National Library of Energy BETA

Sample records for resolving vulnerability u-098

  1. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  2. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  3. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  6. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  7. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  8. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  9. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  10. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  11. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  12. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  13. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  14. Time-Resolved FTIR

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resolved FTIR - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  15. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  16. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  17. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  18. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  19. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  20. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  1. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  2. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  3. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  4. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  5. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  6. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  7. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  8. Vulnerability Analysis of Energy Delivery Control Systems

    Broader source: Energy.gov (indexed) [DOE]

    ... Attackers can search for vulnerabilities in firewalls, ... organization, measured in terms of confidentiality, ... in which an adversary can enter the system and potentially ...

  9. US Energy Sector Vulnerabilities to Climate Change

    Broader source: Energy.gov (indexed) [DOE]

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  10. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  11. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  12. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  13. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  14. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  15. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  16. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  17. V-094: IBM Multiple Products Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple ...

  18. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  19. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Savers [EERE]

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  20. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  1. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  2. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  3. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  4. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  5. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  6. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  7. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  8. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  9. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  10. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    Applying current guidance and practices for common-cause failure (CCF) mitigation to digital instrumentation and control (I&C) systems has proven problematic, and the regulatory environment has been unpredictable. The potential for CCF vulnerability inhibits I&C modernization, thereby challenging the long-term sustainability of existing plants. For new plants and advanced reactor concepts, concern about CCF vulnerability in highly integrated digital I&C systems imposes a design burden that results in higher costs and increased complexity. The regulatory uncertainty in determining which mitigation strategies will be acceptable (e.g., what diversity is needed and how much is sufficient) drives designers to adopt complicated, costly solutions devised for existing plants. To address the conditions that constrain the transition to digital I&C technology by the US nuclear industry, crosscutting research is needed to resolve uncertainty, demonstrate necessary characteristics, and establish an objective basis for qualification of digital technology for nuclear power plant (NPP) I&C applications. To fulfill this research need, Oak Ridge National Laboratory is investigating mitigation of CCF vulnerability for nuclear-qualified applications. The outcome of this research is expected to contribute to a fundamentally sound, comprehensive basis to qualify digital technology for nuclear power applications. This report documents the development of a CCF taxonomy. The basis for the CCF taxonomy was generated by determining consistent terminology and establishing a classification approach. The terminology is based on definitions from standards, guides, and relevant nuclear power industry technical reports. The classification approach is derived from identified classification schemes focused on I&C systems and key characteristics, including failure modes. The CCF taxonomy provides the basis for a systematic organization of key systems aspects relevant to analyzing the potential for

  11. TIME-RESOLVED VIBRATIONAL SPECTROSCOPY

    SciTech Connect (OSTI)

    Andrei Tokmakoff, MIT; Paul Champion, Northeastern University; Edwin J. Heilweil, NIST; Keith A. Nelson, MIT; Larry Ziegler, Boston University

    2009-05-14

    This document contains the Proceedings from the 14th International Conference on Time-Resolved Vibrational Spectroscopy, which was held in Meredith, NH from May 9-14, 2009. The study of molecular dynamics in chemical reaction and biological processes using time-resolved spectroscopy plays an important role in our understanding of energy conversion, storage, and utilization problems. Fundamental studies of chemical reactivity, molecular rearrangements, and charge transport are broadly supported by the DOE’s Office of Science because of their role in the development of alternative energy sources, the understanding of biological energy conversion processes, the efficient utilization of existing energy resources, and the mitigation of reactive intermediates in radiation chemistry. In addition, time-resolved spectroscopy is central to all five of DOE’s grand challenges for fundamental energy science. The Time-Resolved Vibrational Spectroscopy conference is organized biennially to bring the leaders in this field from around the globe together with young scientists to discuss the most recent scientific and technological advances. The latest technology in ultrafast infrared, Raman, and terahertz spectroscopy and the scientific advances that these methods enable were covered. Particular emphasis was placed on new experimental methods used to probe molecular dynamics in liquids, solids, interfaces, nanostructured materials, and biomolecules.

  12. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  13. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  14. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  15. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  16. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  17. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  18. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  19. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  20. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  1. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  2. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. Vulnerability Analysis of Energy Delivery Control Systems (September 2011) (2.69 MB)

  3. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  4. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  5. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  6. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  7. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  8. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  9. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  10. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  11. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  12. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  13. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  14. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  15. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  16. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  17. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  18. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  19. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  20. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  1. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  2. Haier Repair Confusion Resolved | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Haier Repair Confusion Resolved Haier Repair Confusion Resolved April 26, 2010 - 12:28pm Addthis On January 7, 2010, DOE entered into a Consent Decree with Haier America regarding a problem with four models of Haier freezers that resulted in those freezers not achieving their advertised energy efficiency. DOE recently became aware that some consumers eligible for repairs were incorrectly told that they were not eligible. Haier has resolved the problem, and consumers are encouraged to contact

  3. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  4. Integrated experimental setup for angle resolved photoemission...

    Office of Scientific and Technical Information (OSTI)

    Integrated experimental setup for angle resolved photoemission spectroscopy of transuranic materials Citation Details In-Document Search Title: Integrated experimental setup for...

  5. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  6. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  8. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  9. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  10. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED

  11. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  12. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material...

    National Nuclear Security Administration (NNSA)

    GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials ...

  13. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  14. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  15. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  16. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  18. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  19. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  1. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  4. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  5. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    on both onsite and offsite tribally owned and non-tribally owned energy infrastructure. ... Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  6. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  8. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  10. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  11. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  12. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  13. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  14. Costs of strikes between vulnerable missile forces

    SciTech Connect (OSTI)

    Canavan, G.H.

    1997-02-01

    This note derives the first and second strike magnitudes and costs for strikes between vulnerable missile forces with multiple warheads. The extension to mixes with invulnerable missiles is performed in a companion note. Stability increases as the number of weapons per missile is reduced. The optimal allocation of weapons between missiles and value is significant in predicting the stability impact of the reduction of the number of weapons per missile at large numbers of missiles, less significant in reducing the number of missiles for fixed weapons per missile. At low numbers of missiles, the stability indices for singlet and triplet configurations are comparable, as are the number of weapons each would deliver on value targets.

  15. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  16. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  17. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  18. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  19. Time-Resolved Photoluminescence and Photovoltaics

    SciTech Connect (OSTI)

    Metzger, W. K.; Ahrenkiel, R. K.; Dippo, P.; Geisz, J.; Wanlass, M. W.; Kurtz, S.

    2005-01-01

    The time-resolved photoluminescence (TRPL) technique and its ability to characterize recombination in bulk photovoltaic semiconductor materials are reviewed. Results from a variety of materials and a few recent studies are summarized and compared.

  20. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  1. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  2. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  3. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  4. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes

  5. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  6. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  7. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  8. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  9. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  10. Resolving transitions in the mesoscale domain configuration in...

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Search Results Journal Article: Resolving ... Citation Details In-Document Search Title: Resolving ... Resource Relation: Journal Name: Scientific Reports; Journal ...

  11. Spectral characteristics of time resolved magnonic spin Seebeck...

    Office of Scientific and Technical Information (OSTI)

    Spectral characteristics of time resolved magnonic spin Seebeck effect Citation Details In-Document Search Title: Spectral characteristics of time resolved magnonic spin Seebeck ...

  12. Time-resolved carrier distributions in graphene (Conference)...

    Office of Scientific and Technical Information (OSTI)

    Time-resolved carrier distributions in graphene Citation Details In-Document Search Title: Time-resolved carrier distributions in graphene You are accessing a document from the ...

  13. A Spatially Resolving X-ray Crystal Spectrometer for Measurement...

    Office of Scientific and Technical Information (OSTI)

    394 PPPL- 4394 A Spatially Resolving X-ray Crystal Spectrometer for Measurement of ... Fusion Links A spatially resolving x-ray crystal spectrometer for measurement of ...

  14. Development of a Spatially Resolving X-Ray Crystal Spectrometer...

    Office of Scientific and Technical Information (OSTI)

    Development of a Spatially Resolving X-Ray Crystal Spectrometer For Measurement of ... Links Development of a spatially resolving x-ray crystal spectrometer for measurement of ...

  15. Development Of a Spatially Resolving X-ray Crystal Spectrometer...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Development Of a Spatially Resolving X-ray Crystal Spectrometer For ... Title: Development Of a Spatially Resolving X-ray Crystal Spectrometer For Measurement Of ...

  16. Showerhead Manufacturer Agrees to Civil Penalty to Resolve Enforcement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Showerhead Manufacturer Agrees to Civil Penalty to Resolve Enforcement Action Showerhead Manufacturer Agrees to Civil Penalty to Resolve Enforcement Action July 18, 2011 - 2:06pm ...

  17. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  18. Resolving Code and Standard Barriers to Building America Innovations...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resolving Code and Standard Barriers to Building America Innovations - 2014 BTO Peer Review Resolving Code and Standard Barriers to Building America Innovations - 2014 BTO Peer ...

  19. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  20. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  1. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  2. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  3. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  4. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  5. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  6. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  7. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  8. Energy resolved X-ray grating interferometry

    SciTech Connect (OSTI)

    Thuering, T.; Stampanoni, M.; Institute for Biomedical Engineering, Swiss Federal Institute of Technology, Zurich ; Barber, W. C.; Iwanczyk, J. S.; Seo, Y.; Alhassen, F.

    2013-05-13

    Although compatible with polychromatic radiation, the sensitivity in X-ray phase contrast imaging with a grating interferometer is strongly dependent on the X-ray spectrum. We used an energy resolving detector to quantitatively investigate the dependency of the noise from the spectral bandwidth and to consequently optimize the system-by selecting the best energy band matching the experimental conditions-with respect to sensitivity maximization and, eventually, dose. Further, since theoretical calculations of the spectrum are usually limited due to non-ideal conditions, an energy resolving detector accurately quantifies the spectral changes induced by the interferometer including flux reduction and beam hardening.

  9. RESOLVED: Projectb filesystem outage July 9, 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RESOLVED: Projectb filesystem outage July 9, 2012 RESOLVED: Projectb filesystem outage July 9, 2012 July 9, 2012 The projectb filesystem had a hardware failure that potentially generated I/O errors. The filesystem logs indicate that the earliest abnormal event on the filesystem occurred at 9:19AM and the filesystem was taken down for maintenance at 10:42AM. The filesystem returned to service at 11:20AM. Jobs running on the cluster would not have been able to read from or write to the projectb

  10. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  11. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  12. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  13. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  14. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  15. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hopper /scratch file system slow Resolved: Hopper /scratch file system slow August 6, 2014 Symptom: Users have reported scripts hung when involving file copies from/to the /scratch file system, or jobs running in /scratch are slower than before since late last week. Workaround: If it is convenient, move your workflow to /scratch2 temporarily, avoid any reference to /scratch. It includes setting your input files directory, your batch job submission directory, your executable file location, and

  16. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  17. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  18. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  19. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  20. ADR Lunchtime Series - Mindfulness for Conflict Resolvers | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADR Lunchtime Series - Mindfulness for Conflict Resolvers ADR Lunchtime Series - Mindfulness for Conflict Resolvers July 12, 2016 12:00PM to 1:30PM EDT U.S. Department of Energy ...

  1. A Spatially Resolving X-ray Crystal Spectrometer for Measurement...

    Office of Scientific and Technical Information (OSTI)

    A Spatially Resolving X-ray Crystal Spectrometer for Measurement of Ion-temperature and ... Citation Details In-Document Search Title: A Spatially Resolving X-ray Crystal ...

  2. Time-Resolved Optical Measurements of Shock-Induced Chemistry...

    Office of Scientific and Technical Information (OSTI)

    Time-Resolved Optical Measurements of Shock-Induced Chemistry in Energetic Materials. Citation Details In-Document Search Title: Time-Resolved Optical Measurements of Shock-Induced ...

  3. Civil Penalty Actions For Certification Violations Resolved | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Civil Penalty Actions For Certification Violations Resolved Civil Penalty Actions For Certification Violations Resolved May 6, 2010 - 12:39pm Addthis Today, the Department of Energy announced that it had resolved civil penalty actions against four showerhead manufacturers for having violated the Department's water conservation certification regulations. To resolve these actions Zoe Industries, Altmans Products LLC, EZ-FLO International, and Watermark Designs Ltd. have now certified

  4. Resonant state expansion of the resolvent

    SciTech Connect (OSTI)

    Berggren, T.; Lind, P. )

    1993-02-01

    An analytic method of generating resonant state expansions from the standard completeness relation of nonrelativistic quantum mechanics is described and shown to reproduce the generalized completeness relations, earlier derived, involving resonant states. The method is then applied to the expansion of the resolvent (the complete Green's function), the symmetry properties of which [ital seem] to be destroyed if a conventional application of the completeness relations is made. These forms of expansions have a continuum term which contains symmetry-restoring contributions and can therefore never vanish identically, nor can it be neglected. The symmetry-conserving form of the expansion has a set of discrete terms which are identical in form to those of the Mittag-Leffler series for the resolvent. In addition, it contains a continuum contribution which in some cases vanishes identically, but in general does not. We illustrate these findings with numerical applictions in which the potential (a square well) is chosen so as to permit analytic evaluation of practically all functions and quantities involved.

  5. High resolving power spectrometer for beam analysis

    SciTech Connect (OSTI)

    Moshammer, H.W.; Spencer, J.E.

    1992-03-01

    We describe a system designed to analyze the high energy, closely spaced bunches from individual RF pulses. Neither a large solid angle nor momentum range is required so this allows characteristics that appear useful for other applications such as ion beam lithography. The spectrometer is a compact, double-focusing QBQ design whose symmetry allows the Quads to range between F or D with a correspondingly large range of magnifications, dispersion and resolving power. This flexibility insures the possibility of spatially separating all of the bunches along the focal plane with minimal transverse kicks and bending angle for differing input conditions. The symmetry of the system allows a simple geometric interpretationof the resolving power in terms of thin lenses and ray optics. We discuss the optics and the hardware that is proposed to measure emittance, energy, energy spread and bunch length for each bunch in an RF pulse train for small bunch separations. We also discuss how to use such measurements for feedback and feedforward control of these bunch characteristics as well as maintain their stability. 2 refs.

  6. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events

  7. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  8. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  9. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  10. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  11. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  12. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  13. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  14. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  15. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  16. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  17. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  18. Vulnerability Analysis of Energy Delivery Control Systems - 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The

  19. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  20. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  1. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  2. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  3. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  4. Spatially resolved spectral-imaging device

    DOE Patents [OSTI]

    Bloom, Joshua Simon; Tyson, John Anthony

    2016-02-09

    A spatially resolved spectral device comprising a dispersive array to receive an incident light comprising a principal ray. The dispersive array comprising a plurality of dichroic layers, each of the plurality of dichroic layers disposed in a path of a direction of the principal ray. Each of the plurality of dichroic layers configured to at least one of reflect or transmit a different wavelength range of the incident light. The device further comprising a detection array operatively coupled with the dispersive array. The detection array comprising a photosensitive component including a plurality of detection pixels, each of the plurality of detection pixels having a light-receiving surface disposed parallel to the direction of the principal ray to detect a respective one of the different wavelength ranges of incident light reflected from a corresponding one of the plurality of dichroic layers.

  5. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  6. Resolving local ambiguity using semantics of shape.

    SciTech Connect (OSTI)

    Diegert, Carl F.

    2010-05-01

    We demonstrate a new semantic method for automatic analysis of wide-area, high-resolution overhead imagery to tip and cue human intelligence analysts to human activity. In the open demonstration, we find and trace cars and rooftops. Our methodology, extended to analysis of voxels, may be applicable to understanding morphology and to automatic tracing of neurons in large-scale, serial-section TEM datasets. We defined an algorithm and software implementation that efficiently finds all combinations of image blobs that satisfy given shape semantics, where image blobs are formed as a general-purpose, first step that 'oversegments' image pixels into blobs of similar pixels. We will demonstrate the remarkable power (ROC) of this combinatorial-based work flow for automatically tracing any automobiles in a scene by applying semantics that require a subset of image blobs to fill out a rectangular shape, with width and height in given intervals. In most applications we find that the new combinatorial-based work flow produces alternative (overlapping) tracings of possible objects (e.g. cars) in a scene. To force an estimation (tracing) of a consistent collection of objects (cars), a quick-and-simple greedy algorithm is often sufficient. We will demonstrate a more powerful resolution method: we produce a weighted graph from the conflicts in all of our enumerated hypotheses, and then solve a maximal independent vertex set problem on this graph to resolve conflicting hypotheses. This graph computation is almost certain to be necessary to adequately resolve multiple, conflicting neuron topologies into a set that is most consistent with a TEM dataset.

