometric modulations is longer than the spectroscopic period and can be estimated as 3 hours. Longer time coverage during a single night is needed to resolve this problem. Using the semi-amplitude of the radial velocities, obtained from measurements of hydrogen and helium lines, and some empirical and theoretical relations we limited the basic parameters of the system: a mass ratio q>=0.22, a primary mass M_1=0.34 - 0.46 M_sun, a secondary mass M_2<= 0.1M_sun, and an inclination angle i=51^{\\circ} - 65^{\\circ}. Doppler tomography has shown at least two bright regions in the accretion disk of FS Aur. The first, brighter spot is located at phase about 0.6. The second spot is located opposite the first one and occupies an extensive area at phases about 0.85 - 1.15.

  19. A sea-state based source function for size and composition resolved marine aerosol

    SciTech Connect (OSTI)

    Long, Michael S [ORNL; Keene, William C [ORNL; Erickson III, David J [ORNL

    2011-01-01T23:59:59.000Z

    A parameterization for the size- and composition-resolved production fluxes of nascent marine aerosol was developed from prior experimental observations and extrapolated to ambient conditions based on estimates of air entrainment by the breaking of wind-driven ocean waves. Production of particulate organic carbon (OC{sub aer}) was parameterized based on Langmuir equilibrium-type association of organic matter to bubble plumes in seawater and resulting aerosol as constrained by measurements of aerosol produced from productive and oligotrophic seawater. This novel approach is the first to parameterize size- and composition-resolved aerosol production based on explicit evaluation of wind-driven air entrainment/detrainment fluxes and chlorophyll-a as a proxy for surfactants in surface seawater. Production fluxes were simulated globally with an eight aerosol-size-bin version of the NCAR Community Atmosphere Model (CAM v3.5.07). Simulated production fluxes fell within the range of published estimates based on observationally constrained parameterizations. Because the parameterization does not consider contributions from spume drops, the simulated global mass flux (1.5 x 10{sup 3} Tg y{sup -1}) is near the lower end of published estimates. The simulated production of aerosol number (1.4 x 10{sup 6} m{sup -2} s{sup -1}) and OC{sub aer} (29 Tg C y{sup -1}) fall near the upper end of published estimates and suggest that primary marine aerosols may have greater influences on the physicochemical evolution of the troposphere, radiative transfer and climate, and associated feedbacks on the surface ocean than suggested by previous model studies.

  20. Dwarf galaxies with ionizing radiation feedback. II. Spatially resolved star formation relation

    SciTech Connect (OSTI)

    Kim, Ji-hoon; Krumholz, Mark R.; Goldbaum, Nathan J. [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Wise, John H. [Center for Relativistic Astrophysics, School of Physics, Georgia Institute of Technology, Atlanta, GA 30332 (United States); Turk, Matthew J. [Department of Astronomy and Astrophysics, Columbia University, New York, NY 10027 (United States); Abel, Tom, E-mail: me@jihoonkim.org [Kavli Institute for Particle Astrophysics and Cosmology, Stanford University, Stanford, CA 94305 (United States)

    2013-12-10T23:59:59.000Z

    We investigate the spatially resolved star formation relation using a galactic disk formed in a comprehensive high-resolution (3.8 pc) simulation. Our new implementation of stellar feedback includes ionizing radiation as well as supernova explosions, and we handle ionizing radiation by solving the radiative transfer equation rather than by a subgrid model. Photoheating by stellar radiation stabilizes gas against Jeans fragmentation, reducing the star formation rate (SFR). Because we have self-consistently calculated the location of ionized gas, we are able to make simulated, spatially resolved observations of star formation tracers, such as H? emission. We can also observe how stellar feedback manifests itself in the correlation between ionized and molecular gas. Applying our techniques to the disk in a galactic halo of 2.3 × 10{sup 11} M {sub ?}, we find that the correlation between SFR density (estimated from mock H? emission) and H{sub 2} density shows large scatter, especially at high resolutions of ?75 pc that are comparable to the size of giant molecular clouds (GMCs). This is because an aperture of GMC size captures only particular stages of GMC evolution and because H? traces hot gas around star-forming regions and is displaced from the H{sub 2} peaks themselves. By examining the evolving environment around star clusters, we speculate that the breakdown of the traditional star formation laws of the Kennicutt-Schmidt type at small scales is further aided by a combination of stars drifting from their birthplaces and molecular clouds being dispersed via stellar feedback.

  1. Field-resolved measurement of reaction-induced spectral densities by polarizability response spectroscopy

    SciTech Connect (OSTI)

    Moran, Andrew M.; Nome, Rene A.; Scherer, Norbert F. [Department of Chemistry and the James Franck Institute, University of Chicago, 929 East 57th St., Chicago, Illinois 60637 (United States)

    2007-11-14T23:59:59.000Z

    The experimental design and theoretical description of a novel five-pulse laser spectroscopy is presented with an application to a pyridinium charge transfer complex in acetonitrile and methanol. In field-resolved polarizability response spectroscopy (PORS), an electronically resonant laser pulse first excites a solvated chromophore (reactant) and off-resonant Raman spectra of the resulting nuclear motions are measured as a function of the reaction time. The present apparatus differs from our earlier design by performing the Raman probe measurement (with fixed pulse delays) in the frequency domain. In addition, the full electric fields of the signals are measured by spectral interferometry to separate nonresonant and Raman responses. Our theoretical model shows how the PORS signal arises from nuclear motions that are displaced/driven by the photoinduced reaction. The field-resolved off-resonant (of the solute's electronic transitions) probing favors detection of solvent (as opposed to solute) dynamics coupled to the reaction. The sign of the signal represents the relative strengths of polarization responses associated with the ground and photoexcited solutions. Signatures of nonresonant and PORS signal contributions to the experimental results are analyzed with numerical calculations based on a theoretical model we have developed for reaction-induced PORS. Our model identifies two mechanisms of PORS signal generation: (i) structural relaxation induced resonance; (ii) dephasing induced resonance. In the charge transfer reaction investigated, the solvent-dependent and time-evolving (solvent) polarizability spectral density (PSD) is readily obtained. The general trend of an initial broadband inertial nuclear response followed by a decrease in the linewidth of the PSD establishes that the measured PSD is inconsistent with the approximation of a linear response. Furthermore, the explicit time evolution of the PSD is important for properly describing solvent control of reactions that do not satisfy the time-scale separability inherent to nonadiabatic kinetic models.

  2. Ice Formation in Arctic Mixed-Phase Clouds: Insights from a 3-D Cloud-Resolving Model with Size-Resolved Aerosol and Cloud Microphysics

    SciTech Connect (OSTI)

    Fan, Jiwen; Ovtchinnikov, Mikhail; Comstock, Jennifer M.; McFarlane, Sally A.; Khain, Alexander

    2009-02-27T23:59:59.000Z

    The single-layer mixed-phase clouds observed during the Atmospheric Radiation Measurement (ARM) program’s Mixed-Phase Arctic Cloud Experiment (MPACE) are simulated with a 3-dimensional cloud-resolving model the System for Atmospheric Modeling (SAM) coupled with an explicit bin microphysics scheme and a radar-lidar simulator. Two possible ice enhancement mechanisms – activation of droplet evaporation residues by condensation-followed-by-freezing and droplet freezing by contact freezing inside-out, are scrutinized by extensive comparisons with aircraft and radar and lidar measurements. The locations of ice initiation associated with each mechanism and the role of ice nuclei (IN) in the evolution of mixed-phase clouds are mainly addressed. Simulations with either mechanism agree well with the in-situ and remote sensing measurements on ice microphysical properties but liquid water content is slightly underpredicted. These two mechanisms give very similar cloud microphysical, macrophysical, dynamical, and radiative properties, although the ice nucleation properties (rate, frequency and location) are completely different. Ice nucleation from activation of evaporation nuclei is most efficient near cloud top areas concentrated on the edges of updrafts, while ice initiation from the drop freezing process has no significant location preference (occurs anywhere that droplet evaporation is significant). Both enhanced nucleation mechanisms contribute dramatically to ice formation with ice particle concentration of 10-15 times higher relative to the simulation without either of them. The contribution of ice nuclei (IN) recycling from ice particle evaporation to IN and ice particle concentration is found to be very significant in this case. Cloud can be very sensitive to IN initially and form a nonquilibrium transition condition, but become much less sensitive as cloud evolves to a steady mixed-phase condition. The parameterization of Meyers et al. [1992] with the observed MPACE IN concentration is able to predict the observed mixed-phase clouds reasonably well. This validation may facilitate the application of this parameterization in the cloud and climate models to simulate Arctic clouds.

  3. Vulnerability of Northwestern

    E-Print Network [OSTI]

    , USDA Forest Service Warren Lab, provided funding, inspiration, and a steady review of our analysis with geospatial data on their forest stands. We are grateful to Wendell Wallace, Laura Drake, Andrea Hille, Ed-parametric method of statistical analysis called Classification and Regression Tree analysis (CART®) on data about

  4. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect (OSTI)

    Boyer, Brian D. [Los Alamos National Laboratory

    2012-06-18T23:59:59.000Z

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  5. Abstract--Resolvers are absolute angle transducers that are usually used for position and speed measurement in

    E-Print Network [OSTI]

    Sontag, Eduardo

    have enabled sensorless control that reduces the total system operating cost by eliminating mechanical- mail: peter_harding@pgt.com.au). in a noisy environment. A resolver is basically a rotary transformer is fixed on the rotor, and therefore, it rotates jointly with the shaft passing the output windings. Two

  6. 11.1 DEVELOPMENT OF AN IMMERSED BOUNDARY METHOD TO RESOLVE COMPLEX TERRAIN IN THE WEATHER RESEARCH AND FORECASTING MODEL

    E-Print Network [OSTI]

    Chow, Fotini Katopodes

    11.1 DEVELOPMENT OF AN IMMERSED BOUNDARY METHOD TO RESOLVE COMPLEX TERRAIN IN THE WEATHER RESEARCH AND FORECASTING MODEL Katherine A. Lundquist1 , Fotini K. Chow 2 , Julie K. Lundquist 3 , and Jeffery D. Mirocha 3 in urban areas are profoundly influenced by the presence of build- ings which divert mean flow, affect

  7. High-Resolved X-ray Spectra of Hollow Atoms in a Femtosecond Laser-Produced Solid Plasma

    E-Print Network [OSTI]

    Umstadter, Donald

    High-Resolved X-ray Spectra of Hollow Atoms in a Femtosecond Laser-Produced Solid Plasma A. Ya and interpreted for the ¢rst time. It is shown that such spectra were generated by multicharged hollow ions-ray spectra of nano- and subnanosecond laser produced plasmas were intensively investigated during the last 20

  8. Probing Reaction Dynamics of Transition-Metal Complexes in Solution via Time-Resolved Soft X-ray Spectroscopy

    SciTech Connect (OSTI)

    Huse, Nils; Kim, Tae Kyu; Khalil, Munira; Jamula, Lindsey; McCusker, James K.; Schoenlein, Robert W.

    2010-05-02T23:59:59.000Z

    We report the first time-resolved soft x-ray measurements of solvated transition-metal complexes. L-edge spectroscopy directly probes dynamic changes in ligand-field splitting of 3d orbitals associated with the spin transition, and mediated by changes in ligand-bonding.

  9. Wavelength-resolved low-frequency noise of GaInN/GaN green light emitting diodes

    E-Print Network [OSTI]

    Wetzel, Christian M.

    Wavelength-resolved low-frequency noise of GaInN/GaN green light emitting diodes S. L. Rumyantseva well light emitting diodes. The light intensity noise was measured as a function of wavelength within the light emitting diode spectral emission line. The spectral noise density is found to increase

  10. Two new, single-isomer, sulfated ?-cyclodextrins for use as chiral resolving agents for enantiomer separations in capillary electrophoresis

    E-Print Network [OSTI]

    Busby, Michael Brent

    2006-08-16T23:59:59.000Z

    Two novel, single-isomer, sulfated cyclodextrins, the sodium salts of heptakis(2- O-methyl-3-O-acetyl-6-O-sulfo)cyclomaltoheptaose (HMAS) and heptakis(2-O-methyl- 6-O-sulfo)cyclomaltoheptaose (HMS) were used as chiral resolving agents in both...

  11. Time-resolved diffraction profiles and atomic dynamics in short-pulse laser-induced structural transformations: Molecular dynamics study

    E-Print Network [OSTI]

    Zhigilei, Leonid V.

    Time-resolved diffraction profiles and atomic dynamics in short-pulse laser-induced structural Short pico- and femtosecond pulse laser irradiation has the ability to bring material into a highly dynamics simulations of a 20 nm Au film irradiated with 200 fs laser pulses of different intensity

  12. Quantitative Analysis of Three-Dimensional-Resolved Fiber Architecture in Heterogeneous Skeletal Muscle Tissue Using NMR and Optical

    E-Print Network [OSTI]

    So, Peter

    Quantitative Analysis of Three-Dimensional-Resolved Fiber Architecture in Heterogeneous Skeletal Muscle Tissue Using NMR and Optical Imaging Methods Vitaly J. Napadow,* Qun Chen, Vu Mai, Peter T. C. So Center and Harvard Medical School, Boston, Massachusetts ABSTRACT The determination of principal fiber

  13. Design and implementation of a rapid-mixer flow-cell for time-resolved infrared microspectroscopy

    E-Print Network [OSTI]

    Yeh, Syun-Ru

    -resolved kinet- ics of the folding process following an external trigger into a metastable phase. Kinetics in a stainless steel block. The dead time of this mixer has been previously shown to be 20­50 s.7 The channel are pushed into the mixing well using a dual syringe pump Harvard Apparatus, model 33 . The resulting mixed

  14. Time-resolved study of polyimide absorption layers for blister-actuated laser-induced forward transfer

    E-Print Network [OSTI]

    Arnold, Craig B.

    Time-resolved study of polyimide absorption layers for blister-actuated laser-induced forward-induced formation of blisters on polyimide films in order to understand and optimize their role in BA-LIFT. We find and thermal effects that occur during the process. We further probe the influence of polyimide thickness

  15. Sub-100-ps structural dynamics of horse heart myoglobin probed by time-resolved X-ray solution scattering

    E-Print Network [OSTI]

    Ihee, Hyotcherl

    Sub-100-ps structural dynamics of horse heart myoglobin probed by time-resolved X-ray solution-slicing Structural dynamics Myoglobin a b s t r a c t Here we report sub-100-ps structural dynamics of horse heart rearrangement [27]. In this work, we extend the time-slicing scheme to a protein, horse heart myoglobin (Mb

  16. A Well-Resolved Phylogeny of the Trees of Puerto Rico Based on DNA Barcode Sequence Data

    E-Print Network [OSTI]

    Uriarte, Maria

    A Well-Resolved Phylogeny of the Trees of Puerto Rico Based on DNA Barcode Sequence Data Robert of America, 4 Department of Environmental Science, University of Puerto Rico, San Juan, Puerto Rico 00925 for 527 native and naturalized trees of Puerto Rico, representing the vast majority of the entire tree

  17. Isolating the role of mesoscale eddies in mixing of a passive tracer in an eddy resolving model

    E-Print Network [OSTI]

    Miami, University of

    Isolating the role of mesoscale eddies in mixing of a passive tracer in an eddy resolving model February 2008; published 16 May 2008. [1] This study examines the role of mesoscale eddies in distribution was replaced by a down-gradient diffusive parameterization. Our results demonstrate that advection by mesoscale

  18. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01T23:59:59.000Z

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  19. Studies of combustion reactions at the state-resolved differential cross section level

    SciTech Connect (OSTI)

    Houston, P.L.; Suits, A.G.; Bontuyan, L.S.; Whitaker, B.J. [Cornell Univ., Ithaca, NY (United States)

    1993-12-01T23:59:59.000Z

    State-resolved differential reaction cross sections provide perhaps the most detailed information about the mechanism of a chemical reaction, but heretofore they have been extremely difficult to measure. This program explores a new technique for obtaining differential cross sections with product state resolution. The three-dimensional velocity distribution of state-selected reaction products is determined by ionizing the appropriate product, waiting for a delay while it recoils along the trajectory imparted by the reaction, and finally projecting the spatial distribution of ions onto a two dimensional screen using a pulsed electric field. Knowledge of the arrival time allows the ion position to be converted to a velocity, and the density of velocity projections can be inverted mathematically to provide the three-dimensional velocity distribution for the selected product. The main apparatus has been constructed and tested using photodissociations. The authors report here the first test results using crossed beams to investigate collisions between Ar and NO. Future research will both develop further the new technique and employ it to investigate methyl radical, formyl radical, and hydrogen atom reactions which are important in combustion processes. The authors intend specifically to characterize the reactions of CH{sub 3} with H{sub 2} and H{sub 2}CO; of HCO with O{sub 2}; and of H with CH{sub 4}, CO{sub 2}, and O{sub 2}.

  20. Detection of nonlinear picosecond acoustic pulses by time-resolved Brillouin scattering

    SciTech Connect (OSTI)

    Gusev, Vitalyi E., E-mail: vitali.goussev@univ-lemans.fr [LUNAM Universités, CNRS, Université du Maine, LAUM UMR-CNRS 6613, Av. O. Messiaen, 72085 Le Mans (France)

    2014-08-14T23:59:59.000Z

    In time-resolved Brillouin scattering (also called picosecond ultrasonic interferometry), the time evolution of the spatial Fourier component of an optically excited acoustic strain distribution is monitored. The wave number is determined by the momentum conservation in photon-phonon interaction. For linear acoustic waves propagating in a homogeneous medium, the detected time-domain signal of the optical probe transient reflectivity shows a sinusoidal oscillation at a constant frequency known as the Brillouin frequency. This oscillation is a result of heterodyning the constant reflection from the sample surface with the Brillouin-scattered field. Here, we present an analytical theory for the nonlinear reshaping of a propagating, finite amplitude picosecond acoustic pulse, which results in a time-dependence of the observed frequency. In particular, we examine the conditions under which this information can be used to study the time-evolution of the weak-shock front speed. Depending on the initial strain pulse parameters and the time interval of its nonlinear transformation, our theory predicts the detected frequency to either be monotonically decreasing or oscillating in time. We support these theoretical predictions by comparison with available experimental data. In general, we find that picosecond ultrasonic interferometry of nonlinear acoustic pulses provides access to the nonlinear acoustic properties of a medium spanning most of the GHz frequency range.

  1. Discovery of 17 new sharp-lined Ap stars with magnetically resolved lines

    E-Print Network [OSTI]

    L. M. Freyhammer; V. G. Elkin; D. W. Kurtz; G. Mathys; P. Martinez

    2008-06-17T23:59:59.000Z

    Chemically peculiar A stars (Ap) are extreme examples of the interaction of atomic element diffusion processes with magnetic fields in stellar atmospheres. The rapidly oscillating Ap stars provide a means for studying these processes in 3D and are at the same time important for studying the pulsation excitation mechanism in A stars. As part of the first comprehensive, uniform, high resolution spectroscopic survey of Ap stars, which we are conducting in the southern hemisphere with the Michigan Spectral Catalogues as the basis of target selection, we report here the discovery of 17 new magnetic Ap stars having spectroscopically resolved Zeeman components from which we derive magnetic field moduli in the range 3 - 30 kG. Among these are 1) the current second-strongest known magnetic A star, 2) a double-lined Ap binary with a magnetic component and 3) an A star with particularly peculiar and variable abundances. Polarimetry of these stars is needed to constrain their field geometries and to determine their rotation periods. We have also obtained an additional measurement of the magnetic field of the Ap star HD 92499.

  2. Single-photon emission via Raman scattering from the levels with partially resolved hyperfine structure

    E-Print Network [OSTI]

    V. A. Reshetov; I. V. Yevseyev

    2009-11-24T23:59:59.000Z

    The probability of emission of a single photon via Raman scattering of laser pulse on the three-level $\\Lambda$ - type atom in microcavity is studied. The duration of the pulse is considered to be short enough, so that the hyperfine structure of the upper level remains totally unresolved, while that of the lower level is totally resolved. The coherent laser pulse is assumed to be in resonance with the transition between one hyperfine structure component of the lower atomic level and all hyperfine structure components of the upper level, while the quantized cavity field is assumed to be in resonance with the transition between the other hyperfine structure component of the lower level and all components of the upper one. The dependence of the photon emission probability on the mutual orientation of polarization vectors of the cavity mode and of the coherent laser pulse is analyzed. Particularly, the case is investigated, when the total electronic angular momentum of the lower atomic level equals 1/2, which is true for the ground states of alkali atoms employed in the experiments on deterministic single photon emission. It is shown, that in this case the probability of photon emission equals zero for collinear polarizations of the photon and of the laser pulse, and the probability obtains its maximum value, when the angle between their polarizations equals 60 degrees.

  3. A resolved debris disk around the candidate planet-hosting star HD95086

    E-Print Network [OSTI]

    Moór, A; Kóspál, Á; Szabó, Gy M; Apai, D; Balog, Z; Csengeri, T; Grady, C; Henning, Th; Juhász, A; Kiss, Cs; Pascucci, I; Szulágyi, J; Vavrek, R

    2013-01-01T23:59:59.000Z

    Recently, a new planet candidate was discovered on direct images around the young (10-17 Myr) A-type star HD95086. The strong infrared excess of the system indicates that, similarly to HR8799, {\\ss} Pic, and Fomalhaut, the star harbors a circumstellar disk. Aiming to study the structure and gas content of the HD95086 disk, and to investigate its possible interaction with the newly discovered planet, here we present new optical, infrared and millimeter observations. We detected no CO emission, excluding the possibility of an evolved gaseous primordial disk. Simple blackbody modeling of the spectral energy distribution suggests the presence of two spatially separate dust belts at radial distances of 6 and 64 AU. Our resolved images obtained with the Herschel Space Observatory reveal a characteristic disk size of ~6.0x5.4 arcsec (540x490 AU) and disk inclination of ~25 degree. Assuming the same inclination for the planet candidate's orbit, its re-projected radial distance from the star is 62 AU, very close to th...