  7. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  8. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  9. DOE Successfully Resolves Three Enforcement Cases and Files Yet Another |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Successfully Resolves Three Enforcement Cases and Files Yet Another DOE Successfully Resolves Three Enforcement Cases and Files Yet Another September 29, 2010 - 5:24pm Addthis The Department has resolved three more of the 27 certification enforcement cases initiated three weeks ago and issued one additional penalty notice to Nordyne, LLC for failure to certify certain air conditioner and heat pump products. These actions reflect the Department's continued aggressive

  10. Nanosecond Time Resolved and Steady State Infrared Studies of...

    Office of Scientific and Technical Information (OSTI)

    Nanosecond Time Resolved and Steady State Infrared Studies of Photoinduced Decomposition of TATB at Ambient and Elevated Pressures Citation Details In-Document Search Title: ...

  11. DOE Successfully Resolves Three Enforcement Cases and Files Yet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Successfully Resolves Three Enforcement Cases and Files Yet Another DOE Successfully ... and lighting products meet the energy and water efficiency levels required by law. ...

  12. Quantum Dimension of Photosynthesis Revealed by Angular Resolved...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and new methods are required for an improved feedback to molecular simulation. We will look at a novel laser method, Angle-Resolved Coherent (ARC) imaging, that separates ...

  13. EERE Success Story-Lightweight Technology Resolved Challenge...

    Energy Savers [EERE]

    Facing the Chevy Spark EV Battery Tray and Enclosure EERE Success Story-Lightweight Technology Resolved Challenge Facing the Chevy Spark EV Battery Tray and Enclosure August 18, ...

  14. DOE Resolves Nearly All of its September 2010 Certification Enforcemen...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nearly All of its September 2010 Certification Enforcement Actions DOE Resolves Nearly All of its September 2010 Certification Enforcement Actions October 19, 2010 - 10:39am ...

  15. Building America Webinar: Resolving Codes and Standards Issues...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building America Webinar: Resolving Codes and Standards Issues to Energy Innovations This webinar provided an overview of how Building America has impacted codes and standards in ...

  16. Verifying the Benefits and Resolving the Issues in the Commercializati...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in the Commercialization of Ethanol Containing Diesel Fuels Verifying the Benefits and Resolving the Issues in the Commercialization of Ethanol Containing Diesel Fuels ...

  17. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy ... system knowledge that may limit effective implementation of new and existing standards. ...

  18. EGR Spatial Uniformity & Cylinder-Resolved Transients-Measurements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    using an Absorption Spectroscopy Probe EGR Spatial Uniformity & Cylinder-Resolved Transients-Measurements using an Absorption Spectroscopy Probe This poster describes ...

  19. Time-Resolved Optical Measurements of Shock-Induced Chemistry...

    Office of Scientific and Technical Information (OSTI)

    Time Resolved Optical Measurements of Shock-Induced Chemistry in Energetic Materials Ryan ... is limited by the lack of high fidelity data for building and validating the models ...

  20. Resolving unoccupied electronic states with laser ARPES in bismuth...

    Office of Scientific and Technical Information (OSTI)

    Title: Resolving unoccupied electronic states with laser ARPES in bismuth-based cuprate superconductors Authors: Miller, Tristan L. ; rrl, Minna ; Smallwood, Christopher L. ; ...

  1. Angle-Resolved Photoemission Studies of Quantum Materials (Journal...

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Search Results Journal Article: Angle-Resolved Photoemission Studies of Quantum Materials Citation ... Cond. Mat. Phys. 3, 129, 2012 Research Org: SLAC National ...

  2. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  3. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  4. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type

  5. Resolved multifrequency radio observations of GG Tau

    SciTech Connect (OSTI)

    Andrews, Sean M.; Birnstiel, T.; Rosenfeld, K. A.; Wilner, D. J.; Chandler, Claire J.; Pérez, L. M.; Isella, Andrea; Ricci, L.; Carpenter, J. M.; Calvet, N.; Corder, S. A.; Deller, A. T.; Dullemond, C. P.; Greaves, J. S.; Harris, R. J.; Henning, Th.; Linz, H.; Kwon, W.; Lazio, J.; Mundy, L. G.; and others

    2014-06-01

    We present subarcsecond resolution observations of continuum emission associated with the GG Tau quadruple star system at wavelengths of 1.3, 2.8, 7.3, and 50 mm. These data confirm that the GG Tau A binary is encircled by a circumbinary ring at a radius of 235 AU with a FWHM width of ∼60 AU. We find no clear evidence for a radial gradient in the spectral shape of the ring, suggesting that the particle size distribution is spatially homogeneous on angular scales ≳0.''1. A central point source, likely associated with the primary component (GG Tau Aa), exhibits a composite spectrum from dust and free-free emission. Faint emission at 7.3 mm is observed toward the low-mass star GG Tau Ba, although its origin remains uncertain. Using these measurements of the resolved, multifrequency emission structure of the GG Tau A system, models of the far-infrared to radio spectrum are developed to place constraints on the grain size distribution and dust mass in the circumbinary ring. The non-negligible curvature present in the ring spectrum implies a maximum particle size of 1-10 mm, although we are unable to place strong constraints on the distribution shape. The corresponding dust mass is 30-300 M {sub ⊕}, at a temperature of 20-30 K. We discuss how this significant concentration of relatively large particles in a narrow ring at a large radius might be produced in a local region of higher gas pressures (i.e., a particle 'trap') located near the inner edge of the circumbinary disk.

  6. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  7. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  8. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  9. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  10. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  11. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  12. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  13. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 85: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  14. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  15. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  16. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  17. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  19. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  20. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  1. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  2. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  3. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  4. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  5. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  6. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  7. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  8. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  9. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  10. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 6: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  11. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  12. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  13. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  14. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  15. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  16. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  17. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  18. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  19. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  20. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the...

  1. DOE Resolves Avanti Refrigerator and Freezer Civil Penalty Case

    Broader source: Energy.gov [DOE]

    Today, the Department of Energy announced that it has resolved the civil penalty action against Mackle Company for its failure to certify that refrigerators and refrigerator-freezers sold under the...

  2. Depth-resolved magnetic and structural analysis of relaxing epitaxial...

    Office of Scientific and Technical Information (OSTI)

    Depth-resolved magnetic and structural analysis of relaxing epitaxial Sr 2 CrReO 6 <...

  3. Nanosecond Time Resolved and Steady State Infrared Studies of...

    Office of Scientific and Technical Information (OSTI)

    Ultrafast time-resolved infrared and steady state Fourier transform IR (FTIR) spectroscopies were used to probe TATB and its products after photoexcitation with a 5 ns pulse of 532 ...

  4. Application of Spatially Resolved High Resolution Crystal Spectrometry...

    Office of Scientific and Technical Information (OSTI)

    11 PPPL- 4811 Application of Spatially Resolved High Resolution Crystal Spectrometry to ICF Plasmas September, 2012 Kenneth W. Hill, M. Bitter, L. Delgado-Aprico, N.A. Pablant, P. ...

  5. DOE Office of Enforcement Resolves 20 Energy Efficiency Enforcement Cases

    Broader source: Energy.gov [DOE]

    The Department of Energy's Office of Enforcement today announced that it has resolved the 20 enforcement cases it brought in April 2011 against companies for failing to certify that their products...

  6. Passive background correction method for spatially resolved detection

    DOE Patents [OSTI]

    Schmitt, Randal L.; Hargis, Jr., Philip J.

    2011-05-10

    A method for passive background correction during spatially or angularly resolved detection of emission that is based on the simultaneous acquisition of both the passive background spectrum and the spectrum of the target of interest.

  7. Time-Resolved Study of Bonding in Liquid Carbon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lindenberg, O.R. Monteiro, Z. Chang, R.W. Lee, and R.W. Falcone, "Bonding in liquid carbon studied by time-resolved x-ray absorption spectroscopy," Phys. Rev. Lett. 94 057407 (2005...

  8. Resolved: "error while loading shared libraries: libalpslli.so...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    "error while loading shared libraries: libalpslli.so.0" with serial codes on login nodes Resolved: "error while loading shared libraries: libalpslli.so.0" with serial codes on...

  9. Evaluation of high‐level clouds in cloud resolving model...

    Office of Scientific and Technical Information (OSTI)

    Evaluation of high-level clouds in cloud resolving model 10.10022015MS000478 simulations with ARM and KWAJEX observations Key Points: * Two-moment microphysics improves simulated ...

  10. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  11. Resolving Code and Standard Barriers to Building America Innovations - 2014

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BTO Peer Review | Department of Energy Resolving Code and Standard Barriers to Building America Innovations - 2014 BTO Peer Review Resolving Code and Standard Barriers to Building America Innovations - 2014 BTO Peer Review Presenter: Pam Cole, Pacific Northwest National Laboratory This project is developing processes and resources for a Codes and Standards Innovation (CSI) team to assist research partners and industry in overcoming codes and standards barriers to high-performance

  12. Quantum Dimension of Photosynthesis Revealed by Angular Resolved Coherent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Imaging | MIT-Harvard Center for Excitonics Dimension of Photosynthesis Revealed by Angular Resolved Coherent Imaging September 29, 2009 at 3pm/36-428 Ian Mercer Department of Physics, University College Dublin mercer abstract: Understanding the role of coherent electronic motion is expected to resolve general questions of importance in macromolecular energy transfer, in nature and in devices. Significant progress has been made using coherent optical four wave-mixing, however the

  13. EERE Success Story-Lightweight Technology Resolved Challenge Facing the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chevy Spark EV Battery Tray and Enclosure | Department of Energy Lightweight Technology Resolved Challenge Facing the Chevy Spark EV Battery Tray and Enclosure EERE Success Story-Lightweight Technology Resolved Challenge Facing the Chevy Spark EV Battery Tray and Enclosure August 18, 2015 - 11:34am Addthis The Chevy Spark EV at the Washington Auto Show. The Chevy Spark EV at the Washington Auto Show. Technology innovation comes in many forms - sometimes, it's as simple as adapting a recent

  14. Building America Webinar: Resolving Codes and Standards Issues to Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Innovations | Department of Energy Resolving Codes and Standards Issues to Energy Innovations Building America Webinar: Resolving Codes and Standards Issues to Energy Innovations This webinar provided an overview of how Building America has impacted codes and standards in the past through technical and market innovations. The presenter also described new content on the Building America Solution Center that will help builders meet code requirements and will help code officials apply codes to

  15. Seventh international conference on time-resolved vibrational spectroscopy

    SciTech Connect (OSTI)

    Dyer, R.B.; Martinez, M.A.D.; Shreve, A.; Woodruff, W.H.

    1997-04-01

    The International Conference on Time-Resolved Vibrational Spectroscopy (TRVS) is widely recognized as the major international forum for the discussion of advances in this rapidly growing field. The 1995 conference was the seventh in a series that began at Lake Placid, New York, 1982. Santa Fe, New Mexico, was the site of the Seventh International Conference on Time-Resolved Vibrational Spectroscopy, held from June 11 to 16, 1995. TRVS-7 was attended by 157 participants from 16 countries and 85 institutions, and research ranging across the full breadth of the field of time-resolved vibrational spectroscopy was presented. Advances in both experimental capabilities for time-resolved vibrational measurements and in theoretical descriptions of time-resolved vibrational methods continue to occur, and several sessions of the conference were devoted to discussion of these advances and the associated new directions in TRVS. Continuing the interdisciplinary tradition of the TRVS meetings, applications of time-resolved vibrational methods to problems in physics, biology, materials science, and chemistry comprised a large portion of the papers presented at the conference.

  16. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  17. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  18. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  19. A Decision Analysis Tool for Climate Impacts, Adaptations, and Vulnerabilities

    SciTech Connect (OSTI)

    Omitaomu, Olufemi A; Parish, Esther S; Nugent, Philip J

    2016-01-01

    Climate change related extreme events (such as flooding, storms, and drought) are already impacting millions of people globally at a cost of billions of dollars annually. Hence, there are urgent needs for urban areas to develop adaptation strategies that will alleviate the impacts of these extreme events. However, lack of appropriate decision support tools that match local applications is limiting local planning efforts. In this paper, we present a quantitative analysis and optimization system with customized decision support modules built on geographic information system (GIS) platform to bridge this gap. This platform is called Urban Climate Adaptation Tool (Urban-CAT). For all Urban-CAT models, we divide a city into a grid with tens of thousands of cells; then compute a list of metrics for each cell from the GIS data. These metrics are used as independent variables to predict climate impacts, compute vulnerability score, and evaluate adaptation options. Overall, the Urban-CAT system has three layers: data layer (that contains spatial data, socio-economic and environmental data, and analytic data), middle layer (that handles data processing, model management, and GIS operation), and application layer (that provides climate impacts forecast, adaptation optimization, and site evaluation). The Urban-CAT platform can guide city and county governments in identifying and planning for effective climate change adaptation strategies.

  20. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

    1. Climate change and health: Indoor heat exposure in vulnerable populations

      SciTech Connect (OSTI)

      White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

      2012-01-15

      Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

    2. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

      Broader source: Energy.gov [DOE]

      A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

    3. Westinghouse Pays $50,000 Civil Penalty to Resolve Light Bulb...

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Westinghouse Pays 50,000 Civil Penalty to Resolve Light Bulb Efficiency Violations Westinghouse Pays 50,000 Civil Penalty to Resolve Light Bulb Efficiency Violations December 13, ...

    4. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

    5. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      | Department of Energy 51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am Addthis PROBLEM: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the players are those prior to client builds T27LC SP22 and

    6. Application of Spatially Resolved High Resolution Crystal Spectrometry to

      Office of Scientific and Technical Information (OSTI)

      ICF Plasmas (Conference) | SciTech Connect Application of Spatially Resolved High Resolution Crystal Spectrometry to ICF Plasmas Citation Details In-Document Search Title: Application of Spatially Resolved High Resolution Crystal Spectrometry to ICF Plasmas High resolution (λ/Δ λ ~ 10 000) 1D imaging x-ray spectroscopy using a spherically bent crystal and a 2D hybrid pixel array detector is used world wide for Doppler measurements of ion-temperature and plasma flow-velocity profiles in

    7. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Time-Resolved Study of Bonding in Liquid Carbon Print Wednesday, 28 September 2005 00:00 We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms

    8. Resolved Atomic Interaction Sidebands in an Optical Clock Transition

      SciTech Connect (OSTI)

      Bishof, M.; Lin, Y.; Swallows, M. D.; Ye, J.; Rey, A. M.; Gorshkov, A. V.

      2011-06-24

      We report the observation of resolved atomic interaction sidebands (ISB) in the {sup 87}Sr optical clock transition when atoms at microkelvin temperatures are confined in a two-dimensional optical lattice. The ISB are a manifestation of the strong interactions that occur between atoms confined in a quasi-one-dimensional geometry and disappear when the confinement is relaxed along one dimension. The emergence of ISB is linked to the recently observed suppression of collisional frequency shifts. At the current temperatures, the ISB can be resolved but are broad. At lower temperatures, ISB are predicted to be substantially narrower and useful spectroscopic tools in strongly interacting alkaline-earth gases.

    9. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

      Broader source: Energy.gov [DOE]

      McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

    10. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

    11. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

      SciTech Connect (OSTI)

      Chinthavali, Supriya; Shankar, Mallikarjun

      2016-01-01

      Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph, (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.

    12. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

      Broader source: Energy.gov [DOE]

      The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

    13. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

      Broader source: Energy.gov [DOE]

      An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

    14. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

      Broader source: Energy.gov [DOE]

      Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

    15. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

      Broader source: Energy.gov [DOE]

      Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

    16. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

      Broader source: Energy.gov (indexed) [DOE]

      Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis ...

    17. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

      Broader source: Energy.gov [DOE]

      The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

    18. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

      Broader source: Energy.gov [DOE]

      IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

    19. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather |

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Department of Energy U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the Administration's efforts to support national climate change adaptation planning through the Interagency Climate Change Adaptation Task Force and Strategic Sustainability Planning process established under Executive Order 13514 and to advance the U.S. Department of Energy's goal of promoting energy

    20. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

      Broader source: Energy.gov [DOE]

      Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

    1. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

      Broader source: Energy.gov [DOE]

      Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

    2. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

      SciTech Connect (OSTI)

      Moss, R. H.; Delgado, A.; Malone, E L.

      2015-08-15

      U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

    3. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

      SciTech Connect (OSTI)

      Meacham, J.E.

      1996-02-15

      The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

    4. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Resilience Solutions | Department of Energy Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser. This report examines the current and potential future impacts of climate change and extreme weather on the U.S. energy sector at the regional level. It provides illustrative examples

    5. Spatially and Temporally Resolved Energy and Environment Tool (STREET) Model

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Spatially and Temporally Resolved Energy and Environment Tool (STREET) Model (University of California-Irvine) Objectives Determine the number of strategically located hydrogen fueling stations needed within a geographic area to enable the introduction of commercial volumes of fuel cell electric vehicles (FCEVs), and determine the geographic distribution of the required stations while also assessing the environmental impacts. Key Attributes & Strengths Optimized hydrogen fueling station

    6. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    7. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    8. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    9. Ultrafast Time-Resolved Electron Diffraction with Megavolt Electron Beams

      SciTech Connect (OSTI)

      Hastings, J.B.; Rudakov, F.M.; Dowell, D.H.; Schmerge, J.F.; Cardoza, J.D.; Castro, J.M.; Gierman, S.M.; Loos, H.; Weber, P.M.; /Brown U.