  4. Time-resolved temperature study in a high-power impulse magnetron sputtering discharge

    SciTech Connect (OSTI)

    Britun, Nikolay; Palmucci, Maria; Konstantinidis, Stephanos [Chimie des Interactions Plasma-Surface (ChIPS), CIRMAP, Universite de Mons, 23 Place du Parc, B-7000 Mons (Belgium); Gaillard, Mireille [Groupe de Recherches sur l'Energetique des Milieux Ionises (GREMI), UMR 7344, Universite d'Orleans, 14 rue d'Issoudun, B.P. 6744, 45067 Orleans Cedex 2 (France); Snyders, Rony [Chimie des Interactions Plasma-Surface (ChIPS), CIRMAP, Universite de Mons, 23 Place du Parc, B-7000 Mons (Belgium); Materia Nova Research Center, Parc Initialis, B-7000 Mons (Belgium)

    2013-07-07T23:59:59.000Z

    The gas heating dynamics is studied in a high-power impulse magnetron sputtering discharge operating in Ar-N{sub 2} gas mixtures. The time-resolved rotational temperature analysis based on the spectral transition between the B{sup 2}{Sigma}{sub u}{sup +}-X{sup 2}{Sigma}{sub g}{sup +} energy levels in molecular nitrogen ion (N{sub 2}{sup +} First Negative Band) is undertaken for this purpose. The rotational temperature in the discharge is found to increase linearly during the plasma pulse being roughly independent on the nitrogen content in the examined range. Such a temperature increase is attributed to the bulk gas heating which is the result of collisions with the sputtered species. Two sputtered materials, Ti and W, are examined during the study. In the case of W sputtering, the gas heating is found to be more pronounced than in the Ti case, which is explained by more efficient energy exchange between the sputtered W atoms and the bulk gas atoms during the plasma on-time. The obtained temperature data are compared to the laser-induced fluorescence study of Ar metastable atoms performed recently in the same discharge in our group. The particularities related to gas thermalization as well as to validity of the utilized approach for characterization of the pulsed sputtering discharges are discussed.

  5. Dissecting the Homunculus nebula around Eta Carinae with spatially resolved near-infrared spectroscopy

    E-Print Network [OSTI]

    Nathan Smith

    2002-11-27T23:59:59.000Z

    Near-infrared emission lines provide unique diagnostics of the geometry, structure, kinematics, and excitation of eta Carinae's circumstellar ejecta, and give clues to the nature of its wind. The infrared spectrum is a strong function of position in eta Car's nebula, with a mix of intrinsic and reflected emission. Molecular hydrogen traces cool gas and dust in the polar lobes, while [Fe II] blankets their inner surfaces. These lines reveal the back wall of the SE polar lobe for the first time, and give the clearest picture yet of the 3-D geometry. Additionally, collisionally-excited [Fe II] reveals the kinematic structure of a recently discovered `Little Homunculus' expanding inside the larger one. Equatorial gas in the `Fan', on the other hand, shows a spectrum indicating recombination and fluorescent pumping. Some equatorial ejecta glow in the He I 10830 line, showing evidence for material ejected in the 1890 outburst of eta Car. Closer to the star, the compact `Weigelt blobs' are marginally resolved, allowing their infrared spectrum to be separated from the star for the first time. In general, infrared spectra reveal a coherent, directional dependence of excitation in the Homunculus: polar ejecta are collisionally excited, whereas equatorial ejecta are dominated by fluorescence and normal photoexcitation. These are important clues to the geometry of the central star's UV radiation field. Reflected near-infrared emission lines also reveal interesting latitudinal dependence in the stellar wind.

  6. Time-resolved x-ray diffraction techniques for bulk polycrystalline materials under dynamic loading

    SciTech Connect (OSTI)

    Lambert, P. K.; Hustedt, C. J.; Zhao, M.; Ananiadis, A. G.; Hufnagel, T. C. [Department of Materials Science and Engineering, Johns Hopkins University, Baltimore, Maryland 21218 (United States); Vecchio, K. S. [Department of NanoEngineering, University of California San Diego, La Jolla, California 92093 (United States); Huskins, E. L. [Oak Ridge Institute for Science and Education, Oak Ridge, Tennessee 37830 (United States); US Army Research Laboratory, Aberdeen Proving Ground, Aberdeen, Maryland 21005 (United States); Casem, D. T. [US Army Research Laboratory, Aberdeen Proving Ground, Aberdeen, Maryland 21005 (United States); Gruner, S. M. [Department of Physics, Cornell University, Ithaca, New York 14853 (United States); Cornell High Energy Synchrotron Source (CHESS), Cornell University, Ithaca, New York 14853 (United States); Kavli Institute at Cornell for Nanoscale Science, Cornell University, Ithaca, New York 14853 (United States); Tate, M. W.; Philipp, H. T.; Purohit, P.; Weiss, J. T. [Department of Physics, Cornell University, Ithaca, New York 14853 (United States); Woll, A. R. [Cornell High Energy Synchrotron Source (CHESS), Cornell University, Ithaca, New York 14853 (United States); Kannan, V.; Ramesh, K. T. [Department of Mechanical Engineering, Johns Hopkins University, Baltimore, Maryland 21218 (United States); Kenesei, P.; Okasinski, J. S.; Almer, J. [X-ray Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States)

    2014-09-15T23:59:59.000Z

    We have developed two techniques for time-resolved x-ray diffraction from bulk polycrystalline materials during dynamic loading. In the first technique, we synchronize a fast detector with loading of samples at strain rates of ?10{sup 3}–10{sup 4} s{sup ?1} in a compression Kolsky bar (split Hopkinson pressure bar) apparatus to obtain in situ diffraction patterns with exposures as short as 70 ns. This approach employs moderate x-ray energies (10–20 keV) and is well suited to weakly absorbing materials such as magnesium alloys. The second technique is useful for more strongly absorbing materials, and uses high-energy x-rays (86 keV) and a fast shutter synchronized with the Kolsky bar to produce short (?40??s) pulses timed with the arrival of the strain pulse at the specimen, recording the diffraction pattern on a large-format amorphous silicon detector. For both techniques we present sample data demonstrating the ability of these techniques to characterize elastic strains and polycrystalline texture as a function of time during high-rate deformation.

  7. Spatially resolving the very high energy emission from MGRO J2019+37 with VERITAS

    SciTech Connect (OSTI)

    Aliu, E.; Errando, M. [Department of Physics and Astronomy, Barnard College, Columbia University, NY 10027 (United States); Aune, T. [Department of Physics and Astronomy, University of California, Los Angeles, CA 90095 (United States); Behera, B.; Chen, X.; Federici, S. [DESY, Platanenallee 6, D-15738 Zeuthen (Germany); Beilicke, M.; Buckley, J. H.; Bugaev, V. [Department of Physics, Washington University, St. Louis, MO 63130 (United States); Benbow, W.; Cerruti, M. [Fred Lawrence Whipple Observatory, Harvard-Smithsonian Center for Astrophysics, Amado, AZ 85645 (United States); Berger, K. [Department of Physics and Astronomy and the Bartol Research Institute, University of Delaware, Newark, DE 19716 (United States); Bird, R. [School of Physics, University College Dublin, Belfield, Dublin 4 (Ireland); Bouvier, A. [Santa Cruz Institute for Particle Physics and Department of Physics, University of California, Santa Cruz, CA 95064 (United States); Ciupik, L. [Astronomy Department, Adler Planetarium and Astronomy Museum, Chicago, IL 60605 (United States); Connolly, M. P. [School of Physics, National University of Ireland Galway, University Road, Galway (Ireland); Cui, W. [Department of Physics, Purdue University, West Lafayette, IN 47907 (United States); Dumm, J. [School of Physics and Astronomy, University of Minnesota, Minneapolis, MN 55455 (United States); Dwarkadas, V. V. [Department of Astronomy and Astrophysics, University of Chicago, Chicago, IL 60637 (United States); Falcone, A., E-mail: ealiu@astro.columbia.edu, E-mail: nahee@uchicago.edu [Department of Astronomy and Astrophysics, 525 Davey Lab, Pennsylvania State University, University Park, PA 16802 (United States); and others

    2014-06-10T23:59:59.000Z

    We present very high energy (VHE) imaging of MGRO J2019+37 obtained with the VERITAS observatory. The bright extended (?2°) unidentified Milagro source is located toward the rich star formation region Cygnus-X. MGRO J2019+37 is resolved into two VERITAS sources. The faint, point-like source VER J2016+371 overlaps CTB 87, a filled-center remnant (SNR) with no evidence of a supernova remnant shell at the present time. Its spectrum is well fit in the 0.65-10 TeV energy range by a power-law model with photon index 2.3 ± 0.4. VER J2019+378 is a bright extended (?1°) source that likely accounts for the bulk of the Milagro emission and is notably coincident with PSR J2021+3651 and the star formation region Sh 2–104. Its spectrum in the range 1-30 TeV is well fit with a power-law model of photon index 1.75 ± 0.3, among the hardest values measured in the VHE band, comparable to that observed near Vela-X. We explore the unusual spectrum and morphology in the radio and X-ray bands to constrain possible emission mechanisms for this source.

  8. FULLY RESOLVED QUIET-SUN MAGNETIC FLUX TUBE OBSERVED WITH THE SUNRISE/IMAX INSTRUMENT

    SciTech Connect (OSTI)

    Lagg, A.; Solanki, S. K.; Riethmueller, T. L.; Schuessler, M.; Hirzberger, J.; Feller, A.; Borrero, J. M.; Barthol, P.; Gandorfer, A. [Max-Planck-Institut fuer Sonnensystemforschung, Max-Planck-Strasse 2, 37191 Katlenburg-Lindau (Germany); MartInez Pillet, V.; Bonet, J. A. [Instituto de Astrofisica de Canarias, C/Via Lactea s/n, 38200 La Laguna, Tenerife (Spain); Schmidt, W.; Berkefeld, T. [Kiepenheuer-Institut fuer Sonnenphysik, Schoeneckstrasse 6, 79104 Freiburg (Germany); Del Toro Iniesta, J. C. [Instituto de Astrofisica de AndalucIa (CSIC), Apartado de Correos 3004, 18080 Granada (Spain); Domingo, V. [Grupo de AstronomIa y Ciencias del Espacio, Universidad de Valencia, 46980 Paterna, Valencia (Spain); Knoelker, M. [High Altitude Observatory, National Center for Atmospheric Research, P.O. Box 3000, Boulder, CO 80307-3000 (United States); Title, A. M., E-mail: lagg@mps.mpg.d [Lockheed Martin Solar and Astrophysics Laboratory, Bldg. 252, 3251 Hanover Street, Palo Alto, CA 94304 (United States)

    2010-11-10T23:59:59.000Z

    Until today, the small size of magnetic elements in quiet-Sun areas has required the application of indirect methods, such as the line-ratio technique or multi-component inversions, to infer their physical properties. A consistent match to the observed Stokes profiles could only be obtained by introducing a magnetic filling factor that specifies the fraction of the observed pixel filled with magnetic field. Here, we investigate the properties of a small magnetic patch in the quiet Sun observed with the IMaX magnetograph on board the balloon-borne telescope SUNRISE with unprecedented spatial resolution and low instrumental stray light. We apply an inversion technique based on the numerical solution of the radiative transfer equation to retrieve the temperature stratification and the field strength in the magnetic patch. The observations can be well reproduced with a one-component, fully magnetized atmosphere with a field strength exceeding 1 kG and a significantly enhanced temperature in the mid to upper photosphere with respect to its surroundings, consistent with semi-empirical flux tube models for plage regions. We therefore conclude that, within the framework of a simple atmospheric model, the IMaX measurements resolve the observed quiet-Sun flux tube.

  9. ORNL Resolved Resonance Covariance Generation for ENDF/B-VII.1

    SciTech Connect (OSTI)

    Leal, Luiz C. [ORNL; Guber, Klaus H. [ORNL; Wiarda, Dorothea [ORNL] [ORNL; Arbanas, Goran [ORNL] [ORNL; Derrien, Herve [ORNL] [ORNL; Sayer, Royce O. [ORNL; Larson, Nancy M. [ORNL; Dunn, Michael E. [ORNL

    2012-12-01T23:59:59.000Z

    Resonance-parameter covariance matrix (RPCM) evaluations in the resolved resonance regionwere done at the Oak Ridge National Laboratory (ORNL) for the chromium isotopes, titanium isotopes, 19F, 58Ni, 60Ni, 35Cl, 37Cl, 39K, 41K, 55Mn, 233U, 235U, 238U, and 239Pu using the computer code SAMMY. The retroactive approach of the code SAMMY was used to generate the RPCMs for 233U. For 235U, the approach used for covariance generation was similar to the retroactive approach with the distinction that real experimental data were used as opposed to data generated from the resonance parameters. RPCMs for 238U and 239Pu were generated together with the resonance parameter evaluations. The RPCMs were then converted in the ENDF format using the FILE32 representation. Alternatively, for computer storage reasons, the FILE32 was converted in the FILE33 cross section covariance matrix (CSCM). Both representations were processed using the computer code PUFF-IV. This paper describes the procedures used to generate the RPCM and CSCM in the resonance region for ENDF/B-VII.1. The impact of data uncertainty in nuclear reactor benchmark calculations is also presented.

  10. New Resolved Resonance Region Evaluation for 63Cu and 65Cu for Nuclear Criticality Safety Program

    SciTech Connect (OSTI)

    Sobes, Vladimir [ORNL] [ORNL; Leal, Luiz C [ORNL] [ORNL; Guber, Klaus H [ORNL] [ORNL; Forget, Benoit [Massachusetts Institute of Technology (MIT)] [Massachusetts Institute of Technology (MIT); Kopecky, S. [EC-JRC-IRMM, Geel, Belgium] [EC-JRC-IRMM, Geel, Belgium; Schillebeeckx, P. [EC-JRC-IRMM, Geel, Belgium] [EC-JRC-IRMM, Geel, Belgium; Siegler, P. [EC-JRC-IRMM, Geel, Belgium] [EC-JRC-IRMM, Geel, Belgium

    2014-01-01T23:59:59.000Z

    A new resolved resonance region evaluation of 63Cu and 65Cu was done in the energy region from 10-5 eV to 99.5 keV. The R-Matrix SAMMY method using the Reich-Moore approximation was used to create a new set of consistent resonance parameters. The new evaluation was based on three experimental transmission data sets; two measured at ORELA and one from MITR, and two radiative capture experimental data sets from GELINA. A total of 141 new resonances were identied for 63Cu and 117 for 65Cu. The corresponding set of external resonances for each isotope was based on the identied resonances above 99.5 keV from the ORELA transmission data. The negative external levels (bound levels) were determined to match the dierential thermal cross section measured at the MITR. Double dierential elastic scattering cross sections were calculated from the new set of resonance parameters. Benchmarking calculations were carried out on a set of ICSBEP benchmarks. This work is in support of the DOE Nuclear Criticality Safety Program.

  11. THE PANCHROMATIC HUBBLE ANDROMEDA TREASURY. III. MEASURING AGES AND MASSES OF PARTIALLY RESOLVED STELLAR CLUSTERS

    SciTech Connect (OSTI)

    Beerman, Lori C.; Johnson, L. Clifton; Fouesneau, Morgan; Dalcanton, Julianne J.; Weisz, Daniel R.; Williams, Ben F. [Department of Astronomy, University of Washington, Box 351580, Seattle, WA 98195 (United States); Seth, Anil C. [Department of Physics and Astronomy, University of Utah, Salt Lake City, UT 84112 (United States); Bell, Eric F. [Department of Astronomy, University of Michigan, 500 Church Street, Ann Arbor, MI 48109 (United States); Bianchi, Luciana C. [Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218 (United States); Caldwell, Nelson [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Dolphin, Andrew E. [Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756 (United States); Gouliermis, Dimitrios A. [Zentrum fuer Astronomie, Institut fuer Theoretische Astrophysik, Universitaet Heidelberg, Albert-Ueberle-Strasse 2, D-69120 Heidelberg (Germany); Kalirai, Jason S. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Larsen, Soren S. [Department of Astrophysics, IMAPP, Radboud University Nijmegen, P.O. Box 9010, NL-6500 GL Nijmegen (Netherlands); Melbourne, Jason L. [Caltech Optical Observatories, Division of Physics, Mathematics and Astronomy, Mail Stop 301-17, California Institute of Technology, Pasadena, CA 91125 (United States); Rix, Hans-Walter [Max-Planck-Institut fuer Astronomie, Koenigstuhl 17, D-69117 Heidelberg (Germany); Skillman, Evan D., E-mail: beermalc@astro.washington.edu [Department of Astronomy, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States)

    2012-12-01T23:59:59.000Z

    The apparent age and mass of a stellar cluster can be strongly affected by stochastic sampling of the stellar initial mass function (IMF), when inferred from the integrated color of low-mass clusters ({approx}<10{sup 4} M {sub Sun }). We use simulated star clusters to show that these effects are minimized when the brightest, rapidly evolving stars in a cluster can be resolved, and the light of the fainter, more numerous unresolved stars can be analyzed separately. When comparing the light from the less luminous cluster members to models of unresolved light, more accurate age estimates can be obtained than when analyzing the integrated light from the entire cluster under the assumption that the IMF is fully populated. We show the success of this technique first using simulated clusters, and then with a stellar cluster in M31. This method represents one way of accounting for the discrete, stochastic sampling of the stellar IMF in less massive clusters and can be leveraged in studies of clusters throughout the Local Group and other nearby galaxies.

  12. Fourier resolved spectroscopy of 4U 1543-47 during the 2002 outburst

    E-Print Network [OSTI]

    P. Reig; I. E. Papadakis; C. R. Shrader; D. Kazanas

    2006-02-23T23:59:59.000Z

    We have obtained Fourier-resolved spectra of the black-hole binary 4U 1543-47 in the canonical states (high/soft, very high, intermediate and low/hard) observed in this source during the decay of an outburst that took place in 2002. Our objective is to investigate the variability of the spectral components generally used to describe the energy spectra of black-hole systems, namely a disk component, a power-law component attributed to Comptonization by a hot corona and the contribution of the iron line due to reprocessing of the high energy (E > 7 keV) radiation. We find that i) the disk component is not variable on time scales shorter than ~100 seconds, ii) the reprocessing emission as manifest by the variability of the Fe Kalpha line responds to the primary radiation variations down to time scales of ~70 ms in the high and very-high states, but longer than 2 s in the low state, iii) the low-frequency QPOs are associated with variations of the X-ray power law spectral component and not to the disk component and iv) the spectra corresponding to the highest Fourier frequency are the hardest (show the flatter spectra) at a given spectral state. These results question models that explain the observed power spectra as due to modulations of the accretion rate alone, as such models do not provide any apparent reason for a Fourier frequency dependence of the power law spectral indices.

  13. Fourier Resolved Spectroscopy of the XMM-Newton Observations of MCG -6-30-15

    E-Print Network [OSTI]

    I. E. Papadakis; D. Kazanas; A. Akylas

    2005-06-14T23:59:59.000Z

    We study the Frequency Resolved Spectra of the Seyfert galaxy MCG -6-30-15 obtained during two recent XMM-Newton observations. Splitting the Fourier spectra in soft (2 keV) bands, we find that the soft band has a variability amplitude larger than the hard one on time scales longer than 10 ksec, while the opposite is true on time scales shorter than 3 ksec. Both the soft and hard band spectra are well fitted by power laws of different indices. The spectra of the hard band become clearly softer as the Fourier Frequency decreases from 7x10^{-4} Hz to 10^{-5} Hz, while the spectral slope of the soft band power law component is independent of the Fourier frequency. The well known broad Fe Ka feature is absent at all frequency bins; this result implies that this feature is not variable on time scales shorter than ~10^5 sec, in agreement with recent line variability studies. Strong spectral features are also present in the soft X-ray band (at E~0.7), clearly discernible in all Fourier Frequency bins. This fact is consistent with the assumption that they are due to absorption by intervening matter within the source.

  14. Pixel array detector for time-resolved x-ray scattering

    SciTech Connect (OSTI)

    Rodricks, B.G. [Argonne National Lab., IL (United States); Barna, S.L.; Gruner, S.M.; Shepherd, J.A.; Tate, M.W.; Wixted, R.L. [Princeton Univ., NJ (United States). Dept. of Physics

    1996-01-01T23:59:59.000Z

    This paper describes the development of a large-area hybrid pixel detector designed for time-resolved synchrotron x-ray scattering experiments where limited frames, with a high framing rate, is required. The final design parameters call for a 1024{times}1O24 pixel array device with 150-micron pixels that is 100% quantum efficient for x-rays with energy up to 20 keV, with a framing rate in the microsecond range. The device will consist of a fully depleted diode array bump bonded to a CMOS electronic storage capacitor array with eight frames per pixel. The two devices may be separated by a x-ray blocking layer that protects the radiation-sensitive electronics layer from damage. The signal is integrated in the electronics layer and stored in one of eight CMOS capacitors. After eight frames are taken, the data are then read out, using clocking electronics external to the detector, and stored in a RAM disk. Results will be presented on the development of a prototype 4{times}4 pixel electronics layer that is capable of storing at least 10,000 12-keV x-ray photons for a capacity of over 50 million electrons with a noise corresponding to 2 x-ray photons per pixel. The diode detective layer, electronics storage layer along with the radiation damage and blocking layers will be discussed.