      2006-10-24

      An rf photocathode electron gun is used as an electron source for ultrafast time-resolved pump-probe electron diffraction. We observed single-shot diffraction patterns from a 160 nm Al foil using the 5.4 MeV electron beam from the Gun Test Facility at the Stanford Linear Accelerator. Excellent agreement with simulations suggests that single-shot diffraction experiments with a time resolution approaching 100 fs are possible.

    10. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    11. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    12. Time-Resolved Study of Bonding in Liquid Carbon

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-Resolved Study of Bonding in Liquid Carbon Print We are accustomed to observing carbon in its elemental form as a solid, ranging from the soft "lead" in pencils to the precious gemstone in diamond rings. While considerable attention has been focused on solid forms of carbon, the properties of liquid carbon are much more difficult to measure accurately. The very strong bonding between carbon atoms that gives diamonds their hardness also makes carbon very difficult to melt,

    13. Resolving and measuring diffusion in complex interfaces: Exploring new capabilities

      SciTech Connect (OSTI)

      Alam, Todd M.

      2015-09-01

      This exploratory LDRD targeted the use of a new high resolution spectroscopic diffusion capabilities developed at Sandia to resolve transport processes at interfaces in heterogeneous polymer materials. In particular, the combination of high resolution magic angle spinning (HRMAS) nuclear magnetic resonance (NMR) spectroscopy with pulsed field gradient (PFG) diffusion experiments were used to directly explore interface diffusion within heterogeneous polymer composites, including measuring diffusion for individual chemical species in multi-component mixtures. Several different types of heterogeneous polymer systems were studied using these HRMAS NMR diffusion capabilities to probe the resolution limitations, determine the spatial length scales involved, and explore the general applicability to specific heterogeneous systems. The investigations pursued included a) the direct measurement of the diffusion for poly(dimethyl siloxane) polymer (PDMS) on nano-porous materials, b) measurement of penetrant diffusion in additive manufactures (3D printed) processed PDMS composites, and c) the measurement of diffusion in swollen polymers/penetrant mixtures within nano-confined aluminum oxide membranes. The NMR diffusion results obtained were encouraging and allowed for an improved understanding of diffusion and transport processes at the molecular level, while at the same time demonstrating that the spatial heterogeneity that can be resolved using HRMAS NMR PFG diffusion experiment must be larger than ~μm length scales, expect for polymer transport within nanoporous carbons where additional chemical resolution improves the resolvable heterogeneous length scale to hundreds of nm.

    14. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

      SciTech Connect (OSTI)

      Brenkert, Antoinette L.; Malone, Elizabeth L.

      2005-09-01

      The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

    15. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

    16. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

      Broader source: Energy.gov [DOE]

      The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

    17. Time-resolved x-ray diffraction across water-ices VI/VII transformatio...

      Office of Scientific and Technical Information (OSTI)

      Conference: Time-resolved x-ray diffraction across water-ices VIVII transformations using dynamic-DAC Citation Details In-Document Search Title: Time-resolved x-ray diffraction ...

    18. Novel energy resolving x-ray pinhole camera on Alcator C-Mod...

      Office of Scientific and Technical Information (OSTI)

      Novel energy resolving x-ray pinhole camera on Alcator C-Mod Citation Details In-Document Search Title: Novel energy resolving x-ray pinhole camera on Alcator C-Mod A new energy ...

    19. Sandia Corporation Agrees to Pay $4.7 Million to Resolve Allegations...

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Sandia Corporation Agrees to Pay 4.7 Million to Resolve Allegations Related to Lobbying Activities Sandia Corporation Agrees to Pay 4.7 Million to Resolve Allegations Related to ...

    20. Angle Resolved Thermal Conductivity of CeCoIn5 along the Nodal...

      Office of Scientific and Technical Information (OSTI)

      Angle Resolved Thermal Conductivity of CeCoIn5 along the Nodal Direction Citation Details In-Document Search Title: Angle Resolved Thermal Conductivity of CeCoIn5 along the Nodal ...

    1. Time-resolved Spectroscopy of Laser-heated Copper Foils | Stanford...

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Time-resolved Spectroscopy of Laser-heated Copper Foils Tuesday, July 16, 2013 - 11:00am ... The volumetric heating of a thin copper target has been studied with time resolved x-ray ...

    2. Spatially resolved heat release rate measurements in turbulent premixed flames

      SciTech Connect (OSTI)

      Ayoola, B.O.; Kaminski, C.F.; Balachandran, R.; Mastorakos, E.; Frank, J.H.

      2006-01-01

      Heat release rate is a fundamental property of great importance for the theoretical and experimental elucidation of unsteady flame behaviors such as combustion noise, combustion instabilities, and pulsed combustion. Investigations of such thermoacoustic interactions require a reliable indicator of heat release rate capable of resolving spatial structures in turbulent flames. Traditionally, heat release rate has been estimated via OH or CH radical chemiluminescence; however, chemiluminescence suffers from being a line-of-sight technique with limited capability for resolving small-scale structures. In this paper, we report spatially resolved two-dimensional measurements of a quantity closely related to heat release rate. The diagnostic technique uses simultaneous OH and CH{sub 2}O planar laser-induced fluorescence (PLIF), and the pixel-by-pixel product of the OH and CH{sub 2}O PLIF signals has previously been shown to correlate well with local heat release rates. Results from this diagnostic technique, which we refer to as heat release rate imaging (HR imaging), are compared with traditional OH chemiluminescence measurements in several flames. Studies were performed in lean premixed ethylene flames stabilized between opposed jets and with a bluff body. Correlations between bulk strain rates and local heat release rates were obtained and the effects of curvature on heat release rate were investigated. The results show that the heat release rate tends to increase with increasing negative curvature for the flames investigated for which Lewis numbers are greater than unity. This correlation becomes more pronounced as the flame gets closer to global extinction.

    3. The Dark Energy Survey: Prospects for resolved stellar populations

      SciTech Connect (OSTI)

      Rossetto, Bruno M.; Santiago, Basílio X.; Girardi, Léo; Camargo, Julio I. B.; Balbinot, Eduardo; da Costa, Luiz N.; Yanny, Brian; Maia, Marcio A. G.; Makler, Martin; Ogando, Ricardo L. C.; Pellegrini, Paulo S.; Ramos, Beatriz; de Simoni, Fernando; Armstrong, R.; Bertin, E.; Desai, S.; Kuropatkin, N.; Lin, H.; Mohr, J. J.; Tucker, D. L.

      2011-05-06

      Wide angle and deep surveys, regardless of their primary purpose, always sample a large number of stars in the Galaxy and in its satellite system. We here make a forecast of the expected stellar sample resulting from the Dark Energy Survey and the perspectives that it will open for studies of Galactic structure and resolved stellar populations in general. An estimated 1.2 x 108 stars will be sampled in DES grizY filters in the southern equatorial hemisphere. This roughly corresponds to 20% of all DES sources. Most of these stars belong to the stellar thick disk and halo of the Galaxy.

    4. THE DARK ENERGY SURVEY: PROSPECTS FOR RESOLVED STELLAR POPULATIONS

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Rossetto, Bruno M.; Santiago, Baslio X.; Girardi, Lo; Camargo, Julio I. B.; Balbinot, Eduardo; da Costa, Luiz N.; Yanny, Brian; Maia, Marcio A. G.; Makler, Martin; Ogando, Ricardo L. C.; et al

      2011-06-01

      Wide angle and deep surveys, regardless of their primary purpose, always sample a large number of stars in the Galaxy and in its satellite system. We here make a forecast of the expected stellar sample resulting from the Dark Energy Survey and the perspectives that it will open for studies of Galactic structure and resolved stellar populations in general. An estimated 1.2 x 108 stars will be sampled in DES grizY filters in the southern equatorial hemisphere. This roughly corresponds to 20% of all DES sources. Most of these stars belong to the stellar thick disk and halo of themoreGalaxy.less

    5. A compact electron gun for time-resolved electron diffraction

      SciTech Connect (OSTI)

      Robinson, Matthew S.; Lane, Paul D.; Wann, Derek A.

      2015-01-15

      A novel compact time-resolved electron diffractometer has been built with the primary goal of studying the ultrafast molecular dynamics of photoexcited gas-phase molecules. Here, we discuss the design of the electron gun, which is triggered by a Ti:Sapphire laser, before detailing a series of calibration experiments relating to the electron-beam properties. As a further test of the apparatus, initial diffraction patterns have been collected for thin, polycrystalline platinum samples, which have been shown to match theoretical patterns. The data collected demonstrate the focusing effects of the magnetic lens on the electron beam, and how this relates to the spatial resolution of the diffraction pattern.

    6. Time-resolved fluorescence decay measurements for flowing particles

      DOE Patents [OSTI]

      Deka, Chiranjit; Steinkamp, John A.

      1999-01-01

      Time-resolved fluorescence decay measurements for flowing particles. An apparatus and method for the measurement and analysis of fluorescence for individual cells and particles in flow are described, wherein the rapid measurement capabilities of flow cytometry and the robust measurement and analysis procedures of time-domain fluorescence lifetime spectroscopy are combined. A pulse-modulated cw laser is employed for excitation of the particles. The characteristics and the repetition rate of the excitation pulses can be readily adjusted to accommodate for fluorescence decays having a wide range of lifetimes.

    7. Time-resolved fluorescence decay measurements for flowing particles

      DOE Patents [OSTI]

      Deka, C.; Steinkamp, J.A.

      1999-06-01

      Time-resolved fluorescence decay measurements are disclosed for flowing particles. An apparatus and method for the measurement and analysis of fluorescence for individual cells and particles in flow are described, wherein the rapid measurement capabilities of flow cytometry and the robust measurement and analysis procedures of time-domain fluorescence lifetime spectroscopy are combined. A pulse-modulated CW laser is employed for excitation of the particles. The characteristics and the repetition rate of the excitation pulses can be readily adjusted to accommodate for fluorescence decays having a wide range of lifetimes. 12 figs.

    8. Time-resolved fluorometric determination of terbium in aqueous solution

      SciTech Connect (OSTI)

      Hemmilae, I.

      1985-07-01

      The fluorescent properties of water-soluble binary and ternary complexes of terbium(III) were studied and their applications in time-resolved fluorometric analysis were tested. Solutions composed of different ..beta..-diketones, tri-n-octylphosphine oxide as the synergistic agent, and Triton X-100 as the detergent were optimized to maximize fluorescence emission in Tb measurement. The results were then compared with seven published methods which included the use of the following respective solutions, ethylenediamine-N,N'-bis((o-hydroxy-phenyl)acetic acid), dipicolinic acid, iminodiacetic acid with Tiron, EDTA with Tiron, EDTA with 2,3-dihydroxynaphthalene, EDTA with sulfosalicylic acid, and EDTA with salicylate. Fluorinated aliphatic ..beta..-diketones showed the most promising properties in acidic solution. They were especially suitable for use in time-resolved fluorometric analyses where Tb was used as the label after being conjugated to the analyte via bifunctional complexones. An acidic pH is required for Tb release before conversion into a fluorescent chelate. The applicability of the developed measurement solutions to the measurement of Eu was also tested. 22 references, 3 figures, 7 tables.

    9. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

      Office of Energy Efficiency and Renewable Energy (EERE)

      The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

    10. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

      Broader source: Energy.gov [DOE]

      OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

    11. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

      SciTech Connect (OSTI)

      Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

      2008-07-08

      The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

    12. Taxonomy of USA east coast fishing communities in terms of social vulnerability and resilience

      SciTech Connect (OSTI)

      Pollnac, Richard B.; Seara, Tarsila; Colburn, Lisa L.; Jepson, Michael

      2015-11-15

      Increased concern with the impacts that changing coastal environments can have on coastal fishing communities led to a recent effort by NOAA Fisheries social scientists to develop a set of indicators of social vulnerability and resilience for the U.S. Southeast and Northeast coastal communities. A goal of the NOAA Fisheries social vulnerability and resilience indicator program is to support time and cost effective use of readily available data in furtherance of both social impact assessments of proposed changes to fishery management regulations and climate change adaptation planning. The use of the indicators to predict the response to change in coastal communities would be enhanced if community level analyses could be grouped effectively. This study examines the usefulness of combining 1130 communities into 35 relevant subgroups by comparing results of a numerical taxonomy with data collected by interview methods, a process herein referred to as “ground-truthing.” The validation of the taxonomic method by the method of ground-truthing indicates that the clusters are adequate to be used to select communities for in-depth research. - Highlights: • We develop a taxonomy of fishing communities based on vulnerability indicators. • We validate the community clusters through the use of surveys (“ground-truthing”). • Clusters differ along important aspects of fishing community vulnerability. • Clustering communities allows for accurate and timely social impact assessments.

    13. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

      SciTech Connect (OSTI)

      Not Available

      1994-09-01

      The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

    14. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability

      Office of Energy Efficiency and Renewable Energy (EERE)

      Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

    15. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

      SciTech Connect (OSTI)

      Fesharaki, F.; Rizer, J.P.; Greer, L.S.

      1994-05-01

      The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

    16. Electronic properties of linear carbon chains: Resolving the controversy

      SciTech Connect (OSTI)

      Al-Backri, Amaal; Zólyomi, Viktor; Lambert, Colin J.

      2014-03-14

      Literature values for the energy gap of long one-dimensional carbon chains vary from as little as 0.2 eV to more than 4 eV. To resolve this discrepancy, we use the GW many-body approach to calculate the band gap E{sub g} of an infinite carbon chain. We also compute the energy dependence of the attenuation coefficient β governing the decay with chain length of the electrical conductance of long chains and compare this with recent experimental measurements of the single-molecule conductance of end-capped carbon chains. For long chains, we find E{sub g} = 2.16 eV and an upper bound for β of 0.21 Å{sup −1}.

    17. FXR LIA Optimization - Time-resolved OTR Emittance Measurement

      SciTech Connect (OSTI)

      Jacob, J; Ong, M; Wargo, P; LeSage, G

      2005-07-21

      The Flash X-Ray Radiography (FXR) facility at Lawrence Livermore National Laboratory utilizes a high current, long pulse linear induction accelerator to produce high doses of x-ray radiation. Accurate characterization of the transverse beam emittance is required in order to facilitate accelerator modeling and tuning efforts and, ultimately, to optimize the final focus spot size, yielding higher resolution radiographs. In addition to conventional magnet scan, pepper-pot, and multiple screen techniques, optical transition radiation (OTR) has been proven as a useful emittance measurement diagnostic and is particularly well suited to the FXR accelerator. We shall discuss the time-resolved emittance characterization of an induction linac electron beam using OTR, and we will present our experimental apparatus and analysis software. We shall also develop the theoretical background of beam emittance and transition radiation.

    18. Expansion-loop enclosure resolves subsea line problems

      SciTech Connect (OSTI)

      Rich, S.K.; Alleyne, A.G.

      1998-08-03

      Recent design and construction of a Gulf of Mexico subsea pipeline illustrate the use of buried, enclosed expansion loops to resolve problems from expansion and upheaval buckling. Buried, subsea pipelines operating at high temperatures and pressures experience extreme compressive loads caused by the axial restraint of the soil. The high axial forces combined with imperfections in the seabed may overstress the pipeline or result in upheaval buckling. Typically, expansion loops, or doglegs, are installed to protect the pipeline risers from expansion and to alleviate axial forces. Buried expansion loops, however, are rendered virtually ineffective by the lateral restraint of the soil. Alternative methods to reduce expansion may increase the potential of upheaval buckling or overstressing the pipeline. Therefore, system design must consider expansion and upheaval buckling together. Discussed here are methods of prevention and control of expansion and upheaval buckling, evaluating the impact on the overall system.

    19. Evaluation study of building-resolved urban dispersion models

      SciTech Connect (OSTI)

      Flaherty, Julia E.; Allwine, K Jerry; Brown, Mike J.; Coirier, WIlliam J.; Ericson, Shawn C.; Hansen, Olav R.; Huber, Alan H.; Kim, Sura; Leach, Martin J.; Mirocha, Jeff D.; Newsom, Rob K.; Patnaik, Gopal; Senocak, Inanc

      2007-09-10

      For effective emergency response and recovery planning, it is critically important that building-resolved urban dispersion models be evaluated using field data. Several full-physics computational fluid dynamics (CFD) models and semi-empirical building-resolved (SEB) models are being advanced and applied to simulating flow and dispersion in urban areas. To obtain an estimate of the current state-of-readiness of these classes of models, the Department of Homeland Security (DHS) funded a study to compare five CFD models and one SEB model with tracer data from the extensive Midtown Manhattan field study (MID05) conducted during August 2005 as part of the DHS Urban Dispersion Program (UDP; Allwine and Flaherty 2007). Six days of tracer and meteorological experiments were conducted over an approximately 2-km-by-2-km area in Midtown Manhattan just south of Central Park in New York City. A subset of these data was used for model evaluations. The study was conducted such that an evaluation team, independent of the six modeling teams, provided all the input data (e.g., building data, meteorological data and tracer release rates) and run conditions for each of four experimental periods simulated. Tracer concentration data for two of the four experimental periods were provided to the modeling teams for their own evaluation of their respective models to ensure proper setup and operation. Tracer data were not provided for the second two experimental periods to provide for an independent evaluation of the models. The tracer concentrations resulting from the model simulations were provided to the evaluation team in a standard format for consistency in inter-comparing model results. An overview of the model evaluation approach will be given followed by a discussion on the qualitative comparison of the respective models with the field data. Future model developments efforts needed to address modeling gaps identified from this study will also be discussed.