  15. Spectrally resolved detection of sodium in the atmosphere of HD189733b with the HARPS spectrograph

    E-Print Network [OSTI]

    Wyttenbach, A; Lovis, C; Udry, S; Pepe, F

    2015-01-01T23:59:59.000Z

    Atmospheric properties of exoplanets can be constrained with transit spectroscopy. The signature of atomic sodium NaI, known to be present above the clouds, is a powerful probe of the upper atmosphere, where it can be best detected and characterized at high spectral resolution. Our goal is to obtain a high-resolution transit spectrum of HD189733b in the region around the resonance doublet of NaI at 589 nm, to characterize the absorption signature previously detected from space at low resolution. We analyze archival transit data of HD189733b obtained with the HARPS spectrograph. We retrieve the transit spectrum and light curve of the planet, implementing corrections for telluric contamination and planetary orbital motion. We spectrally resolve the NaI D doublet and measure line contrasts of $0.64\\pm0.07\\%$ (D2) and $0.40\\pm0.07\\%$ (D1) and FWHMs of $0.52\\pm0.08~\\AA$. This corresponds to a detection at the 10-$\\sigma$ level of excess of absorption of $0.32\\pm0.03\\%$ in a passband of $2\\times0.75\\ \\AA$ centered ...

  16. Position and energy-resolved particle detection using phonon-mediated microwave kinetic inductance detectors

    SciTech Connect (OSTI)

    Moore, D. C.; Golwala, S. R.; Cornell, B. [Division of Physics, Mathematics and Astronomy, California Institute of Technology, Pasadena, California 91125 (United States); Bumble, B.; Day, P. K.; LeDuc, H. G. [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109 (United States); Zmuidzinas, J. [Division of Physics, Mathematics and Astronomy, California Institute of Technology, Pasadena, California 91125 (United States); Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109 (United States)

    2012-06-04T23:59:59.000Z

    We demonstrate position and energy-resolved phonon-mediated detection of particle interactions in a silicon substrate instrumented with an array of microwave kinetic inductance detectors (MKIDs). The relative magnitude and delay of the signal received in each sensor allow the location of the interaction to be determined with < or approx. 1mm resolution at 30 keV. Using this position information, variations in the detector response with position can be removed, and an energy resolution of {sigma}{sub E} = 0.55 keV at 30 keV was measured. Since MKIDs can be fabricated from a single deposited film and are naturally multiplexed in the frequency domain, this technology can be extended to provide highly pixelized athermal phonon sensors for {approx}1 kg scale detector elements. Such high-resolution, massive particle detectors would be applicable to rare-event searches such as the direct detection of dark matter, neutrinoless double-beta decay, or coherent neutrino-nucleus scattering.

  17. A microreactor array for spatially resolved measurement of catalytic activity for high-throughput catalysis science

    SciTech Connect (OSTI)

    Kondratyuk, Petro; Gumuslu, Gamze; Shukla, Shantanu; Miller, James B.; Morreale, Bryan D.; Gellman, Andrew J.

    2013-04-01T23:59:59.000Z

    We describe a 100 channel microreactor array capable of spatially resolved measurement of catalytic activity across the surface of a flat substrate. When used in conjunction with a composition spread alloy film (CSAF, e.g. Pd{sub x}Cu{sub y}Au{sub 1-x-y}) across which component concentrations vary smoothly, such measurements permit high-throughput analysis of catalytic activity and selectivity as a function of catalyst composition. In the reported implementation, the system achieves spatial resolution of 1 mm{sup 2} over a 10×10 mm{sup 2} area. During operation, the reactant gases are delivered at constant flow rate to 100 points of differing composition on the CSAF surface by means of a 100-channel microfluidic device. After coming into contact with the CSAF catalyst surface, the product gas mixture from each of the 100 points is withdrawn separately through a set of 100 isolated channels for analysis using a mass spectrometer. We demonstrate the operation of the device on a Pd{sub x}Cu{sub y}Au{sub 1-x-y} CSAF catalyzing the H{sub 2}-D{sub 2} exchange reaction at 333 K. In essentially a single experiment, we measured the catalytic activity over a broad swathe of concentrations from the ternary composition space of the Pd{sub x}Cu{sub y}Au{sub 1-x-y} alloy.

  18. Resolving the High Energy Universe with Strong Gravitational Lensing: The Case of PKS 1830-211

    E-Print Network [OSTI]

    Barnacka, Anna; Dell'Antonio, Ian P; Benbow, Wystan

    2015-01-01T23:59:59.000Z

    Gravitational lensing is a potentially powerful tool for elucidating the origin of gamma-ray emission from distant sources. Cosmic lenses magnify the emission from distance sources and produce time delays between mirage images. Gravitationally-induced time delays depend on the position of the emitting regions in the source plane. The Fermi/LAT satellite continuously monitors the entire sky and detects gamma-ray flares, including those from gravitationally-lensed blazars. Therefore, temporal resolution at gamma-ray energies can be used to measure these time delays, which, in turn, can be used to resolve the origin of the gamma-ray flares spatially. We provide a guide to the application and Monte Carlo simulation of three techniques for analyzing these unresolved light curves: the Autocorrelation Function, the Double Power Spectrum, and the Maximum Peak Method. We apply these methods to derive time delays from the gamma-ray light curve of the gravitationally-lensed blazar PKS 1830-211. The result of temporal an...

  19. Snapshot metallicity estimate of resolved stellar systems through Lick Fe5270 diagnostic

    E-Print Network [OSTI]

    Buzzoni, Alberto; Chavez, Miguel

    2009-01-01T23:59:59.000Z

    We outline a new method to derive a "snapshot" metallicity estimate of stellar systems (providing one resolves at least the brightest part of the CMD) just on the basis of low-resolution (i.e., 6-8A FWHM) spectroscopy of a small stellar sample. Our method relies on the Fe5270 Lick index measurements and takes advantage of the special behavior of this spectral feature, that reaches its maximum strength among the ubiquitous component of K-type giants. This makes the Fe5270(max} estimate a robust and model-independent tracer of cluster [Fe/H], being particularly insensitive to the age of the stellar population. A comparison of the Fe5270(max) distribution derived from globular and open clusters, as well as from the field giant population in the Galaxy disk, confirms a tight correlation of the index maximum vs. cluster [Fe/H] allover the entire metallicity range for stellar population with [Fe/H] >~ -2.0. Relying on a theoretical calibration of the feature, we trust to effectively infer cluster metallicity within...

  20. Resolving the nucleus of Centaurus A at mid-IR wavelengths

    E-Print Network [OSTI]

    Burtscher, Leonard; Jaffe, Walter; Tristram, Konrad R W; Röttgering, Huub J A

    2010-01-01T23:59:59.000Z

    We have observed Centaurus A with the MID-infrared Interferometric instrument (MIDI) at the Very Large Telescope Interferometer (VLTI) at resolutions of 7 - 15 mas (at 12.5 micron) and filled gaps in the (u,v) coverage in comparison to earlier measurements. We are now able to describe the nuclear emission in terms of geometric components and derive their parameters by fitting models to the interferometric data. With simple geometrical models, the best fit is achieved for an elongated disk with flat intensity profile with diameter 76 +/- 9 mas x 35 +/- 2 mas (1.41 +/- 0.17 pc x 0.65 +/- 0.03 pc) whose major axis is oriented at a position angle (PA) of 10.1 +/- 2.2 degrees east of north. A point source contributes 47 +/- 11 % of the nuclear emission at 12.5 micron. There is also evidence that neither such a uniform nor a Gaussian disk are good fits to the data. This indicates that we are resolving more complicated small-scale structure in AGNs with MIDI, as has been seen in Seyfert galaxies previously observed ...

  1. High-speed, energy-resolved, STJ observations of the AM Her system V2301 Oph

    E-Print Network [OSTI]

    A. P. Reynolds; G. Ramsay; J. H. J. de Bruijne; M. A. C. Perryman; M. Cropper; C. M. Bridge; A. Peacock

    2005-02-02T23:59:59.000Z

    We present high time-resolution optical energy-resolved photometry of the eclipsing cataclysmic variable V2301 Oph made using the ESA S-Cam detector, an array of photon counting super-conducting tunnel junction (STJ) devices with intrinsic energy resolution. Three eclipses were observed, revealing considerable variation in the eclipse shape, particularly during ingress. The eclipse shape is shown to be understood in terms of AM Her accretion via a bright stream, with very little contribution from the white dwarf photosphere and/or hotspot. About two thirds of the eclipsed light arises in the threading region. Variation in the extent of the threading region can account for most of the variations observed between cycles. Spectral fits to the data reveal a 10,000K blackbody continuum with strong, time-varying emission lines of hydrogen and helium. This is the first time that stellar emission lines have been detected in the optical band using a non-dispersive photon-counting system.

  2. A split imaging spectrometer for temporally and spatially resolved titanium absorption spectroscopy

    SciTech Connect (OSTI)

    Hager, J. D., E-mail: hager@lanl.gov; Lanier, N. E.; Kline, J. L.; Flippo, K. A. [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States); Bruns, H. C.; Schneider, M.; Saculla, M.; McCarville, T. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States)

    2014-11-15T23:59:59.000Z

    We present a temporally and a spatially resolved spectrometer for titanium x-ray absorption spectroscopy along 2 axial symmetric lines-of-sight. Each line-of-sight of the instrument uses an elliptical crystal to acquire both the 2p and 3p Ti absorption lines on a single, time gated channel of the instrument. The 2 axial symmetric lines-of-sight allow the 2p and 3p absorption features to be measured through the same point in space using both channels of the instrument. The spatially dependent material temperature can be inferred by observing the 2p and the 3p Ti absorption features. The data are recorded on a two strip framing camera with each strip collecting data from a single line-of-sight. The design is compatible for use at both the OMEGA laser and the National Ignition Facility. The spectrometer is intended to measure the material temperature behind a Marshak wave in a radiatively driven SiO{sub 2} foam with a Ti foam tracer. In this configuration, a broad band CsI backlighter will be used for a source and the Ti absorption spectrum measured.

  3. Final Report Spacially-Resolved Diagnostics and Modeling of Micro-Discharges

    SciTech Connect (OSTI)

    Vincent M. Donnelly; Demetre J. Economou

    2012-08-09T23:59:59.000Z

    Optical emission spectroscopy measurements were performed with added trace probe gases in an atmospheric pressure direct current (DC) helium microplasma. Spatially resolved measurements (resolution {approx} 6 {micro}m) were taken across a 200 {micro}m slot-type discharge. Stark splitting of the hydrogen Balmer-line was used to investigate the electric field distribution in the cathode sheath region. Electron densities were evaluated from the analysis of the spectral line broadenings of H-{beta} emission. The electron density in the bulk plasma was in the range 3-8 x 1013 cm-3. The electric field peaked at the cathode ({approx}60 kV/cm) and decayed to small values over a distance of {approx} 50 {micro}m (sheath edge) from the cathode. These experimental data were in good agreement with a self-consistent one-dimensional model of the discharge. The dependence of gas temperature on gas flow through the slot-type, atmospheric pressure microplasma in helium or argon was investigated by a combination of experiments and modeling. Spatially-resolved gas temperature profiles across the gap between the two electrodes were obtained from rotational analysis of N{sub 2} (C{sup 3}II{sub u} {yields} B{sup 3} II{sub g}) emission spectra, with small amounts of N{sub 2} added as actinometer gas. Under the same input power of 20 kW/cm{sup 3}, the peak gas temperature in helium ({approx}650 K) was significantly lower than that in argon (over 1200 K). This reflects the much higher thermal conductivity of helium gas. The gas temperature decreased with increasing gas flow rate, more so in argon compared to helium. This was consistent with the fact that conductive heat losses dominate in helium microplasmas, while convective heat losses play a major role in argon microplasmas. A plasma-gas flow simulation of the microdischarge, including a chemistry set, a compressible Navier-Stokes (and mass continuity) equation, and a convective heat transport equation, was also performed. Experimental measurements were in good agreement with simulation predictions. Finally, laser scattering experiments were performed at pressures of 100s of Torr in argon or nitrogen. Laser Thomson Scattering (LTS) and Rotational Raman Scattering were employed in a novel, backscattering, confocal configuration. LTS allows direct and simultaneous measurement of both electron density (ne) and electron temperature (Te). For 50 mA current and over the pressure range of 300-700 Torr, LTS yielded Te = 0.9 {+-} 0.3 eV and ne = (6 {+-} 3) 1013 cm-3, in reasonable agreement with the predictions of a mathematical model. Rotational Raman spectroscopy (RRS) was employed for absolute calibration of the LTS signal. RRS was also applied to measure the 3D gas temperature (Tg) in nitrogen DC microdischarges. In addition, diode laser absorption spectroscopy was employed to measure the density of argon metastables (1s5 in Paschen notations) in argon microdischarges. The gas temperature, extracted from the width of the absorption profile, was compared with Tg values obtained by optical emission spectroscopy.

  4. Femtosecond time-resolved photoemission electron microscopy for spatiotemporal imaging of photogenerated carrier dynamics in semiconductors

    SciTech Connect (OSTI)

    Fukumoto, Keiki, E-mail: fukumoto.k.ab@m.titech.ac.jp; Yamada, Yuki; Matsuki, Takashi; Koshihara, Shin-ya [Department of Materials Science, Tokyo Institute of Technology, Oookayama, Meguro-ku, Tokyo 152-8550 (Japan); Japan Science and Technology Agency JST-CREST, Honcho, Kawaguchi, Saitama 332-0012 (Japan); Onda, Ken [Interactive Research Center of Science, Tokyo Institute of Technology, Nagatsuta, Midori-ku, Yokohama 226-8502 (Japan); Japan Science and Technology Agency JST-PRESTO, Honcho, Kawaguchi, Saitama 332-0012 (Japan); Mukuta, Tatsuhiko; Tanaka, Sei-ichi [Department of Materials Science, Tokyo Institute of Technology, Oookayama, Meguro-ku, Tokyo 152-8550 (Japan)

    2014-08-15T23:59:59.000Z

    We constructed an instrument for time-resolved photoemission electron microscopy (TR-PEEM) utilizing femtosecond (fs) laser pulses to visualize the dynamics of photogenerated electrons in semiconductors on ultrasmall and ultrafast scales. The spatial distribution of the excited electrons and their relaxation and/or recombination processes were imaged by the proposed TR-PEEM method with a spatial resolution about 100 nm and an ultrafast temporal resolution defined by the cross-correlation of the fs laser pulses (240 fs). A direct observation of the dynamical behavior of electrons on higher resistivity samples, such as semiconductors, by TR-PEEM has still been facing difficulties because of space and/or sample charging effects originating from the high photon flux of the ultrashort pulsed laser utilized for the photoemission process. Here, a regenerative amplified fs laser with a widely tunable repetition rate has been utilized, and with careful optimization of laser parameters, such as fluence and repetition rate, and consideration for carrier lifetimes, the electron dynamics in semiconductors were visualized. For demonstrating our newly developed TR-PEEM method, the photogenerated carrier lifetimes around a nanoscale defect on a GaAs surface were observed. The obtained lifetimes were on a sub-picosecond time scale, which is much shorter than the lifetimes of carriers observed in the non-defective surrounding regions. Our findings are consistent with the fact that structural defects induce mid-gap states in the forbidden band, and that the electrons captured in these states promptly relax into the ground state.

  5. Resolving distribution of relaxation times in Poly(propylene glycol) on the crossover region

    E-Print Network [OSTI]

    Enis Tuncer; Marizio Furlani; Bengt-Erik Mellander

    2004-03-09T23:59:59.000Z

    In this paper, a recently developed numerical technique [{\\em Tuncer E and Guba{\\'n}ski S M, IEEE Trans Diel El Insul {\\bf 8}(3)(2001) 310-320}] is applied to poly(propylene glycol) complex dielectric data to extract more information about the molecular relaxation processes. The method is based on a constrained-least-squares (\\clsq) data fitting procedure together with the Monte Carlo (\\mc) method. We preselect the number of relaxation times with no {\\em a-priori} physical assumption, and use the Debye single relaxation as ``kernel'', then the obtained weighting factors at each \\mc step from the \\clsq method builds up a relaxation time spectrum. When the analysis is repeated for data at different temperatures a {\\em relaxation-image} is created. The obtained relaxation are analyzed using the Lorentz (Cauchy) distribution, which is a special form of the L{\\'e}vy statistics. In the present report the $\\beta$ and $\\alpha$ relaxations are resolved for the \\ppg. A comparison of the relaxations to those earlier reported in the literature indicate that the presented method provides additional information compared to methods based on empirical formulas. The distribution of relaxation times analysis is especially useful to probe the crossover region where the $\\alpha$- and $\\beta$- relaxations merge and the results show that the relaxation after the crossover region at higher temperatures is Arrhenius-type as the $\\beta$-relaxation. Moreover, this relaxation is more likely to be the continuation of the $\\beta$-relaxation, but with a different activation energy.

  6. State-resolved imaging of CO from propenal photodissociation: Signatures of concerted three-body dissociation

    SciTech Connect (OSTI)

    Dey, Arghya; Fernando, Ravin; Suits, Arthur G., E-mail: asuits@chem.wayne.edu [Department of Chemistry, Wayne State University, Detroit, Michigan 48202 (United States)

    2014-04-21T23:59:59.000Z

    State-selected DC sliced images of propenal photodissociation show clear signatures of a novel synchronous concerted three-body dissociation of propenal recently proposed by Lee and co-workers to give C{sub 2}H{sub 2} + H{sub 2} + CO [S. H. Lee, C. H. Chin, C. Chaudhuri, ChemPhysChem 12, 753 (2011)]. Unlike any prior example of a concerted 3-body dissociation event, this mechanism involves breaking three distinct bonds and yields 3 distinct molecules. DC sliced images of CO fragments were recorded for a range of rotational levels for both v = 0 and v = 1. The results show formation of two distinct CO product channels having dissimilar translational energy distributions with characteristic rovibrational state distributions. The images for CO (v = 0) show a large contribution of slower CO fragments at lower rotational levels (J = 5–25). This slow component is completely absent from the v = 1 CO images. The images for the higher rotational levels of the v = 0 and v = 1 CO are nearly identical, and this provides a basis for decomposing the two channels for v = 0. The quantum state and translational energy distributions for the slow channel are readily assigned to the 3-body dissociation based on the properties of the transition state. The faster CO fragments dominating the higher rotational levels in both v = 0 and v = 1 are attributed to formation of CH{sub 3}CH + CO, also in agreement with the inferences based on previous non-state-resolved measurements with supporting theoretical calculations.

  7. Resolving the tips of the tree of life: How much mitochondrialdata doe we need?

    SciTech Connect (OSTI)

    Bonett, Ronald M.; Macey, J. Robert; Boore, Jeffrey L.; Chippindale, Paul T.

    2005-04-29T23:59:59.000Z

    Mitochondrial (mt) DNA sequences are used extensively to reconstruct evolutionary relationships among recently diverged animals,and have constituted the most widely used markers for species- and generic-level relationships for the last decade or more. However, most studies to date have employed relatively small portions of the mt-genome. In contrast, complete mt-genomes primarily have been used to investigate deep divergences, including several studies of the amount of mt sequence necessary to recover ancient relationships. We sequenced and analyzed 24 complete mt-genomes from a group of salamander species exhibiting divergences typical of those in many species-level studies. We present the first comprehensive investigation of the amount of mt sequence data necessary to consistently recover the mt-genome tree at this level, using parsimony and Bayesian methods. Both methods of phylogenetic analysis revealed extremely similar results. A surprising number of well supported, yet conflicting, relationships were found in trees based on fragments less than {approx}2000 nucleotides (nt), typical of the vast majority of the thousands of mt-based studies published to date. Large amounts of data (11,500+ nt) were necessary to consistently recover the whole mt-genome tree. Some relationships consistently were recovered with fragments of all sizes, but many nodes required the majority of the mt-genome to stabilize, particularly those associated with short internal branches. Although moderate amounts of data (2000-3000 nt) were adequate to recover mt-based relationships for which most nodes were congruent with the whole mt-genome tree, many thousands of nucleotides were necessary to resolve rapid bursts of evolution. Recent advances in genomics are making collection of large amounts of sequence data highly feasible, and our results provide the basis for comparative studies of other closely related groups to optimize mt sequence sampling and phylogenetic resolution at the ''tips'' of the Tree of Life.