    20. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

      SciTech Connect (OSTI)

      Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

      2010-08-25

      Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

    1. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis Acknowledgements This report was produced by the U.S. Department of Energy's Office of Energy Policy and Systems Analysis (DOE-EPSA) under the direction of Craig Zamuda. Matt Antes, C.W. Gillespie, Anna Mosby, and Beth Zotter of Energetics Incorporated provided analysis, drafting support, and technical editing.

    2. RESOLVING THE BARYON-FRACTION PROFILE IN LENSING GALAXIES

      SciTech Connect (OSTI)

      Leier, Dominik; Ferreras, Ignacio; Saha, Prasenjit; Falco, Emilio E.

      2011-10-20

      The study of the distribution of baryonic matter within dark halos enriches our understanding of galaxy formation. We show the radial dependence of stellar baryon-fraction curves derived for 21 lensing galaxies from the CfA-Arizona Space Telescope LEns Survey (CASTLES) by means of stellar population synthesis and pixel-based mass reconstruction. The sample covers a stellar mass range of M{sub s} {approx_equal} 2 x 10{sup 9}-3 x 10{sup 11} M{sub sun} (solar masses) which corresponds to a total enclosed mass range of M{sub L} {approx_equal} 7 x 10{sup 9}-3 x 10{sup 12} M{sub sun} on radial scales from 0.25R{sub e} to 5R{sub e} (effective radii). By examining the M{sub s} and M{sub L} dependence on radial distance to the center of each galaxy, we find that there are pairs of lenses on small to intermediate mass scales which approach at large radii the same values for their enclosed total mass but exhibit very different stellar masses and stellar baryon fractions. This peculiar behavior subsides for the most massive lensing galaxies. All the baryon-fraction profiles show that the dark matter halo overtakes the stellar content between 1.5 and 2.5R{sub e}. At 3R{sub e} most of the stellar component is enclosed. We find evidence for a stellar baryon fraction steadily declining over the full mass range. Furthermore, we shed light on the Fundamental Plane puzzle by showing that the slope of the M{sub L} (< R)-to-M{sub s} (< R) relation approaches the mass-to-light relation of recent Fundamental Plane studies at large radii. We also introduce novel concentration indices c = R90/R50 for stellar and total mass profiles (i.e., the ratio of radii enclosing 90% and 50% of the stellar or total mass). We show that the value c = 2.6 originally determined by light profiles which separates early-type galaxies from late-type galaxies also holds for stellar mass. In particular, less massive dark matter halos turn out to be influenced by the distribution of stellar matter on resolved

    3. Measuring the X-ray Resolving Power of Bent Potassium Acid Phthalate

      Office of Scientific and Technical Information (OSTI)

      Diffraction Crystals (Conference) | SciTech Connect Conference: Measuring the X-ray Resolving Power of Bent Potassium Acid Phthalate Diffraction Crystals Citation Details In-Document Search Title: Measuring the X-ray Resolving Power of Bent Potassium Acid Phthalate Diffraction Crystals This report presents the results from measuring the X-ray resolving power of a curved potassium acid phthalate (KAP(001)) spectrometer crystal using two independent methods. It is part of a continuing effort

    4. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

      SciTech Connect (OSTI)

      Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

      2013-07-01

      Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

    5. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

      SciTech Connect (OSTI)

      Not Available

      1994-09-01

      The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

    6. Data management for geospatial vulnerability assessment of interdependencies in US power generation

      SciTech Connect (OSTI)

      Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

      2009-09-15

      Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

    7. Vulnerability and adaptation to severe weather events in the American southwest

      SciTech Connect (OSTI)

      Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

      2015-05-04

      Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptation to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.

    8. Vulnerability and adaptation to severe weather events in the American southwest

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

      2015-05-04

      Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

    9. Application of artificial neural networks in power system security and vulnerability assessment

      SciTech Connect (OSTI)

      Qin Zhou; Davidson, J.; Fouad, A.A.

      1994-02-01

      In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

    10. EGR Spatial Uniformity & Cylinder-Resolved Transients-Measurements using an Absorption Spectroscopy Probe

      Broader source: Energy.gov [DOE]

      This poster describes development and application of an EGR probe for assessing steady-state spatial uniformity and cylinder-resolved EGR dynamics.

    11. ADR LUNCHTIME PROGRAM: "Mindfulness for Conflict Resolvers" |

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Department of Energy LUNCHTIME PROGRAM: "Mindfulness for Conflict Resolvers" ADR LUNCHTIME PROGRAM: "Mindfulness for Conflict Resolvers" Speaker: Rachel Wohl, Esq., Conflict Specialist "Mindfulness for Conflict Resolvers" Mindfulness is moment-to-moment, non-judgmental awareness, i.e., being fully present. We know that the quality of the presence of conflict resolvers has an impact on both the parties and the process. We may find ourselves in the middle of

    12. Evidence of dynamical spin shielding in Ce from spin-resolved...

      Office of Scientific and Technical Information (OSTI)

      Evidence of dynamical spin shielding in Ce from spin-resolved photoelectron spectroscopy Citation Details In-Document Search Title: Evidence of dynamical spin shielding in Ce from ...

    13. Development of Time Resolved X-ray Spectroscopy in High Intensity...

      Office of Scientific and Technical Information (OSTI)

      Title: Development of Time Resolved X-ray Spectroscopy in High Intensity Laser-Plasma Interactions Authors: Notley, M ; Weber, R ; Fell, B ; Jefferies, J ; Freeman, R ; Mackinnon, ...

    14. DOE Resolves Nearly One-Third of 27 Recently Filed Civil Penalty Cases

      Office of Energy Efficiency and Renewable Energy (EERE)

      The Department has successfully resolved eight of the 27 enforcement cases brought just two weeks ago against companies for selling products without properly certifying their compliance with the...

    15. Time-Resolved Picosecond Pure-Rotational Coherent anti-Stokes...

      Office of Scientific and Technical Information (OSTI)

      Time-Resolved Picosecond Pure-Rotational Coherent anti-Stokes Raman Spectroscopy for Thermometry and Species Concentration in Combustion Environments. Citation Details In-Document ...

    16. Evaluation of high-level clouds in cloud resolving model simulations...

      Office of Scientific and Technical Information (OSTI)

      Title: Evaluation of high-level clouds in cloud resolving model simulations with ARM and KWAJEX observations: HIGH CLOUD IN CRM Authors: Liu, Zheng 1 ; Muhlbauer, Andreas 2 ; ...

    17. Numerical simulations of altocumulus with a cloud resolving model

      SciTech Connect (OSTI)

      Liu, S.; Krueger, S.K.

      1996-04-01

      Altocumulus and altostratus clouds together cover approximately 22% of the earth`s surface. They play an important role in the earth`s energy budget through their effect on solar and infrared radiation. However, there has been little altocumulus cloud investigation by either modelers or observational programs. Starr and Cox (SC) (1985a,b) simulated an altostratus case as part of the same study in which they modeled a thin layer of cirrus. Although this calculation was originally described as representing altostratus, it probably better represents altocumulus stratiformis. In this paper, we simulate altocumulus cloud with a cloud resolving model (CRM). We simply describe the CRM first. We calculate the same middle-level cloud case as SC to compare our results with theirs. We will look at the role of cloud-scale processes in response to large-scale forcing. We will also discuss radiative effects by simulating diurnal and nocturnal cases. Finally, we discuss the utility of a 1D model by comparing 1D simulations and 2D simulations.

    18. Spectrally Resolved Magnetic Resonance Imaging of the XenonBiosensor

      SciTech Connect (OSTI)

      Hilty, Christian; Lowery, Thomas; Wemmer, David; Pines, Alexander

      2005-07-15

      Due to its ability to non-invasively record images, as well as elucidate molecular structure, nuclear magnetic resonance is the method of choice for applications as widespread as chemical analysis and medical diagnostics. Its detection threshold is, however, limited by the small polarization of nuclear spins in even the highest available magnetic fields. This limitation can, under certain circumstances, be alleviated by using hyper-polarized substances. Xenon biosensors make use of the sensitivity gain of hyperpolarized xenon to provide magnetic resonance detection capability for a specific low-concentration target. They consist of a cryptophane cage, which binds one xenon atom, and which has been connected via a linker to a targeting moiety such as a ligand or antibody. Recent work has shown the possibility of using the xenon biosensor to detect small amounts of a substance in a heterogeneous environment by NMR. Here, we demonstrate that magnetic resonance (MR) provides the capability to obtain spectrally and spatially resolved images of the distribution of immobilized biosensor, opening the possibility for using the xenon biosensor for targeted imaging.

    19. Magnetoelectroluminescence of organic heterostructures: Analytical theory and spectrally resolved measurements

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Liu, Feilong; Kelley, Megan R.; Crooker, Scott A.; Nie, Wanyi; Mohite, Aditya D.; Ruden, P. Paul; Los Alamos National Lab.; Smith, Darryl L.; Los Alamos National Lab.

      2014-12-22

      The effect of a magnetic field on the electroluminescence of organic light emitting devices originates from the hyperfine interaction between the electron/hole polarons and the hydrogen nuclei of the host molecules. In this paper, we present an analytical theory of magnetoelectroluminescence for organic semiconductors. To be specific, we focus on bilayer heterostructure devices. In the case we are considering, light generation at the interface of the donor and acceptor layers results from the formation and recombination of exciplexes. The spin physics is described by a stochastic Liouville equation for the electron/hole spin density matrix. By finding the steady-state analytical solutionmore » using Bloch-Wangsness-Redfield theory, we explore how the singlet/triplet exciplex ratio is affected by the hyperfine interaction strength and by the external magnetic field. In order to validate the theory, spectrally resolved electroluminescence experiments on BPhen/m-MTDATA devices are analyzed. With increasing emission wavelength, the width of the magnetic field modulation curve of the electroluminescence increases while its depth decreases. Furthermore, these observations are consistent with the model.« less

    20. Surface determination through atomically resolved secondary-electron imaging

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Ciston, J.; Brown, H. G.; D’Alfonso, A. J.; Koirala, P.; Ophus, C.; Lin, Y.; Suzuki, Y.; Inada, H.; Zhu, Y.; Allen, L. J.; et al

      2015-06-17

      We report that unique determination of the atomic structure of technologically relevant surfaces is often limited by both a need for homogeneous crystals and ambiguity of registration between the surface and bulk. Atomically resolved secondary-electron imaging is extremely sensitive to this registration and is compatible with faceted nanomaterials, but has not been previously utilized for surface structure determination. Here we show a detailed experimental atomic-resolution secondary-electron microscopy analysis of the c(6 x 2) reconstruction on strontium titanate (001) coupled with careful simulation of secondary-electron images, density functional theory calculations and surface monolayer-sensitive aberration-corrected plan-view high-resolution transmission electron microscopy. Our workmore » reveals several unexpected findings, including an amended registry of the surface on the bulk and strontium atoms with unusual seven-fold coordination within a typically high surface coverage of square pyramidal TiO5 units. Lastly, dielectric screening is found to play a critical role in attenuating secondary-electron generation processes from valence orbitals.« less

    1. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

      Broader source: Energy.gov [DOE]

      The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

    2. Chandra resolves the T Tauri binary system RW Aur

      SciTech Connect (OSTI)

      Skinner, Stephen L.; Gdel, Manuel E-mail: manuel.guedel@univie.ac.at

      2014-06-20

      RW Aur is a multiple T Tauri system consisting of an early-K type primary (A) and a K5 companion (B) at a separation of 1.''4. RW Aur A drives a bipolar optical jet that is well characterized optically. We present results of a sensitive Chandra observation whose primary objective was to search for evidence of soft extended X-ray emission along the jet, as has been seen for a few other nearby T Tauri stars. The binary is clearly resolved by Chandra and both stars are detected as X-ray sources. The X-ray spectra of both stars reveal evidence for cool and hot plasma. Surprisingly, the X-ray luminosity of the less-massive secondary is at least twice that of the primary and is variable. The disparity is attributed to the primary whose X-ray luminosity is at the low end of the range for classical T Tauri stars of similar mass based on established correlations. Deconvolved soft-band images show evidence for slight outward elongation of the source structure of RW Aur A along the blueshifted jet axis inside the central arcsecond. In addition, a faint X-ray emission peak is present on the redshifted axis at an offset of 1.''2 0.''2 from the star. Deprojected jet speeds determined from previous optical studies are too low to explain this faint emission peak as shock-heated jet plasma. Thus, unless flow speeds in the redshifted jet have been underestimated, other mechanisms such as magnetic jet heating may be involved.

    3. RESOLVING THE RADIO SOURCE BACKGROUND: DEEPER UNDERSTANDING THROUGH CONFUSION

      SciTech Connect (OSTI)

      Condon, J. J.; Cotton, W. D.; Fomalont, E. B.; Kellermann, K. I.; Miller, N.; Perley, R. A.; Scott, D.; Vernstrom, T.; Wall, J. V.

      2012-10-10

      We used the Karl G. Jansky Very Large Array to image one primary beam area at 3 GHz with 8'' FWHM resolution and 1.0 {mu}Jy beam{sup -1} rms noise near the pointing center. The P(D) distribution from the central 10 arcmin of this confusion-limited image constrains the count of discrete sources in the 1 < S({mu}Jy) < 10 range. At this level, the brightness-weighted differential count S {sup 2} n(S) is converging rapidly, as predicted by evolutionary models in which the faintest radio sources are star-forming galaxies; and Almost-Equal-To 96% of the background originating in galaxies has been resolved into discrete sources. About 63% of the radio background is produced by active galactic nuclei (AGNs), and the remaining 37% comes from star-forming galaxies that obey the far-infrared (FIR)/radio correlation and account for most of the FIR background at {lambda} Almost-Equal-To 160 {mu}m. Our new data confirm that radio sources powered by AGNs and star formation evolve at about the same rate, a result consistent with AGN feedback and the rough correlation of black hole and stellar masses. The confusion at centimeter wavelengths is low enough that neither the planned Square Kilometre Array nor its pathfinder ASKAP EMU survey should be confusion limited, and the ultimate source detection limit imposed by 'natural' confusion is {<=}0.01 {mu}Jy at {nu} = 1.4 GHz. If discrete sources dominate the bright extragalactic background reported by ARCADE 2 at 3.3 GHz, they cannot be located in or near galaxies and most are {<=}0.03 {mu}Jy at 1.4 GHz.

    4. Extending the Shared Socioeconomic Pathways for sub-national impacts, adaptation, and vulnerability studies

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Absar, Syeda Mariya; Preston, Benjamin L.

      2015-05-25

      The exploration of alternative socioeconomic futures is an important aspect of understanding the potential consequences of climate change. While socioeconomic scenarios are common and, at times essential, tools for the impact, adaptation and vulnerability and integrated assessment modeling research communities, their approaches to scenario development have historically been quite distinct. However, increasing convergence of impact, adaptation and vulnerability and integrated assessment modeling research in terms of scales of analysis suggests there may be value in the development of a common framework for socioeconomic scenarios. The Shared Socioeconomic Pathways represents an opportunity for the development of such a common framework. However,more » the scales at which these global storylines have been developed are largely incommensurate with the sub-national scales at which impact, adaptation and vulnerability, and increasingly integrated assessment modeling, studies are conducted. Our objective for this study was to develop sub-national and sectoral extensions of the global SSP storylines in order to identify future socioeconomic challenges for adaptation for the U.S. Southeast. A set of nested qualitative socioeconomic storyline elements, integrated storylines, and accompanying quantitative indicators were developed through an application of the Factor-Actor-Sector framework. Finally, in addition to revealing challenges and opportunities associated with the use of the SSPs as a basis for more refined scenario development, this study generated sub-national storyline elements and storylines that can subsequently be used to explore the implications of alternative subnational socioeconomic futures for the assessment of climate change impacts and adaptation.« less

    5. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

      SciTech Connect (OSTI)

      Dawson, Lon Andrew; Stinebaugh, Jennifer A.

      2010-04-01

      The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

    6. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

      SciTech Connect (OSTI)

      Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

      2007-11-13

      Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

    7. Optimization strategies for the vulnerability analysis of the electric power grid.

      SciTech Connect (OSTI)

      Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

      2009-03-01

      Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

    8. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

      SciTech Connect (OSTI)

      Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

      2008-12-30

      Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

    9. Finite-dimensional approximations of the resolvent of an infinite band matrix and continued fractions

      SciTech Connect (OSTI)

      Barrios, Dolores; Lopez, Guillermo L; Martinez-Finkelshtein, A; Torrano, Emilio

      1999-04-30

      The approximability of the resolvent of an operator induced by a band matrix by the resolvents of its finite-dimensional sections is studied. For bounded perturbations of self-adjoint matrices a positive result is obtained. The convergence domain of the sequence of resolvents can be described in this case in terms of matrices involved in the representation. This result is applied to tridiagonal complex matrices to establish conditions for the convergence of Chebyshev continued fractions on sets in the complex domain. In the particular case of compact perturbations this result is improved and a connection between the poles of the limit function and the eigenvalues of the tridiagonal matrix is established.

    10. Sandia Corporation Agrees to Pay $4.7 Million to Resolve Allegations

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Related to Lobbying Activities | Department of Energy Sandia Corporation Agrees to Pay $4.7 Million to Resolve Allegations Related to Lobbying Activities Sandia Corporation Agrees to Pay $4.7 Million to Resolve Allegations Related to Lobbying Activities Sandia Corporation Agrees to Pay $4.7 Million to Resolve Allegations Related to Lobbying Activities (42.64 KB) More Documents & Publications Special Inquiry: DOE/IG-0927 Special Inquiry: DOE/IG-0927 Special Report: OIG-SR-16-01

    11. Time-resolved soft x-ray spectra from laser-produced Cu plasma...

      Office of Scientific and Technical Information (OSTI)

      Cu plasma The volumetric heating of a thin copper target has been studied with time resolved x-ray spectroscopy. The copper target was heated from a plasma produced using ...

    12. 3D Atmospheric Radiative Transfer for Cloud System-Resolving Models: Forward Modelling and Observations

      SciTech Connect (OSTI)

      Howard Barker; Jason Cole

      2012-05-17

      Utilization of cloud-resolving models and multi-dimensional radiative transfer models to investigate the importance of 3D radiation effects on the numerical simulation of cloud fields and their properties.

    13. Evaluation of high-level clouds in cloud resolving model simulations...

      Office of Scientific and Technical Information (OSTI)

      Evaluation of high-level clouds in cloud resolving model simulations with ARM and KWAJEX observations Citation Details In-Document Search Title: Evaluation of high-level clouds in ...

    14. Resolving to Make Earth Day Last All Year | Department of Energy

      Energy Savers [EERE]

      Or maybe you liked Chris' idea, and you resolved do whatever you could to save energy and money this year. When we talk about saving energy throughout the year, it's easy to forget ...

    15. Westinghouse Pays $50,000 Civil Penalty to Resolve Light Bulb Efficiency Violations

      Broader source: Energy.gov [DOE]

      The Department of Energy has successfully resolved the enforcement case against Westinghouse Lighting Corporation for failure to certify its light bulbs as compliant with DOE’s federal efficiency...

    16. Time-resolved x-ray diffraction across water-ices VI/VII transformatio...

      Office of Scientific and Technical Information (OSTI)

      diffraction across water-ices VIVII transformations using dynamic-DAC Citation Details In-Document Search Title: Time-resolved x-ray diffraction across water-ices VIVII ...

    17. Resolving Carbon's Rainbow from Uplands to the Deep-sea | Argonne...

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Resolving Carbon's Rainbow from Uplands to the Deep-sea Event Sponsor: Environmental Science Division Seminar Start Date: Sep 17 2015 - 11:00am BuildingRoom: Building 240Room...

    18. DOE Resolves Nearly All of its September 2010 Certification Enforcement Actions

      Broader source: Energy.gov [DOE]

      The Energy Department's new Office of Enforcement, part of the General Counsel's Office, announced today that it has now successfully resolved 26 of the 30 certification enforcement cases brought...

    19. High-harmonic XUV source for time- and angle-resolved photoemission...

      Office of Scientific and Technical Information (OSTI)

      We present a laser-based apparatus for visible pumpXUV probe time- and angle-resolved ... from insulators (UOsub 2) and ultrafast pumpprobe processes in semiconductors (GaAs). ...

    20. Resolving Cancer Heterogeneity by Single Cell Sequencing (7th Annual SFAF Meeting, 2012)

      ScienceCinema (OSTI)

      Xu, Xun [BGI

      2013-02-11

      Xun Xu on "Resolving Cancer Heterogeneity by Single Cell Sequencing" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

    1. Detection of spin-resolved electronic structures from a buried ferromagnetic layer utilizing forward Mott scattering

      SciTech Connect (OSTI)

      Ueda, S.; Mizuguchi, M.; Kojima, T.; Takanashi, K.; Ishimaru, S.; Tsujikawa, M.; Shirai, M.

      2014-03-31

      We report ultrahigh-resolution spin-resolved hard X-ray photoemission (HAXPES) for a buried FeNi alloy film. By utilizing the forward Mott scattering in a Au layer on FeNi, our spin-resolved HAXPES method does not require a standard spin detector and allows us to use the multi-channel electron detection system for the high-efficient electron detection as used in conventional photoemission spectroscopy. A combination of the forward Mott scattering and multi-channel detection leads us to measure a clear spin polarization as well as spin-resolved majority and minority states in the Fe 2p core-level spectra without using the standard spin detector. This method enables us to measure spin-resolved core-level spectra for buried ferromagnetic materials.

    2. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

      SciTech Connect (OSTI)

      Vogel, J.; O'Grady, M.; Renfrow, S.

      2015-09-03

      The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

    3. Direct Observation of Phase Transformations in Austenitic Stainless Steel Welds Using In-situ Spatially Resolved and Time-resolved X-ray Diffraction

      SciTech Connect (OSTI)

      Elmer, J.; Wong, J.; Ressler, T.

      1999-09-23

      Spatially resolved x-ray diffraction (SRXRD) and time resolved x-ray diffraction (TRXRD) were used to investigate real time solid state phase transformations and solidification in AISI type 304 stainless steel gas tungsten arc (GTA) welds. These experiments were conducted at Stanford Synchrotron Radiation Laboratory (SSRL) using a high flux beam line. Spatially resolved observations of {gamma} {leftrightarrow} {delta} solid state phase transformations were performed in the heat affected zone (HAZ) of moving welds and time-resolved observations of the solidification sequence were performed in the fusion zone (FZ) of stationary welds after the arc had been terminated. Results of the moving weld experiments showed that the kinetics of the {gamma}{yields}{delta} phase transformation on heating in the HAZ were sufficiently rapid to transform a narrow region surrounding the liquid weld pool to the {delta} ferrite phase. Results of the stationary weld experiments showed, for the first time, that solidification can occur directly to the {delta} ferrite phase, which persisted as a single phase for 0.5s. Upon solidification to {delta}, the {delta} {yields} {gamma} phase transformation followed and completed in 0.2s as the weld cooled further to room temperature.

    4. Time-resolved Spectroscopy of Laser-heated Copper Foils | Stanford

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Synchrotron Radiation Lightsource Time-resolved Spectroscopy of Laser-heated Copper Foils Tuesday, July 16, 2013 - 11:00am SLAC, Conference Room 137-322 Presented by Kelly Cone, PhD Engineering, Dept. of Applied Science, University of California, Davis The volumetric heating of a thin copper target has been studied with time resolved x-ray spectroscopy. The copper target was heated by a plasma produced using the Lawrence Livermore National Laboratory's Compact Multipulse Terawatt (COMET)

    5. Time-resolved carrier distributions in graphene (Conference) | SciTech

      Office of Scientific and Technical Information (OSTI)

      Connect Conference: Time-resolved carrier distributions in graphene Citation Details In-Document Search Title: Time-resolved carrier distributions in graphene Authors: Gilbertson, Steve Michael [1] ; Durakiewicz, Tomasz [1] ; Zhu, Jian - Xin [1] ; Mohite, Aditya D [1] ; Dattelbaum, Andrew M [1] ; Rodtiguez, George [1] ; Dakovski, Georgi [2] ; Dani, Keshav M [3] + Show Author Affiliations Los Alamos National Laboratory SLAC OKINAWA INSTITUTE OF SCIENCE AND TECHNOLOGY Publication Date:

    6. CORPES 11: International Workshop on Strong Correlations and Angle-Resolved

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Photoemission Spectroscopy CORPES 11: International Workshop on Strong Correlations and Angle-Resolved Photoemission Spectroscopy July 18-22, 2011 Lawrence Berkeley National Laboratory, California More information Attendees participated in a poster session Thursday on the ALS patio, engaging in conversations over lunch and at the posters. An international workshop entitled "Strong Correlations and Angle-Resolved Photoemission Spectroscopy", or CORPES11 , was held at Berkeley Lab

    7. Scientists Mix Matter and Anti-Matter Results to Resolve Decade-Old Proton

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Puzzle | Jefferson Lab Scientists Mix Matter and Anti-Matter Results to Resolve Decade-Old Proton Puzzle The CEBAF Large Acceptance Spectrometer, or CLAS, in Jefferson Lab's Experimental Hall B was used to measure electrons during the experiment. The CEBAF Large Acceptance Spectrometer, or CLAS, in Jefferson Lab's Experimental Hall B was used to measure electrons during the experiment. Scientists Mix Matter and Anti-Matter to Resolve Decade-Old Proton Puzzle Fans of science and science

    8. Unified Resolve 2014: A Proof of Concept for Radiological Support to

      Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

      Incident Commanders | Department of Energy Unified Resolve 2014: A Proof of Concept for Radiological Support to Incident Commanders Unified Resolve 2014: A Proof of Concept for Radiological Support to Incident Commanders Daniel Blumenthal*, U.S. Department of Energy ; John Crapo, Oak Ridge Institute for Science and Education; Gerard Vavrina, U.S. Department of Energy; Katharine McLellan McLellan, U.S. Department of Energy; Michael J. Gresalfi, Oak Ridge National Laboratory Abstract: In

    9. Vulnerability of Karangkates dams area by means of zero crossing analysis of data magnetic

      SciTech Connect (OSTI)

      Sunaryo, E-mail: sunaryo.geofis.ub@gmail.com; Susilo, Adi

      2015-04-24

      Study with entitled Vulnerability Karangkates Dam Area By Means of Zero Crossing Analysis of Data Magnetic has been done. The study was aimed to obtain information on the vulnerability of two parts area of Karangkates dams, i.e. Lahor dam which was inaugurated in 1977 and Sutami dam inaugurated in 1981. Three important things reasons for this study are: 1). The dam age was 36 years old for Lahor dam and 32 years old for Sutami dam, 2). Geologically, the location of the dams are closed together to the Pohgajih local shear fault, Selorejo local fault, and Selorejo limestone-andesite rocks contact plane, and 3). Karangkates dams is one of the important Hydro Power Plant PLTA with the generating power of about 400 million KWH per year from a total of about 29.373MW installed in Indonesia. Geographically, the magnetic data acquisition was conducted at coordinates (112.4149oE;-8.2028oS) to (112.4839oE;-8.0989oS) by using Proton Precession Magnetometer G-856. Magnetic Data acquisition was conducted in the radial direction from the dams with diameter of about 10 km and the distance between the measurements about 500m. The magnetic data acquisition obtained the distribution of total magnetic field value in the range of 45800 nT to 44450 nT. Residual anomalies obtained by doing some corrections, including diurnal correction, International Geomagnetic Reference Field (IGRF) correction, and reductions so carried out the distribution of the total magnetic field value in the range of -650 nT to 700 nT. Based on the residual anomalies, indicate the presence of 2 zones of closed closures dipole pairs at located in the west of the Sutami dam and the northwest of the Lahor dam from 5 total zones. Overlapping on the local geological map indicated the lineament of zero crossing patterns in the contour of residual anomaly contour with the Pohgajih shear fault where located at about 4 km to the west of the Sutami dam approximately and andesite-limestone rocks contact where located

    10. Groundwaters of Florence (Italy): Trace element distribution and vulnerability of the aquifers

      SciTech Connect (OSTI)

      Bencini, A.; Ercolanelli, R.; Sbaragli, A.

      1993-11-01

      Geochemical and hydrogeological research has been carried out in Florence, to evaluate conductivity and main chemistry of groundwaters, the pattern of some possible pollutant chemical species (Fe, Mn, Cr, Cu, Pb, Zn, NO{sub 2}, NO{sub 3}), and the vulnerability of the aquifers. The plain is made up of Plio-Quaternary alluvial and lacustrine sediments for a maximum thickness of 600 m. Silts and clays, sometimes with lenses of sandy gravels, are dominant, while considerable deposits of sands, pebbles, and gravels occur along the course of the Arno river and its tributary streams, and represent the most important aquifer of the plain. Most waters show conductivity values around 1000-1200 {mu}S, and almost all of them have an alkaline-earth-bicarbonate chemical character. In western areas higher salt content of the groundwaters is evident. Heavy metal and NO{sub 2}, NO{sub 3} analyses point out that no important pollution phenomena affect the groundwaters; all mean values are below the maximum admissible concentration (MAC) for drinkable waters. Some anomalies of NO{sub 2}, NO{sub 3}, Fe, Mn, and Zn are present. The most plausible causes can be recognized in losses of the sewage system; use of nitrate compounds in agriculture; oxidation of well pipes. All the observations of Cr, Cu, and Pb are below the MAC; the median values of <3, 3.9, and 1.1 {mu}g/l, respectively, could be considered reference concentrations for groundwaters in calcareous lithotypes, under undisturbed natural conditions. Finally, a map of vulnerability shows that the areas near the Arno river are highly vulnerable, for the minimum thickness (or lacking) of sediments covering the aquifer. On the other hand, in the case of pollution, several factors not considered could significantly increase the self-purification capacity of the aquifer, such asdilution of groundwaters, bacteria oxidation of nitrogenous species, and sorption capacity of clay minerals and organic matter. 31 refs., 6 figs., 5 tabs.

    11. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

      SciTech Connect (OSTI)

      McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

      2009-03-26

      Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

    12. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

      SciTech Connect (OSTI)

      Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

      2010-04-22

      NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

    13. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

      SciTech Connect (OSTI)

      Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

      2015-08-01

      The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

    14. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

      SciTech Connect (OSTI)

      Wilkey, D.D.

      1995-09-01

      This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

    15. Vulnerabilities and opportunities at the nexus of electricity, water and climate

      SciTech Connect (OSTI)

      Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

      2015-08-04

      The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

    16. Vulnerabilities and opportunities at the nexus of electricity, water and climate

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

      2015-08-04

      The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warmingmore » that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.« less

    17. Vibrationally resolved transitions in ion-molecule and atom-molecular ion slow collisions

      DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

      The data tables and interactive graphs made available here contain theoretical integral cross sections for vibrational excitation and vibrationally resolved charge transfer from vibrationally excited states of H2 and H2+ with protons and hydrogen atoms, respectively. [From http://www-cfadc.phy.ornl.gov/h2mol/home.html] (Specialized Interface)

    18. Enforcement actions: Significant actions resolved individual actions. Semiannual progress report, January 1996--June 1996

      SciTech Connect (OSTI)

      1996-08-01

      This document summarizes significant enforcement actions that have been resolved during the period of January-June 1996. The report includes copies of Orders and Notices of Violations sent by the Nuclear Regulatory Commission to individuals with respect to the enforcement actions.

    19. Direct Phase-resolved strain Measurements in Cementitious materials (Prop.2001-061)

      SciTech Connect (OSTI)

      Watkins, Thomas R; BIernacki, Joseph J.; Wang, R; Bai, J.; Lance, Michael J; Parnham, C. J.; Hubbard, Camden R; Mikel, Sean

      2007-01-01

      J. J. Biernacki, S. E. Mikel, C. J. Parnham, R. Wang, J. Bai, T. R. Watkins, M. Lance and C. R. Hubbard, "Direct Phase-Resolved Strain Measurements in Cementitious Materials," pp. 57-72 in Transport Properties and Concrete Quality: Materials Science of Concrete, Special Volume. Edited by B. Mobasher and J. P Skalny, ACerS, Westerville, OH, 2007.

    20. Time-resolved photoluminescence of ytterbium in indium phosphide. Master's thesis

      SciTech Connect (OSTI)

      Bumgarner, T.F.

      1988-12-01

      Time-resolved photoluminescence of ytterbium (Yb) implanted in indium phosphide (Inp) was the primary emphasis of this research. The decay lifetimes of the 1002-nm Yb emission were investigated as a function of temperature. Initial attempts were made to investigate as a function of temperature. Initial attempts were made to investigate aluminum gallium arsenide (AlGaAs) implanted with ytterbium.

    1. Applicability of existing C3 (command, control and communications) vulnerability and hardness analyses to sentry system issues. Technical report

      SciTech Connect (OSTI)

      Lee, R.C.