  8. A compact dusty disk around the Herbig Ae star HR 5999 resolved with VLTI / MIDI

    E-Print Network [OSTI]

    Thomas Preibisch; Stefan Kraus; Thomas Driebe; Roy van Boekel; Gerd Weigelt

    2006-07-21T23:59:59.000Z

    We have used mid-infrared long-baseline interferometry with MIDI at the VLTI to resolve the circumstellar material around the Herbig Ae star HR 5999, providing the first direct measurement of its angular size, and to derive constraints on the spatial distribution of the dust. A set of ten spectrally dispersed (8-13 micron) interferometric measurements of HR 5999 was obtained. The characteristic size of the emission region depends on the projected baseline length and position angle, and it ranges between ~ 5-15 milliarcseconds (Gauss FWHM), corresponding to remarkably small physical sizes of ~ 1-3 AU. To derive constraints on the geometrical distribution of the dust, we compared our interferometric measurements to 2D, frequency-dependent radiation transfer simulations of circumstellar disks and envelopes. For disk models with radial power-law density distributions, the relatively weak but very extended emission from outer disk regions (>~ 3 AU) leads to model visibilities that are significantly lower than the observed visibilities, making these models inconsistent with the MIDI data. Disk models in which the density is truncated at outer radii of ~ 2-3 AU, on the other hand, provide good agreement with the data. A satisfactory fit to the observed MIDI visibilities of HR 5999 is found with a model of a geometrically thin disk that is truncated at 2.6 AU and seen under an inclination angle of 58 degr. Neither models of a geometrically thin disk seen nearly edge-on, nor models of spherical dust shells can achieve agreement between the observed and predicted visibilities. The reason why the disk is so compact remains unclear; we speculate that it has been truncated by a close binary companion.

  9. A RESOLVED DEBRIS DISK AROUND THE CANDIDATE PLANET-HOSTING STAR HD 95086

    SciTech Connect (OSTI)

    Moór, A.; Ábrahám, P.; Szabó, Gy. M.; Kiss, Cs. [Konkoly Observatory, Research Centre for Astronomy and Earth Sciences, Hungarian Academy of Sciences, P.O. Box 67, H-1525 Budapest (Hungary)] [Konkoly Observatory, Research Centre for Astronomy and Earth Sciences, Hungarian Academy of Sciences, P.O. Box 67, H-1525 Budapest (Hungary); Kóspál, Á. [European Space Agency (ESA/ESTEC, SRE-SA), P.O. Box 299, 2200 AG, Noordwijk (Netherlands)] [European Space Agency (ESA/ESTEC, SRE-SA), P.O. Box 299, 2200 AG, Noordwijk (Netherlands); Apai, D.; Pascucci, I. [Department of Astronomy and Department of Planetary Sciences, The University of Arizona, Tucson, AZ 85721 (United States)] [Department of Astronomy and Department of Planetary Sciences, The University of Arizona, Tucson, AZ 85721 (United States); Balog, Z.; Henning, Th. [Max-Planck-Institut für Astronomie, Königstuhl 17, D-69117 Heidelberg (Germany)] [Max-Planck-Institut für Astronomie, Königstuhl 17, D-69117 Heidelberg (Germany); Csengeri, T. [Max-Planck-Institut für Radioastronomie, Auf dem Hügel 69, D-53121 Bonn (Germany)] [Max-Planck-Institut für Radioastronomie, Auf dem Hügel 69, D-53121 Bonn (Germany); Grady, C. [NASA Goddard Space Flight Center, Code 667, Greenbelt, MD 20771 (United States)] [NASA Goddard Space Flight Center, Code 667, Greenbelt, MD 20771 (United States); Juhász, A. [Leiden Observatory, Leiden University, Niels Bohrweg 2, NL-2333 CA Leiden (Netherlands)] [Leiden Observatory, Leiden University, Niels Bohrweg 2, NL-2333 CA Leiden (Netherlands); Szulágyi, J. [Université de Nice Sophia-Antipolis, Observatoire de la Côte d'Azur, CNRS UMR 7293, F-06108 Nice Cedex 2 (France)] [Université de Nice Sophia-Antipolis, Observatoire de la Côte d'Azur, CNRS UMR 7293, F-06108 Nice Cedex 2 (France); Vavrek, R., E-mail: moor@konkoly.hu [Herschel Science Centre, ESA/ESAC, P.O. Box 78, Villanueva de la Cañada, E-28691 Madrid (Spain)

    2013-10-01T23:59:59.000Z

    Recently, a new planet candidate was discovered on direct images around the young (10-17 Myr) A-type star HD 95086. The strong infrared excess of the system indicates that, similar to HR8799, ? Pic, and Fomalhaut, the star harbors a circumstellar disk. Aiming to study the structure and gas content of the HD 95086 disk, and to investigate its possible interaction with the newly discovered planet, here we present new optical, infrared, and millimeter observations. We detected no CO emission, excluding the possibility of an evolved gaseous primordial disk. Simple blackbody modeling of the spectral energy distribution suggests the presence of two spatially separate dust belts at radial distances of 6 and 64 AU. Our resolved images obtained with the Herschel Space Observatory reveal a characteristic disk size of ?6.''0 × 5.''4 (540 × 490 AU) and disk inclination of ?25°. Assuming the same inclination for the planet candidate's orbit, its reprojected radial distance from the star is 62 AU, very close to the blackbody radius of the outer cold dust ring. The structure of the planetary system at HD 95086 resembles the one around HR8799. Both systems harbor a warm inner dust belt and a broad colder outer disk and giant planet(s) between the two dusty regions. Modeling implies that the candidate planet can dynamically excite the motion of planetesimals even out to 270 AU via their secular perturbation if its orbital eccentricity is larger than about 0.4. Our analysis adds a new example to the three known systems where directly imaged planet(s) and debris disks coexist.

  10. An Investigation to Resolve the Interaction Between Fuel Cell, Power Conditioning System and Application Loads

    SciTech Connect (OSTI)

    Sudip K. Mazumder

    2005-12-31T23:59:59.000Z

    Development of high-performance and durable solidoxide fuel cells (SOFCs) and a SOFC power-generating system requires knowledge of the feedback effects from the power-conditioning electronics and from application-electrical-power circuits that may pass through or excite the power-electronics subsystem (PES). Therefore, it is important to develop analytical models and methodologies, which can be used to investigate and mitigate the effects of the electrical feedbacks from the PES and the application loads (ALs) on the reliability and performance of SOFC systems for stationary and non-stationary applications. However, any such attempt to resolve the electrical impacts of the PES on the SOFC would be incomplete unless one utilizes a comprehensive analysis, which takes into account the interactions of SOFC, PES, balance-of-plant system (BOPS), and ALs as a whole. SOFCs respond quickly to changes in load and exhibit high part- and full-load efficiencies due to its rapid electrochemistry, which is not true for the thermal and mechanical time constants of the BOPS, where load-following time constants are, typically, several orders of magnitude higher. This dichotomy can affect the lifetime and durability of the SOFCSs and limit the applicability of SOFC systems for load-varying stationary and transportation applications. Furthermore, without validated analytical models and investigative design and optimization methodologies, realizations of cost-effective, reliable, and optimal PESs (and power-management controls), in particular, and SOFC systems, in general, are difficult. On the whole, the research effort can lead to (a) cost-constrained optimal PES design for high-performance SOFCS and high energy efficiency and power density, (b) effective SOFC power-system design, analyses, and optimization, and (c) controllers and modulation schemes for mitigation of electrical impacts and wider-stability margin and enhanced system efficiency.

  11. Mrk 609: resolving the circum-nuclear structure with near-infrared integral field spectroscopy

    E-Print Network [OSTI]

    J. Zuther; C. Iserlohe; J. -U. Pott; T. Bertram; S. Fischer; W. Voges; G. Hasinger; A. Eckart

    2007-04-16T23:59:59.000Z

    We present first results of near infrared J and H+K ESO-SINFONI integral field spectroscopy of the composite starburst/Seyfert 1.8 galaxy Mrk 609. The data were taken during the science verification period of SINFONI. We aim to investigate the morphology and excitation conditions within the central 2 kpc. Additional Nobeyama 45 m CO(1-0) data are presented, which we used to estimate the molecular gas mass. The source was selected from a sample of adaptive optics suitable, SDSS/ROSAT based, X-ray bright AGN with redshifts of 0.03 < z < 1. This sample allows for a detailed study of the NIR properties of the nuclear and host environments with high spectral and spatial resolution. Our NIR data reveal a complex emission-line morphology, possibly associated with a nuclear bar seen in the reconstructed continuum images. The detections of [SiVI] and a broad Pa alpha component are clear indicators for the presence of an accreting super-massive black hole at the center of Mrk 609. In agreement with previous observations we find that the circum-nuclear emission is not significantly extincted. The analysis of the high angular resolution rotational-vibrational molecular hydrogen and forbidden [FeII] emission reveals a LINER character of the nucleus. The large H_2 gas mass deduced from the CO(1-0) observation provides the fuel needed to feed the starburst and Seyfert activity in Mrk 609. High angular resolution imaging spectroscopy provides an ideal tool to resolve the nuclear and starburst contribution in active galaxies. We show that Mrk 609 exhibits LINER features, that appear to be hidden in larger aperture visible/NIR spectra.

  12. Spatially resolved characterization of biogenic manganese oxideproduction within a bacterial biofilm

    SciTech Connect (OSTI)

    Toner, Brandy; Fakra, Sirine; Villalobos, Mario; Warwick, Tony; Sposito, Garrison

    2004-10-01T23:59:59.000Z

    Pseudomonas putida strain MnB1, a biofilm forming bacteria, was used as a model for the study of bacterial Mn oxidation in freshwater and soil environments. The oxidation of Mn{sub (aq)}{sup +2} by P. putida was characterized by spatially and temporally resolving the oxidation state of Mn in the presence of a bacterial biofilm using scanning transmission x-ray microscopy (STXM) combined with near edge x-ray absorption fine structure (NEXAFS) spectroscopy at the Mn-L{sub 2,3} absorption edges. Subsamples were collected from growth flasks containing 0.1 mM and 1 mM total Mn at 16, 24, 36 and 48 hours after inoculation. Immediately after collection, the unprocessed hydrated subsamples were imaged at 40 nm resolution. Manganese NEXAFS spectra were extracted from x-ray energy sequences of STXM images (stacks) and fit with linear combinations of well characterized reference spectra to obtain quantitative relative abundances of Mn(II), Mn(III) and Mn(IV). Careful consideration was given to uncertainty in the normalization of the reference spectra, choice of reference compounds, and chemical changes due to radiation damage. The STXM results confirm that Mn{sub (aq)}{sup +2} was removed from solution by P. putida and was concentrated as Mn(III) and Mn(IV) immediately adjacent to the bacterial cells. The Mn precipitates were completely enveloped by bacterial biofilm material. The distribution of Mn oxidation states was spatially heterogeneous within and between the clusters of bacterial cells. Scanning transmission x-ray microscopy is a promising tool to advance the study of hydrated interfaces between minerals and bacteria, particularly in cases where the structure of bacterial biofilms needs to be maintained.