      1983-01-13

      This report is a compilation of abstracts resulting from a literature search of reports relevant to Sentry Ballistic missile system C3 vulnerability and hardness. Primary sources consulted were the DOD Nuclear Information Analysis Center (DASIAC) and the Defense Technical Information Center (DTIC). Approximately 175 reports were reviewed and abstracted, including several related to computer programs for estimating nuclear effects on electromagnetic propagation. The reports surveyed were ranked in terms of their importance for Sentry C3 VandH issues.

    2. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

      SciTech Connect (OSTI)

      Merkle, Peter Benedict

      2006-03-01

      Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

    3. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

      SciTech Connect (OSTI)

      Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

      2015-05-01

      This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge

    4. Method for enhancing the resolving power of ion mobility separations over a limited mobility range

      DOE Patents [OSTI]

      Shvartsburg, Alexandre A; Tang, Keqi; Smith, Richard D

      2014-09-23

      A method for raising the resolving power, specificity, and peak capacity of conventional ion mobility spectrometry is disclosed. Ions are separated in a dynamic electric field comprising an oscillatory field wave and opposing static field, or at least two counter propagating waves with different parameters (amplitude, profile, frequency, or speed). As the functional dependencies of mean drift velocity on the ion mobility in a wave and static field or in unequal waves differ, only single species is equilibrated while others drift in either direction and are mobility-separated. An ion mobility spectrum over a limited range is then acquired by measuring ion drift times through a fixed distance inside the gas-filled enclosure. The resolving power in the vicinity of equilibrium mobility substantially exceeds that for known traveling-wave or drift-tube IMS separations, with spectra over wider ranges obtainable by stitching multiple segments. The approach also enables low-cutoff, high-cutoff, and bandpass ion mobility filters.

    5. Developments in time-resolved high pressure x-ray diffraction using rapid compression and decompression

      SciTech Connect (OSTI)

      Smith, Jesse S.; Sinogeikin, Stanislav V.; Lin, Chuanlong; Rod, Eric; Bai, Ligang; Shen, Guoyin

      2015-07-15

      Complementary advances in high pressure research apparatus and techniques make it possible to carry out time-resolved high pressure research using what would customarily be considered static high pressure apparatus. This work specifically explores time-resolved high pressure x-ray diffraction with rapid compression and/or decompression of a sample in a diamond anvil cell. Key aspects of the synchrotron beamline and ancillary equipment are presented, including source considerations, rapid (de)compression apparatus, high frequency imaging detectors, and software suitable for processing large volumes of data. A number of examples are presented, including fast equation of state measurements, compression rate dependent synthesis of metastable states in silicon and germanium, and ultrahigh compression rates using a piezoelectric driven diamond anvil cell.

    6. Time and spectrum-resolving multiphoton correlator for 300900 nm

      SciTech Connect (OSTI)

      Johnsen, Kelsey D.; Thibault, Marilyne; Jennewein, Thomas; Kolenderski, Piotr; Scarcella, Carmelo; Tosi, Alberto

      2014-10-14

      We demonstrate a single-photon sensitive spectrometer in the visible range, which allows us to perform time-resolved and multi-photon spectral correlation measurements at room temperature. It is based on a monochromator composed of two gratings, collimation optics, and an array of single photon avalanche diodes. The time resolution can reach 110 ps and the spectral resolution is 2 nm/pixel, limited by the design of the monochromator. This technique can easily be combined with commercial monochromators and can be useful for joint spectrum measurements of two photons emitted in the process of parametric down conversion, as well as time-resolved spectrum measurements in optical coherence tomography or medical physics applications.

    7. Time-resolved far-infrared experiments at the National Synchrotron Light Source. Final report

      SciTech Connect (OSTI)

      Tanner, D.B.; Reitze, D.H.; Carr, G.L.

      1999-10-12

      A facility for time-resolved infrared and far-infrared spectroscopy has been built and commissioned at the National Synchrotron Light Source. This facility permits the study of time dependent phenomena over a frequency range from 2-8000cm{sup {minus}1} (0.25 meV-1 eV). Temporal resolution is approximately 200 psec and time dependent phenomena in the time range out to 100 nsec can be investigated.

    8. Resolved: "error while loading shared libraries: libalpslli.so.0" with

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      serial codes on login nodes "error while loading shared libraries: libalpslli.so.0" with serial codes on login nodes Resolved: "error while loading shared libraries: libalpslli.so.0" with serial codes on login nodes December 13, 2013 by Helen He Symptom: Dynamic executables built with compiler wrappers running directly on the external login nodes are getting the following error message: % ftn -dynamic -o testf testf.f % ./testf ./testf: error while loading shared

    9. Ferroelectricity - Ambiguity Clarified, and Resolved | U.S. DOE Office of

      Office of Science (SC) Website

      Science (SC) Ferroelectricity - Ambiguity Clarified, and Resolved Basic Energy Sciences (BES) BES Home About Research Facilities Science Highlights Benefits of BES Funding Opportunities Basic Energy Sciences Advisory Committee (BESAC) Community Resources Contact Information Basic Energy Sciences U.S. Department of Energy SC-22/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3081 F: (301) 903-6594 E: Email Us More Information » 12.14.15 Ferroelectricity -

    10. Serial time-resolved crystallography of photosystem II using a femtosecond

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      X-ray laser Serial time-resolved crystallography of photosystem II using a femtosecond X-ray laser Authors: Kupitz, Christopher; Basu, Shibom; Grotjohann, Ingo; Fromme, Raimund; Zatsepin, Nadia A.; Rendek, Kimberly N.; Hunter, Mark; Shoeman, Robert L.; White, Thomas A.; Wang, Dingjie; James, Daniel; Yang, Jay-How; Cobb, Danielle E.; Brenda, Reeder; Raymond, G. Sierra; Liu, Haiguang; Barty, Anton; Aquila, Andrew L.; Deponte, Daniel; Kirian, Richard A.; Bari, Sadia; Bergkamp, Jesse J.;

    11. DISPERSION ANALYSIS OF RADIATION/THERMAL FRONTS WITH FULL RESOLVED SPECTRAL OPACITY VARIATION.

      SciTech Connect (OSTI)

      L. AUER; R. LOWRIE

      2000-12-01

      The radiation transport and linearized thermal energy equations have been analyzed to find the temporal dependence of the component modes in a radiation/thermal front. The fully resolved spectral variation of the opacity as a function of energy, as well as the exact time and angular dependence, is treated in this work. As we are able to study arbitrarily complicated opacity spectra, we stress the importance of the new results as a check on the effect of using opacity averages.

    12. Direct Simulation of Fully Resolved Vaporizing Droplets in a Turbulent Flow

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      | Argonne Leadership Computing Facility Direct Simulation of Fully Resolved Vaporizing Droplets in a Turbulent Flow PI Name: Said Elghobashi PI Email: selghoba@uci.edu Institution: University of California, Irvine Allocation Program: INCITE Allocation Hours at ALCF: 20,000,000 Year: 2012 Research Domain: Engineering This project will enhance the understanding of liquid droplet vaporization and mixing processes in a turbulent flow. All liquid fuel combustion devices, mobile or stationary, use

    13. Enforcement actions: Significant actions resolved material licensees. Semiannual progress report, July--December 1996

      SciTech Connect (OSTI)

      1997-04-01

      This compilation summarizes significant enforcement actions that have been resolved during the period and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to material licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

    14. Enforcement actions: Significant actions resolved individuals actions. Semiannual progress report, July--December 1996

      SciTech Connect (OSTI)

      1997-04-01

      This compilation summarizes significant enforcement actions that have been resolved during the period (July - December 1996) and includes copies of Orders and Notices of Violation sent by the Nuclear Regulatory Commission to individuals with respect to-these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC. The Commission believes this information may be useful to licensees in making employment decisions.

    15. An instrument for the investigation of actinides with spin resolved photoelectron spectroscopy and bremsstrahlung isochromat spectroscopy

      SciTech Connect (OSTI)

      Yu, S.-W.; Tobin, J. G.; Chung, B. W.

      2011-01-01

      A new system for spin resolved photoelectron spectroscopy and bremsstrahlung isochromat spectroscopy has been built and commissioned at Lawrence Livermore National Laboratory for the investigation of the electronic structure of the actinides.Actinide materials are very toxic and radioactive and therefore cannot be brought to most general user facilities for spectroscopic studies. The technical details of the new system and preliminary data obtained therein will be presented and discussed.

    16. Application of Spatially Resolved High Resolution Crystal Spectrometry to ICF Plasmas

      Office of Scientific and Technical Information (OSTI)

      11 PPPL- 4811 Application of Spatially Resolved High Resolution Crystal Spectrometry to ICF Plasmas September, 2012 Kenneth W. Hill, M. Bitter, L. Delgado-Aprico, N.A. Pablant, P. Beiersdorfer, M. Schneider, K. Widmann, M. Sanchez del Rio and L. Zhang Princeton Plasma Physics Laboratory Report Disclaimers Full Legal Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any

    17. Enforcement actions: Significant actions resolved individual actions. Semiannual progress report, January 1997--June 1997

      SciTech Connect (OSTI)

      1997-09-01

      This compilation summarizes significant enforcement actions that have been resolved during the period (January - June 1997) and includes copies of Orders and Notices of Violation sent by the Nuclear Regulatory Commission to individuals with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC. The Commission believes this information may be useful to licensees in making employment decisions.

    18. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

      SciTech Connect (OSTI)

      Whitfield, R. G.; Buehring, W. A.; Bassett, G. W.

      2011-04-08

      Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be

    19. A POD reduced order model for resolving angular direction in neutron/photon transport problems

      SciTech Connect (OSTI)

      Buchan, A.G.; Calloo, A.A.; Goffin, M.G.; Dargaville, S.; Fang, F.; Pain, C.C.; Navon, I.M.

      2015-09-01

      This article presents the first Reduced Order Model (ROM) that efficiently resolves the angular dimension of the time independent, mono-energetic Boltzmann Transport Equation (BTE). It is based on Proper Orthogonal Decomposition (POD) and uses the method of snapshots to form optimal basis functions for resolving the direction of particle travel in neutron/photon transport problems. A unique element of this work is that the snapshots are formed from the vector of angular coefficients relating to a high resolution expansion of the BTE's angular dimension. In addition, the individual snapshots are not recorded through time, as in standard POD, but instead they are recorded through space. In essence this work swaps the roles of the dimensions space and time in standard POD methods, with angle and space respectively. It is shown here how the POD model can be formed from the POD basis functions in a highly efficient manner. The model is then applied to two radiation problems; one involving the transport of radiation through a shield and the other through an infinite array of pins. Both problems are selected for their complex angular flux solutions in order to provide an appropriate demonstration of the model's capabilities. It is shown that the POD model can resolve these fluxes efficiently and accurately. In comparison to high resolution models this POD model can reduce the size of a problem by up to two orders of magnitude without compromising accuracy. Solving times are also reduced by similar factors.

    20. Lipidic cubic phase injector is a viable crystal delivery system for time-resolved serial crystallography

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Nogly, Przemyslaw; Panneels, Valerie; Nelson, Garrett; Gati, Cornelius; Kimura, Tetsunari; Milne, Christopher; Milathianaki, Despina; Kubo, Minoru; Wu, Wenting; Conrad, Chelsie; et al

      2016-08-22

      Serial femtosecond crystallography (SFX) using X-ray free-electron laser sources is an emerging method with considerable potential for time-resolved pump-probe experiments. Here we present a lipidic cubic phase SFX structure of the light-driven proton pump bacteriorhodopsin (bR) to 2.3 Å resolution and a method to investigate protein dynamics with modest sample requirement. Time-resolved SFX (TR-SFX) with a pump-probe delay of 1 ms yields difference Fourier maps compatible with the dark to M state transition of bR. Importantly, the method is very sample efficient and reduces sample consumption to about 1 mg per collected time point. Accumulation of M intermediate within themore » crystal lattice is confirmed by time-resolved visible absorption spectroscopy. Furthermore, this study provides an important step towards characterizing the complete photocycle dynamics of retinal proteins and demonstrates the feasibility of a sample efficient viscous medium jet for TR-SFX.« less

    1. Measuring the x-ray resolving power of bent potassium acid phthalate diffraction crystals

      SciTech Connect (OSTI)

      Haugh, M. J. Jacoby, K. D.; Wu, M.; Loisel, G. P.

      2014-11-15

      This report presents the results from measuring the X-ray resolving power of a curved potassium acid phthalate (KAP(001)) spectrometer crystal using two independent methods. It is part of a continuing effort to measure the fundamental diffraction properties of bent crystals that are used to study various characteristics of high temperature plasmas. Bent crystals like KAP(001) do not usually have the same diffraction properties as corresponding flat crystals. Models that do exist to calculate the effect of bending the crystal on the diffraction properties have simplifying assumptions and their accuracy limits have not been adequately determined. The type of crystals that we measured is being used in a spectrometer on the Z machine at Sandia National Laboratories in Albuquerque, New Mexico. The first technique for measuring the crystal resolving power measures the X-ray spectral line width of the characteristic lines from several metal anodes. The second method uses a diode X-ray source and a double crystal diffractometer arrangement to measure the reflectivity curve of the KAP(001) crystal. The width of that curve is inversely proportional to the crystal resolving power. The measurement results are analyzed and discussed.

    2. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

      Broader source: Energy.gov [DOE]

      This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

    3. Direct asymmetry measurement of temperature and density spatial distributions in inertial confinement fusion plasmas from pinhole space-resolved spectra

      SciTech Connect (OSTI)

      Nagayama, T.; Mancini, R. C.; Florido, R.; Mayes, D.; Tommasini, R.; Koch, J. A.; Delettrez, J. A.; Regan, S. P.; Smalyuk, V. A.

      2014-05-15

      Two-dimensional space-resolved temperature and density images of an inertial confinement fusion (ICF) implosion core have been diagnosed for the first time. Argon-doped, direct-drive ICF experiments were performed at the Omega Laser Facility and a collection of two-dimensional space-resolved spectra were obtained from an array of gated, spectrally resolved pinhole images recorded by a multi-monochromatic x-ray imager. Detailed spectral analysis revealed asymmetries of the core not just in shape and size but in the temperature and density spatial distributions, thus characterizing the core with an unprecedented level of detail.

    4. A time-resolved spectroscopic diagnostic based on fast scintillator and optical fiber array for z-pinch plasmas

      SciTech Connect (OSTI)

      Ye Fan; Qin Yi; Jiang Shuqing; Xue Feibiao; Li Zhenghong; Yang Jianlun; Xu Rongkun; Anan'ev, S. S.; Dan'ko, S. A.; Kalinin, Yu. G.

      2009-10-15

      We report a specially designed type of temporal resolved x-ray spectroscopic diagnostic using a spherically bent quartz crystal for z-pinch plasmas. Registration of time-resolved spectra was accomplished by coupling fast plastic scintillator, an optical fiber array, an optical streak camera, and a charge coupled device as the recording medium of this diagnostic. The diagnostic has been tested in imploding wire array experiments on S-300 pulsed power facility. Time-resolved K-shell lines were successfully obtained for aluminum wire array implosion plasmas.

    5. Use of the HPI Model 2080 pulsed neutron detector at the LANSCE complex - vulnerabilities and counting statistics

      SciTech Connect (OSTI)

      Jones, K.W.; Browman, A.

      1997-01-01

      The BPI Model 2080 Pulsed Neutron Detector has been used for over seven years as an area radiation monitor and dose limiter at the LANSCE accelerator complex. Operating experience and changing environments over this time have revealed several vulnerabilities (susceptibility to electrical noise, paralysis in high dose rate fields, etc.). Identified vulnerabilities have been connected; these modifications include component replacement and circuit design changes. The data and experiments leading to these modifications will be presented and discussed. Calibration of the instrument is performed in mixed static gamma and neutron source fields. The statistical characteristics of the Geiger-Muller tubes coupled with significantly different sensitivity to gamma and neutron doses require that careful attention be paid to acceptable fluctuations in dose rate over time during calibration. The performance of the instrument has been modeled using simple Poisson statistics and the operating characteristics of the Geiger-Muller tubes. The results are in excellent agreement with measurements. The analysis and comparison with experimental data will be presented.

    6. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

      SciTech Connect (OSTI)

      Enos, David George; Goods, Steven Howard

      2006-11-01

      Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

    7. Spatially resolved spectra of the 'teacup' active galactic nucleus: tracing the history of a dying quasar

      SciTech Connect (OSTI)

      Gagne, J. P.; Crenshaw, D. M.; Fischer, T. C.; Kraemer, S. B.; Schmitt, H. R.; Keel, W. C.; Rafter, S.; Bennert, V. N.; Schawinski, K.