  13. Seasonally Resolved Surface Water (delta)14C Variability in the Lombok Strait: A Coralline Perspective

    SciTech Connect (OSTI)

    Guilderson, T P; Fallon, S J; Moore, M D; Schrag, D P; Charles, C D

    2008-04-23T23:59:59.000Z

    We have explored surface water mixing in the Lombok Strait through a {approx}bimonthly resolved surface water {Delta}{sup 14}C time-series reconstructed from a coral in the Lombok Strait that spans 1937 through 1990. The prebomb surface water {Delta}{sup 14}C average is -60.5{per_thousand} and individual samples range from -72{per_thousand} to 134{per_thousand}. The annual average post-bomb maximum occurs in 1973 and is 122{per_thousand}. The timing of the post-bomb maximum is consistent with a primary subtropical source for the surface waters in the Indonesian Seas. During the post-bomb period the coral records regular seasonal cycles of 5-20{per_thousand}. Seasonal high {Delta}{sup 14}C occur during March-May (warm, low salinity), and low {Delta}{sup 14}C occur in September (cool, higher salinity). The {Delta}{sup 14}C seasonality is coherent and in phase with the seasonal {Delta}{sup 14}C cycle observed in Makassar Strait. We estimate the influence of high {Delta}{sup 14}C Makassar Strait (North Pacific) water flowing through the Lombok Strait using a two endmember mixing model and the seasonal extremes observed at the two sites. The percentage of Makassar Strait water varies between 16 and 70%, and between 1955 and 1990 it averages 40%. During La Nina events there is a higher percentage of Makassar Strait (high {Delta}{sup 14}C) water in the Lombok Strait.

  14. RESOLVING THE BONDI ACCRETION FLOW TOWARD THE SUPERMASSIVE BLACK HOLE OF NGC 3115 WITH CHANDRA

    SciTech Connect (OSTI)

    Wong, Ka-Wah; Irwin, Jimmy A.; Yukita, Mihoko; Million, Evan T. [Department of Physics and Astronomy, University of Alabama, Box 870324, Tuscaloosa, AL 35487 (United States); Mathews, William G. [UCO/Lick Observatory, Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Bregman, Joel N., E-mail: kwong@ua.edu [Department of Astronomy, University of Michigan, 500 Church Street, Ann Arbor, MI 48109-1042 (United States)

    2011-07-20T23:59:59.000Z

    Gas undergoing Bondi accretion onto a supermassive black hole (SMBH) becomes hotter toward smaller radii. We searched for this signature with a Chandra observation of the hot gas in NGC 3115, which optical observations show has a very massive SMBH. Our analysis suggests that we are resolving, for the first time, the accretion flow within the Bondi radius of an SMBH. We show that the temperature is rising toward the galaxy center as expected in all accretion models in which the black hole is gravitationally capturing the ambient gas. There is no hard central point source that could cause such an apparent rise in temperature. The data support that the Bondi radius is at about 4''-5'' (188-235 pc), suggesting an SMBH of 2 x 10{sup 9} M{sub sun} that is consistent with the upper end of the optical results. The density profile within the Bondi radius has a power-law index of 1.03{sup +0.23}{sub -0.21}, which is consistent with gas in transition from the ambient medium and the accretion flow. The accretion rate at the Bondi radius is determined to be M-dot{sub B} = 2.2x10{sup -2} M{sub sun} yr{sup -1}. Thus, the accretion luminosity with 10% radiative efficiency at the Bondi radius (10{sup 44} erg s{sup -1}) is about six orders of magnitude higher than the upper limit of the X-ray luminosity of the nucleus.

  15. Improving the accuracy and efficiency of time-resolved electronic spectra calculations: Cellular dephasing representation with a prefactor

    E-Print Network [OSTI]

    Zambrano, Eduardo; Vanicek, Jiri

    2013-01-01T23:59:59.000Z

    Time-resolved electronic spectra can be obtained as the Fourier transform of a special type of time correlation function known as fidelity amplitude, which, in turn, can be evaluated approximately and efficiently with the dephasing representation. Here we improve both the accuracy of this approximation---with an amplitude correction derived from the phase-space propagator---and its efficiency---with an improved cellular scheme employing inverse Weierstrass transform and optimal scaling of the cell size. We demonstrate the advantages of the new methodology by computing dispersed time-resolved stimulated emission spectra in the harmonic potential, pyrazine, and the NCO molecule. In contrast, we show that in strongly chaotic systems such as the quartic oscillator the original dephasing representation is more appropriate than either the cellular or prefactor-corrected methods.

  16. Spatially resolved determination of the short-circuit current density of silicon solar cells via lock-in thermography

    SciTech Connect (OSTI)

    Fertig, Fabian, E-mail: fabian.fertig@ise.fraunhofer.de; Greulich, Johannes; Rein, Stefan [Fraunhofer Institute for Solar Energy Systems ISE, Heidenhofstr. 2, D-79110 Freiburg (Germany)

    2014-05-19T23:59:59.000Z

    We present a spatially resolved method to determine the short-circuit current density of crystalline silicon solar cells by means of lock-in thermography. The method utilizes the property of crystalline silicon solar cells that the short-circuit current does not differ significantly from the illuminated current under moderate reverse bias. Since lock-in thermography images locally dissipated power density, this information is exploited to extract values of spatially resolved current density under short-circuit conditions. In order to obtain an accurate result, one or two illuminated lock-in thermography images and one dark lock-in thermography image need to be recorded. The method can be simplified in a way that only one image is required to generate a meaningful short-circuit current density map. The proposed method is theoretically motivated, and experimentally validated for monochromatic illumination in comparison to the reference method of light-beam induced current.

  17. Time-resolved soft x-ray absorption setup using multi-bunch operation modes at synchrotrons

    SciTech Connect (OSTI)

    Stebel, L.; Sigalotti, P.; Ressel, B.; Cautero, G. [Sincrotrone Trieste, S.S. 14 km 163.5, Area Science Park, 34149 Basovizza (Italy); Malvestuto, M.; Capogrosso, V. [Sincrotrone Trieste, S.S. 14 km 163.5, Area Science Park, 34149 Basovizza (Italy); Department of Physics, University of Trieste, via A. Valerio 2, 34127, Trieste (Italy); Bondino, F.; Magnano, E. [IOM-CNR, TASC laboratory, S.S. 14 km 163.5, Area Science Park, 34149 Basovizza (Italy); Parmigiani, F. [Sincrotrone Trieste, S.S. 14 km 163.5, Area Science Park, 34149 Basovizza (Italy); Department of Physics, University of Trieste, via A. Valerio 2, 34127, Trieste (Italy); IOM-CNR, TASC laboratory, S.S. 14 km 163.5, Area Science Park, 34149 Basovizza (Italy)

    2011-12-15T23:59:59.000Z

    Here, we report on a novel experimental apparatus for performing time-resolved soft x-ray absorption spectroscopy in the sub-ns time scale using non-hybrid multi-bunch mode synchrotron radiation. The present setup is based on a variable repetition rate Ti:sapphire laser (pump pulse) synchronized with the {approx}500 MHz x-ray synchrotron radiation bunches and on a detection system that discriminates and singles out the significant x-ray photon pulses by means of a custom made photon counting unit. The whole setup has been validated by measuring the time evolution of the L{sub 3} absorption edge during the melting and the solidification of a Ge single crystal irradiated by an intense ultrafast laser pulse. These results pave the way for performing synchrotron time-resolved experiments in the sub-ns time domain with variable repetition rate exploiting the full flux of the synchrotron radiation.

  18. All optical method for investigation of spin and charge transport in semiconductors: Combination of spatially and time-resolved luminescence

    SciTech Connect (OSTI)

    Cadiz, F.; Paget, D.; Grebenkov, D.; Korb, J. P.; Rowe, A. C. H. [Physique de la matière condensée, Ecole Polytechnique, CNRS, 91128 Palaiseau (France); Barate, P.; Amand, T. [Université de Toulouse, INSA-CNRS-UPS, 31077 Toulouse Cedex (France); Arscott, S.; Peytavit, E. [Institut d'Electronique, de Microélectronique et de Nanotechnologie (IEMN), University of Lille, CNRS, Avenue Poincaré, Cité Scientifique, 59652 Villeneuve d'Ascq (France)

    2014-07-14T23:59:59.000Z

    A new approach is demonstrated for investigating charge and spin diffusion as well as surface and bulk recombination in unpassivated doped semiconductors. This approach consists in using two complementary, conceptually related, techniques, which are time-resolved photoluminescence (TRPL) and spatially resolved microluminescence (?PL) and is applied here to p{sup +} GaAs. Analysis of the sole TRPL signal is limited by the finite risetime. On the other hand, it is shown that joint TRPL and ?PL can be used to determine the diffusion constant, the bulk recombination time, and the spin relaxation time. As an illustration, the temperature variation of these quantities is investigated for p{sup +} GaAs.

  19. Time-Resolved Emission Study of a Thiophene-Modified Fluorescent Nucleoside in Solution and within Multiply-Modified Oligodeoxynucleotides

    E-Print Network [OSTI]

    Mary Noe; Yuval Erez; Itay Presiado; Yitzhak Tor; Dan Huppert

    2014-12-15T23:59:59.000Z

    Steady-state and time-resolved emission techniques were employed to study the photophysical properties of 5-(thien-2-yl)-2'-deoxyuridine (dUTh), an isomorphic fluorescent nucleoside analog. We found that the emission lifetime of dUTh is dependent upon the solvent viscosity and obeys the F\\"orster-Hoffman relation over a wide range of temperatures in 1-propanol, a glass-forming liquid. Upon incorporation into oligodeoxynucleotides, the average emission lifetime significantly increases, and the decay is non-exponential. We use a non-radiative decay model that takes into account the twist angle of the thiophene ring to fit the time-resolved emission decay curves.

  20. Improving the accuracy and efficiency of time-resolved electronic spectra calculations: Cellular dephasing representation with a prefactor

    SciTech Connect (OSTI)

    Zambrano, Eduardo; Šulc, Miroslav; Vaní?ek, Ji?í [Laboratory of Theoretical Physical Chemistry, Institut des Sciences et Ingénierie Chimiques, École Polytechnique Fédérale de Lausanne (EPFL), CH-1015 Lausanne (Switzerland)] [Laboratory of Theoretical Physical Chemistry, Institut des Sciences et Ingénierie Chimiques, École Polytechnique Fédérale de Lausanne (EPFL), CH-1015 Lausanne (Switzerland)

    2013-08-07T23:59:59.000Z

    Time-resolved electronic spectra can be obtained as the Fourier transform of a special type of time correlation function known as fidelity amplitude, which, in turn, can be evaluated approximately and efficiently with the dephasing representation. Here we improve both the accuracy of this approximation—with an amplitude correction derived from the phase-space propagator—and its efficiency—with an improved cellular scheme employing inverse Weierstrass transform and optimal scaling of the cell size. We demonstrate the advantages of the new methodology by computing dispersed time-resolved stimulated emission spectra in the harmonic potential, pyrazine, and the NCO molecule. In contrast, we show that in strongly chaotic systems such as the quartic oscillator the original dephasing representation is more appropriate than either the cellular or prefactor-corrected methods.