      2014-09-01

      The Sloan Digital Sky Survey (SDSS) Galaxy Zoo project has revealed a number of spectacular galaxies possessing extended emission-line regions (EELRs), the most famous being Hanny's Voorwerp galaxy. We present another EELR object discovered in the SDSS endeavor: the Teacup active galactic nucleus (AGN). Nicknamed for its EELR, which has a 'handle'-like structure protruding 15 kpc into the northeast quadrant of the galaxy. We analyze the physical conditions of this galaxy with long-slit, ground-based spectroscopy from the Lowell, Lick, and KPNO observatories. With the Lowell 1.8 m Perkin's telescope we took multiple observations at different offset positions, allowing us to recover spatially resolved spectra across the galaxy. Line diagnostics indicate the ionized gas is photoionized primarily by the AGN. Additionally we are able to derive the hydrogen density from the [S II] ?6716/?6731 ratio. We generated two-component photoionization models for each spatially resolved Lowell spectrum. These models allow us to calculate the AGN bolometric luminosity seen by the gas at different radii from the nuclear center of the Teacup. Our results show a drop in bolometric luminosity by more than two orders of magnitude from the EELR to the nucleus, suggesting that the AGN has decreased in luminosity by this amount in a continuous fashion over 46,000 yr, supporting the case for a dying AGN in this galaxy independent of any IR based evidence. We demonstrate that spatially resolved photoionization modeling could be applied to EELRs to investigate long timescale variability.

    8. Pixel Array Detector for Time-Resolved X-ray Science, September 1, 1997 - September 14, 2000

      SciTech Connect (OSTI)

      Gruner, Sol M.

      2000-11-07

      Progress on the design, fabrication, testing and assembly of two-layer Pixel Array Detectors (PADs) is described. The PADs are developed for challenging time-resolved X-ray imaging applications at synchrotron radiation X-ray sources.

    9. Enforcement actions: Significant actions resolved reactor licensees. Semiannual progress report, July 1996--December 1996

      SciTech Connect (OSTI)

      1997-04-01

      This compilation summarizes significant enforcement actions that have been resolved during the period (July-December 1996) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to reactor licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication.

    10. Time-resolved serial crystallography captures high-resolution intermediates of photoactive yellow protein

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Tenboer, Jason; Basu, Shibom; Zatsepin, Nadia; Pande, Kanupriya; Milathianaki, Despina; Frank, Matthias; Hunter, Mark; Boutet, Sebastien; Williams, Garth J.; Koglin, Jason E.; et al

      2014-12-05

      We report that serial femtosecond crystallography using ultrashort pulses from X-ray Free Electron Lasers (XFELs) offers the possibility to study light-triggered dynamics of biomolecules. Using microcrystals of the blue light photoreceptor, photoactive yellow protein, as a model system, we present high resolution, time-resolved difference electron density maps of excellent quality with strong features, which allow the determination of structures of reaction intermediates to 1.6 Å resolution. These results open the way to the study of reversible and non-reversible biological reactions on time scales as short as femtoseconds under conditions which maximize the extent of reaction initiation throughout the crystal.

    11. Workshop: Time Resolved X-Ray Science at High Repetition Rate | Stanford

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Synchrotron Radiation Lightsource Time Resolved X-Ray Science at High Repetition Rate Saturday, October 22, 2011 - 8:30am SSRL Conference Room 137-322 In conjunction with the 2011 LCLS/SSRL User Meeting, SSRL and the APS will jointly host a two-day workshop focused on opportunities with short-pulse, high-repetition rate X-ray Science. The workshop will feature international speakers and panel experts presenting the scientific basis, preliminary results and future potential of high rep-rate

    12. Nonlinear Raman Techniques in Femtosecond Time Resolved Spectroscopy for the Analysis and Control of Molecular Dynamics

      SciTech Connect (OSTI)

      Materny, Arnulf; Konradi, Jakow; Namboodiri, Vinu; Namboodiri, Mahesh; Scaria, Abraham

      2008-11-14

      The use of four-wave mixing techniques in femtosecond time-resolved spectroscopy has considerable advantages. Due to the many degrees of freedom offered e.g. by coherent anti-Stokes Raman scattering (CARS), the dynamics even of complex systems can be analyzed in detail. Using pulse shaping techniques in combination with a self-learning loop approach, molecular mode excitation can be controlled very efficiently in a multi-photon excitation process. Results obtained from the optimal control of CARS on {beta}-carotene are discussed.

    13. Time-resolved protein nanocrystallography using an X-ray free-electron

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      laser Time-resolved protein nanocrystallography using an X-ray free-electron laser Authors: Aquila, A., Hunter, M. S., Doak, R. B., Kirian, R. A., Fromme, P., White, T. A., Andreasson, J., Arnlund, D., Bajt, S. a., Barends, T. R. M., Barthelmess, M., Bogan, M. J., Bostedt, C., Bottin, H., Bozek, J. D., Caleman, C., Coppola, N., Davidsson, J., DePonte, D. P., Elser, V., Epp, S. W., Erk, B., Fleckenstein, H., Foucar, L., Frank, M., Fromme, R., Graafsma, H., Grotjohann, I., Gumprecht, L.,

    14. Evaluation of Long-Term Cloud-Resolving Modeling with ARM Data

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Evaluation of Long-Term Cloud-Resolving Modeling with ARM Data Zeng, Xiping NASA/GSFC Tao, Wei-Kuo NASA/Goddard Space Flight Center Zhang, Minghua State University of New York at Stony Brook Peters-Lidard, Christa Laboratory for Hydrospheric Processes, NASA-GSFC Lang, Stephen SSAI/NASA Goddard Space Flight Center Simpson, Joanne Laboratory for Atmospheres, NASA GSFC Kumar, Sujay University of Maryland, NASA-GSFC Xie, Shaocheng Lawrence Livermore National Laboratory Geiger, James NASA-GSFC Shie,

    15. Time Resolved Collapse of a Folding Protein Observed with Small Angle X-Ray Scattering

      SciTech Connect (OSTI)

      Pollack, L.; Tate, M. W.; Finnefrock, A. C.; Kalidas, C.; Trotter, S.; Darnton, N. C.; Lurio, L.; Austin, R. H.; Batt, C. A.; Gruner, S. M. (and others)

      2001-05-21

      High-intensity, ''pink'' beam from an undulator was used in conjunction with microfabricated rapid-fluid mixing devices to monitor the early events in protein folding with time resolved small angle x-ray scattering. This Letter describes recent work on the protein bovine {beta} -lactoglobulin where collapse from an expanded to a compact set of states was directly observed on the millisecond time scale. The role of chain collapse, one of the initial stages of protein folding, is not currently understood. The characterization of transient, compact states is vital in assessing the validity of theories and models of the folding process.

    16. Time-resolved energy transfer from single chloride-terminated nanocrystals to graphene

      SciTech Connect (OSTI)

      Ajayi, O. A. E-mail: cww2104@columbia.edu; Wong, C. W. E-mail: cww2104@columbia.edu; Anderson, N. C.; Wolcott, A.; Owen, J. S.; Cotlet, M.; Petrone, N.; Hone, J.; Gu, T.; Gesuele, F.

      2014-04-28

      We examine the time-resolved resonance energy transfer of excitons from single n-butyl amine-bound, chloride-terminated nanocrystals to two-dimensional graphene through time-correlated single photon counting. The radiative biexponential lifetime kinetics and blinking statistics of the individual surface-modified nanocrystal elucidate the non-radiative decay channels. Blinking modification as well as a 4 reduction in spontaneous emission were observed with the short chloride and n-butylamine ligands, probing the energy transfer pathways for the development of graphene-nanocrystal nanophotonic devices.

    17. Atomic motion of resonantly vibrating quartz crystal visualized by time-resolved X-ray diffraction

      SciTech Connect (OSTI)

      Aoyagi, Shinobu; Osawa, Hitoshi; Sugimoto, Kunihisa; Fujiwara, Akihiko

      2015-11-16

      Transient atomic displacements during a resonant thickness-shear vibration of AT-cut α-quartz are revealed by time-resolved X-ray diffraction under an alternating electric field. The lattice strain resonantly amplified by the alternating electric field is ∼10{sup 4} times larger than that induced by a static electric field. The resonantly amplified lattice strain is achieved by fast displacements of oxygen anions and collateral resilient deformation of Si−O−Si angles bridging rigid SiO{sub 4} tetrahedra, which efficiently transduce electric energy into elastic energy.

    18. Simple surface structure determination from Fourier transforms of angle-resolved photoemission extended fine structure

      SciTech Connect (OSTI)

      Zheng, Y. |; Shirley, D.A.

      1995-02-01

      The authors show by Fourier analyses of experimental data, with no further treatment, that the positions of all the strong peaks in Fourier transforms of angle-resolved photoemission extended fine structure (ARPEFS) from adsorbed surfaces can be explicitly predicted from a trial structure with an accuracy of about {+-} 0.3 {angstrom} based on a single-scattering cluster model together with the concept of a strong backscattering cone, and without any additional analysis. This characteristic of ARPEFS Fourier transforms can be developed as a simple method for determining the structures of adsorbed surfaces to an accuracy of about {+-} 0.1 {angstrom}.

    19. Identifying ferroelectric phase and domain structure using angle-resolved piezoresponse force microscopy

      SciTech Connect (OSTI)

      Kim, K. L.; Huber, J. E.

      2014-03-24

      We used angle-resolved piezoresponse force microscopy (AR-PFM), vertical PFM (VPFM), and electron backscatter diffraction (EBSD) to provide a systematic interpretation of domain patterns in polycrystalline, near-morphotropic lead zirconate titanate. This material was used to illustrate the power of AR-PFM methods in resolving complex domain patterns where multiple phases may be present. AR-PFM was carried out with a 30° rotation interval, and the resulting data were analysed to identify the orientation of the underlying axis of piezoelectricity. The additional information provided by AR-PFM was studied, comparing its capabilities to those of 3-dimensional PFM, consisting of one VPFM image and two orthogonal lateral PFM (LPFM) images. We show that, in certain conditions, using AR-PFM can identify the phases present at the sub-grain scale. This was confirmed using VPFM and EBSD data. Furthermore, the method can discriminate laminated domain patterns that appear similar in VPFM and can reliably expose domain patterns that may not be seen in LPFM data from a single orientation, or even in 3D PFM data.

    20. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

      SciTech Connect (OSTI)

      Grills, David C.; Farrington, Jaime A.; Layne, Bobby H.; Preses, Jack M.; Bernstein, Herbert J.; Wishart, James F.

      2015-04-27

      When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of a unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330-1051 cm⁻¹. The response time of the TRIR detection setup is ~40 ns, with a typical sensitivity of ~100 µOD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. As a result, this new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.

    1. Time-resolved photoemission apparatus achieving sub-20-meV energy resolution and high stability

      SciTech Connect (OSTI)

      Ishida, Y.; Togashi, T.; Yamamoto, K.; Tanaka, M.; Kiss, T.; Otsu, T.; Kobayashi, Y.; Shin, S.

      2014-12-15

      The paper describes a time- and angle-resolved photoemission apparatus consisting of a hemispherical analyzer and a pulsed laser source. We demonstrate 1.48-eV pump and 5.92-eV probe measurements at the ?10.5-meV and ?240-fs resolutions by use of fairly monochromatic 170-fs pulses delivered from a regeneratively amplified Ti:sapphire laser system operating typically at 250 kHz. The apparatus is capable to resolve the optically filled superconducting peak in the unoccupied states of a cuprate superconductor, Bi{sub 2}Sr{sub 2}CaCu{sub 2}O{sub 8+?}. A dataset recorded on Bi(111) surface is also presented. Technical descriptions include the followings: A simple procedure to fine-tune the spatio-temporal overlap of the pump-and-probe beams and their diameters; achieving a long-term stability of the system that enables a normalization-free dataset acquisition; changing the repetition rate by utilizing acoustic optical modulator and frequency-division circuit.

    2. Time-resolved particle velocity measurements at impact velocities of 10 km/s

      SciTech Connect (OSTI)

      Furnish, M.D.; Chhabildas, L.C.; Reinhart, W.D.

      1998-08-01

      Hypervelocity launch capabilities (9--16 km/s) with macroscopic plates have become available in recent years. It is now feasible to conduct instrumented plane-wave tests using this capability. Successfully conducting such tests requires a planar launch and impact at hypervelocities, appropriate triggering for recording systems, and time-resolved measurements of motion or stress at a particular point or set of points within the target or projectile during impact. The authors have conducted the first time-resolved wave-profile experiments using velocity interferometric techniques at impact velocities of 10 km/s. These measurements show that aluminum continues to exhibit normal release behavior to 161 GPa shock pressure, with complete loss of strength of the shocked state. These experiments have allowed a determination of shock-wave window transparency in conditions produced by a hypervelocity impact. In particular, lithium fluoride appears to lose transparency at a shock stress of 200 GPa; this appears to be the upper limit for conventional wave profile measurements using velocity interferometric techniques.

    3. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

      SciTech Connect (OSTI)

      Grills, David C. Farrington, Jaime A.; Layne, Bobby H.; Preses, Jack M.; Wishart, James F.; Bernstein, Herbert J.

      2015-04-15

      When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of a unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330 to 1051 cm{sup ?1}. The response time of the TRIR detection setup is ?40 ns, with a typical sensitivity of ?100 ?OD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. This new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.

    4. Time-Resolved In Situ Measurements During Rapid Alloy Solidification: Experimental Insight for Additive Manufacturing

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      McKeown, Joseph T.; Zweiacker, Kai; Liu, Can; Coughlin, Daniel R.; Clarke, Amy J.; Baldwin, J. Kevin; Gibbs, John W.; Roehling, John D.; Imhoff, Seth D.; Gibbs, Paul J.; et al

      2016-01-27

      In research and industrial environments, additive manufacturing (AM) of metals and alloys is becoming a pervasive technology, though significant challenges remain before widespread implementation of AM can be realized. In situ investigations of rapid alloy solidification with high spatial and temporal resolutions can provide unique experimental insight into microstructure evolution and kinetics that are relevant for AM processing. Hypoeutectic thin-film Al–Cu and Al–Si alloys were investigated using dynamic transmission electron microscopy to monitor pulsed-laser-induced rapid solidification across microsecond timescales. Solid–liquid interface velocities measured from time-resolved images revealed accelerating solidification fronts in both alloys. We observed microstructure evolution, solidification product, andmore » presence of a morphological instability at the solid–liquid interface in the Al–4 at.%Cu alloy are related to the measured interface velocities and small differences in composition that affect the thermophysical properties of the alloys. These time-resolved in situ measurements can inform and validate predictive modeling efforts for AM.« less

    5. A table-top femtosecond time-resolved soft x-ray transient absorption spectrometer

      SciTech Connect (OSTI)

      Leone, Stephen; Loh, Zhi-Heng; Khalil, Munira; Correa, Raoul E.; Leone, Stephen R.

      2008-05-21

      A laser-based, table-top instrument is constructed to perform femtosecond soft x-ray transient absorption spectroscopy. Ultrashort soft x-ray pulses produced via high-order harmonic generation of the amplified output of a femtosecond Ti:sapphire laser system are used to probe atomic core-level transient absorptions in atoms and molecules. The results provide chemically specific, time-resolved dynamics with sub-50-fs time resolution. In this setup, high-order harmonics generated in a Ne-filled capillary waveguide are refocused by a gold-coated toroidal mirror into the sample gas cell, where the soft x-ray light intersects with an optical pump pulse. The transmitted high-order harmonics are spectrally dispersed with a home-built soft x-ray spectrometer, which consists of a gold-coated toroidal mirror, a uniform-line spaced plane grating, and a soft x-ray CCD camera. The optical layout of the instrument, design of the soft x-ray spectrometer, and spatial and temporal characterization of the high-order harmonics are described. Examples of static and time-resolved photoabsorption spectra collected on this apparatus are presented.

    6. Femtosecond laser ablation dynamics of fused silica extracted from oscillation of time-resolved reflectivity

      SciTech Connect (OSTI)

      Kumada, Takayuki Akagi, Hiroshi; Itakura, Ryuji; Otobe, Tomohito; Yokoyama, Atsushi

      2014-03-14

      Femtosecond laser ablation dynamics of fused silica is examined via time-resolved reflectivity measurements. After optical breakdown was caused by irradiation of a pump pulse with fluence F{sub pump}?=?3.314.9?J/cm{sup 2}, the reflectivity oscillated with a period of 63??2 ps for a wavelength ??=?795?nm. The period was reduced by half for ??=?398?nm. We ascribe the oscillation to the interference between the probe pulses reflected from the front and rear surfaces of the photo-excited molten fused silica layer. The time-resolved reflectivity agrees closely with a model comprising a photo-excited layer which expands due to the formation of voids, and then separates into two parts, one of which is left on the sample surface and the other separated as a molten thin layer from the surface by the spallation mechanism. Such oscillations were not observed in the reflectivity of soda-lime glass. Whether the reflectivity oscillates or not probably depends on the layer viscosity while in a molten state. Since viscosity of the molten fused silica is several orders of magnitude higher than that of the soda-lime glass at the same temperature, fused silica forms a molten thin layer that reflects the probe pulse, whereas the soda-lime glass is fragmented into clusters.

    7. Millifluidics for time-resolved mapping of the growth of gold nanostructures

      SciTech Connect (OSTI)

      Sai Krishna, Katla; Navin, Chelliah; Biswas, Sanchita; Singh, Varshni; Ham, Kyungmin; Bovencamp, L. S.; Theegala, Chandra; Miller, Jeffrey T; Spivey, James J.; Kumar, Challa S.S.R.

      2013-04-10

      Innovative in situ characterization tools are essential for understanding the reaction mechanisms leading to the growth of nanoscale materials. Though techniques, such as in situ transmission X-ray microscopy, fast single-particle spectroscopy, small-angle X-ray scattering, etc., are currently being developed, these tools are complex, not easily accessible, and do not necessarily provide the temporal resolution required to follow the formation of nanomaterials in real time. Here, we demonstrate for the first time the utility of a simple millifluidic chip for an in situ real time analysis of morphology and dimension-controlled growth of gold nano- and microstructures with a time resolution of 5 ms. The structures formed were characterized using synchrotron radiation-based in situ X-ray absorption spectroscopy, 3-D X-ray tomography, and high-resolution electron microscopy. These gold nanostructures were found to be catalytically active for conversion of 4-nitrophenol into 4-aminophenol, providing an example of the potential opportunities for time-resolved analysis of catalytic reactions. While the investigations reported here are focused on gold nanostructures, the technique can be applied to analyze the time-resolved growth of other types of nanostructured metals and metal oxides. With the ability to probe at least a 10-fold higher concentrations, in comparison with traditional microfluidics, the tool has potential to revolutionize a broad range of fields from catalysis, molecular analysis, biodefense, and molecular biology.

    8. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

      SciTech Connect (OSTI)

      Grills, David C.; Farrington, Jaime A.; Layne, Bobby H.; Preses, Jack M.; Bernstein, Herbert J.; Wishart, James F.

      2015-04-27

      When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of a unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330-1051 cm?. The response time of the TRIR detection setup is ~40 ns, with a typical sensitivity of ~100 OD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. As a result, this new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.

    9. Development of nanosecond time-resolved infrared detection at the LEAF pulse radiolysis facility

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Grills, David C.; Farrington, Jaime A.; Layne, Bobby H.; Preses, Jack M.; Bernstein, Herbert J.; Wishart, James F.

      2015-04-27

      When coupled with transient absorption spectroscopy, pulse radiolysis, which utilizes high-energy electron pulses from an accelerator, is a powerful tool for investigating the kinetics and thermodynamics of a wide range of radiation-induced redox and electron transfer processes. The majority of these investigations detect transient species in the UV, visible, or near-IR spectral regions. Unfortunately, the often-broad and featureless absorption bands in these regions can make the definitive identification of intermediates difficult. Time-resolved vibrational spectroscopy would offer much improved structural characterization, but has received only limited application in pulse radiolysis. In this paper, we describe in detail the development of amore » unique nanosecond time-resolved infrared (TRIR) detection capability for condensed-phase pulse radiolysis on a new beam line at the LEAF facility of Brookhaven National Laboratory. The system makes use of a suite of high-power, continuous wave external-cavity quantum cascade lasers as the IR probe source, with coverage from 2330-1051 cm⁻¹. The response time of the TRIR detection setup is ~40 ns, with a typical sensitivity of ~100 µOD after 4-8 signal averages using a dual-beam probe/reference normalization detection scheme. As a result, this new detection method has enabled mechanistic investigations of a range of radiation-induced chemical processes, some of which are highlighted here.« less

    10. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

      SciTech Connect (OSTI)

      Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

      2015-01-01

      In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

    11. A tunable low-energy photon source for high-resolution angle-resolved photoemission spectroscopy

      SciTech Connect (OSTI)

      Harter, John W.; Monkman, Eric J.; Shai, Daniel E.; Nie Yuefeng; Uchida, Masaki; Burganov, Bulat; Chatterjee, Shouvik; King, Philip D. C.; Shen, Kyle M.

      2012-11-15

      We describe a tunable low-energy photon source consisting of a laser-driven xenon plasma lamp coupled to a Czerny-Turner monochromator. The combined tunability, brightness, and narrow spectral bandwidth make this light source useful in laboratory-based high-resolution photoemission spectroscopy experiments. The source supplies photons with energies up to {approx}7 eV, delivering under typical conditions >10{sup 12} ph/s within a 10 meV spectral bandwidth, which is comparable to helium plasma lamps and many synchrotron beamlines. We first describe the lamp and monochromator system and then characterize its output, with attention to those parameters which are of interest for photoemission experiments. Finally, we present angle-resolved photoemission spectroscopy data using the light source and compare its performance to a conventional helium plasma lamp.

    12. First-Order Reversal Curve Probing of Spatially Resolved Polarization Dynamics in Ferroelectric Nanocapacitors

      SciTech Connect (OSTI)

      Kim, Yunseok; Kumar, Amit; Jesse, Stephen; Kalinin, Sergei V

      2011-01-01

      Spatially resolved polarization switching in ferroelectric nanocapacitors was studied on the sub-25 nm scale using the first-order reversal curve (FORC) method. The chosen capacitor geometry allows both a high-veracity observation of the ferroelastic domain structure and the mapping of polarization switching in a uniform field, synergistically combining microstructural observations and probing of uniform-field polarization responses as relevant to device operation. A classical Kolmogorov-Avrami-Ishibashi model has been adapted to the voltage domain and the individual switching dynamics of the FORC response curves are well approximated by the adapted model. The comparison with microstructures suggests a strong spatial variability of the switching dynamics inside the nanocapacitors.

    13. MONSTIR II: A 32-channel, multispectral, time-resolved optical tomography system for neonatal brain imaging

      SciTech Connect (OSTI)

      Cooper, Robert J. Magee, Elliott; Everdell, Nick; Magazov, Salavat; Varela, Marta; Airantzis, Dimitrios; Gibson, Adam P.; Hebden, Jeremy C.

      2014-05-15

      We detail the design, construction and performance of the second generation UCL time-resolved optical tomography system, known as MONSTIR II. Intended primarily for the study of the newborn brain, the system employs 32 source fibres that sequentially transmit picosecond pulses of light at any four wavelengths between 650 and 900 nm. The 32 detector channels each contain an independent photo-multiplier tube and temporally correlated photon-counting electronics that allow the photon transit time between each source and each detector position to be measured with high temporal resolution. The system's response time, temporal stability, cross-talk, and spectral characteristics are reported. The efficacy of MONSTIR II is demonstrated by performing multi-spectral imaging of a simple phantom.

    14. Electronic transport characterization of silicon wafers by spatially resolved steady-state photocarrier radiometric imaging

      SciTech Connect (OSTI)

      Wang, Qian; Li, Bincheng

      2015-09-28

      Spatially resolved steady-state photocarrier radiometric (PCR) imaging technique is developed to characterize the electronic transport properties of silicon wafers. Based on a nonlinear PCR theory, simulations are performed to investigate the effects of electronic transport parameters (the carrier lifetime, the carrier diffusion coefficient, and the front surface recombination velocity) on the steady-state PCR intensity profiles. The electronic transport parameters of an n-type silicon wafer are simultaneously determined by fitting the measured steady-state PCR intensity profiles to the three-dimensional nonlinear PCR model. The determined transport parameters are in good agreement with the results obtained by the conventional modulated PCR technique with multiple pump beam radii.

    15. A strategy for resolving high-priority Hanford Site radioactive waste storage tank safety issues

      SciTech Connect (OSTI)

      Babad, H.; DeFigh-Price, C.; Fulton, J.C.

      1993-02-01

      High-activity radioactive waste has been stored in large underground storage tanks at the US Department of Energy`s (DOE) Hanford Site in Eastern Washington State since 1944. Since then, more than 227,000 m{sup 3} (60 Mgal) of waste have been accumulated in 177 tanks. These caustic wastes consist of many different chemicals. The waste forms include liquids, slurries, salt cakes, and sludges. A number of safety issues have been raised about these wastes, and resolution of these issues is a top priority of DOE. A Waste Tank Safety Program has been established to resolve these high-priority safety issues. This paper will deal with three of these issues. The issues described are the release of flammable vapors from single- and double-shell tanks, the existence of organic chemicals, and/or ferrocyanide ion-containing fuel-rich mixtures of nitrate and nitrite salts in single-shell tanks.

    16. Substrate interactions with suspended and supported monolayer MoS2: Angle-resolved photoemission spectroscopy

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Jin, Wencan; Yeh, Po -Chun; Zaki, Nader; Zhang, Datong; Liou, Jonathan T.; Dadap, Jerry I.; Barinov, Alexey; Yablonskikh, Mikhail; Sadowski, Jerzy T.; Sutter, Peter; et al

      2015-03-17

      We report the directly measured electronic structure of exfoliated monolayer molybdenum disulfide (MoS₂) using micrometer-scale angle-resolved photoemission spectroscopy. Measurements of both suspended and supported monolayer MoS₂ elucidate the effects of interaction with a substrate. Thus, a suggested relaxation of the in-plane lattice constant is found for both suspended and supported monolayer MoS₂ crystals. For suspended MoS₂, a careful investigation of the measured uppermost valence band gives an effective mass at Γ¯ and Κ¯ of 2.00m₀ and 0.43m₀, respectively. We also measure an increase in the band linewidth from the midpoint of Γ¯Κ¯ to the vicinity of Κ¯ and briefly discussmore » its possible origin.« less

    17. Time resolved photo-luminescent decay characterization of mercury cadmium telluride focal plane arrays

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Soehnel, Grant

      2015-01-20

      The minority carrier lifetime is a measurable material property that is an indication of infrared detector device performance. To study the utility of measuring the carrier lifetime, an experiment has been constructed that can time resolve the photo-luminescent decay of a detector or wafer sample housed inside a liquid nitrogen cooled Dewar. Motorized stages allow the measurement to be scanned over the sample surface, and spatial resolutions as low as 50µm have been demonstrated. A carrier recombination simulation was developed to analyze the experimental data. Results from measurements performed on 4 mercury cadmium telluride focal plane arrays show strong correlationmore » between spatial maps of the lifetime, dark current, and relative response.« less

    18. Time-resolved observation of thermally activated rupture of a capillary-condensed water nanobridge

      SciTech Connect (OSTI)

      Bak, Wan; Sung, Baekman; Kim, Jongwoo; Kwon, Soyoung; Kim, Bongsu; Jhe, Wonho

      2015-01-05

      The capillary-condensed liquid bridge is one of the most ubiquitous forms of liquid in nature and contributes significantly to adhesion and friction of biological molecules as well as microscopic objects. Despite its important role in nanoscience and technology, the rupture process of the bridge is not well understood and needs more experimental works. Here, we report real-time observation of rupture of a capillary-condensed water nanobridge in ambient condition. During slow and stepwise stretch of the nanobridge, we measured the activation time for rupture, or the latency time required for the bridge breakup. By statistical analysis of the time-resolved distribution of activation time, we show that rupture is a thermally activated stochastic process and follows the Poisson statistics. In particular, from the Arrhenius law that the rupture rate satisfies, we estimate the position-dependent activation energies for the capillary-bridge rupture.

    19. Introduction to the theory and analysis of resolved (and unresolved) neutron resonances via SAMMY

      SciTech Connect (OSTI)

      Larson, N.M.

      1998-02-01

      Neutron cross-section data are important for two distinct purposes: First, they provide insight into the nature of matter, thus assisting in the understanding of fundamental physics. Second, they are needed for practical applications (e.g., for calculating when and how a reactor will become critical, or how much shielding is needed for storage of nuclear materials, and for medical applications). Neutron cross section data in the resolved-resonance region are generally obtained by time-of-flight experiments, which must be carefully analyzed if they are to be properly understood and utilized. In this paper, important features of the analysis process are discussed, with emphasis on the particular techniques used in the analysis code SAMMY. Other features of the code are also described; these include such topics as calculation of group cross sections (including covariance matrices), generation and fitting of integral quantities, and extensions into the unresolved-resonance region and higher energy regions.

    20. Introduction to the Theory and Analysis of Resolved (and Unresolved) Neutron Resonances via SAMMY

      SciTech Connect (OSTI)

      Larson, N.

      2000-03-13

      Neutron cross-section data are important for two purposes: First, they provide insight into the nature of matter, increasing our understanding of fundamental physics. Second, they are needed for practical applications (e.g., for calculating when and how a reactor will become critical, or how much shielding is needed for storage of nuclear materials, or for medical applications). Neutron cross section data in the resolved-resonance region are generally obtained by time-of-flight experiments, which must be carefully analyzed if they are to be properly understood and utilized. In this report, important features of the analysis process are discussed, with emphasis on the particular techniques used in the analysis code SAMMY. Other features of the code are also described; these include such topics as calculation of group cross sections (including covariance matrices), generation and fitting of integral quantities, and extensions into the unresolved-resonance region and higher-energy regions.

    1. Introduction to theory and analysis of resolved (and unresolved) neutron resonances via SAMMY

      SciTech Connect (OSTI)

      Larson, N.M.

      1998-07-01

      Neutron cross-section data are important for two distinct purposes: first, they provide insight into the nature of matter, thus assisting in the understanding of fundamental physics; second, they are needed for practical applications (e.g., for calculating when and how a reactor will become critical, or how much shielding is needed for storage of nuclear materials, and for medical applications). Neutron cross section data in the resolved-resonance region are generally obtained by time-of-flight experiments, which must be carefully analyzed if they are to be properly understood and utilized. In this paper, important features of the analysis process are discussed, with emphasis on the particular technique used in the analysis code SAMMY. Other features of the code are also described; these include such topics as calculation of group cross sections (including covariance matrices), generation and fitting of integral quantities, and extensions into the unresolved-resonance region and higher-energy regions.

    2. Seismic imaging of reservoir flow properties: Resolving waterinflux and reservoir permeability

      SciTech Connect (OSTI)

      Vasco, D.W.; Keers, Henk

      2006-11-27

      Methods for geophysical model assessment, in particuale thecomputation of model parameter resolution, indicate the value and thelimitations of time-lapse data in estimating reservoir flow properties. Atrajectory-based method for computing sensitivities provides an effectivemeans to compute model parameter resolutions. We examine the commonsituation in which water encroaches into a resrvoir from below, as due tothe upward movement of an oil-water contact. Using straight-forwardtechniques we find that, by inclusing reflections off the top and bottomof a reservoir tens of meters thick, we can infer reservoir permeabilitybased upon time-lapse data. We find that, for the caseof water influxfrom below, using multiple time-lapse 'snapshots' does not necessarilyimprove the resolution of reservoir permeability. An application totime-lapse data from the Norne field illustrates that we can resolve thepermeability near a producing well using reflections from threeinterfaces associated with the reservoir.

    3. Spatially and Temporally Resolved Studies of the Human Microbiome (2011 JGI User Meeting)

      SciTech Connect (OSTI)

      Knight, Rob [University of Colorado] [University of Colorado

      2011-03-23

      The U.S. Department of Energy Joint Genome Institute (JGI) invited scientists interested in the application of genomics to bioenergy and environmental issues, as well as all current and prospective users and collaborators, to attend the annual DOE JGI Genomics of Energy & Environment Meeting held March 22-24, 2011 in Walnut Creek, Calif. The emphasis of this meeting was on the genomics of renewable energy strategies, carbon cycling, environmental gene discovery, and engineering of fuel-producing organisms. The meeting features presentations by leading scientists advancing these topics. Rob Knight of the University of Colorado gives a presentation on "Spatially and Temporally Resolved Studies of the Human Microbiome" at the 6th annual Genomics of Energy & Environment Meeting on March 23, 2011

    4. High-Definition Differential Ion Mobility Spectrometry with Resolving Power up to 500

      SciTech Connect (OSTI)

      Shvartsburg, Alexandre A.; Seim, Thomas A.; Danielson, William F.; Norheim, Randolph V.; Moore, Ronald J.; Anderson, Gordon A.; Smith, Richard D.

      2013-01-20

      As the resolution of analytical methods improve, further progress tends to be increasingly limited by instrumental parameter instabilities that could be ignored before. This is now the case with differential ion mobility spectrometry (FAIMS), where fluctuations of the voltages and gas pressure have become critical. A new high-definition generator for FAIMS compensation voltage reported here provides a stable and accurate output than can be scanned with negligible steps. This reduces the spectral drift and peak width, thus improving the resolving power (R) and resolution. The gain for multiply-charged peptides that have narrowest peaks is up to ~40%, and R ~ 400 - 500 is achievable using He/N2 or H2/N2 gas mixtures.

    5. Spatially and Temporally Resolved Studies of the Human Microbiome (2011 JGI User Meeting)

      ScienceCinema (OSTI)

      Knight, Rob [University of Colorado

      2011-06-03

      The U.S. Department of Energy Joint Genome Institute (JGI) invited scientists interested in the application of genomics to bioenergy and environmental issues, as well as all current and prospective users and collaborators, to attend the annual DOE JGI Genomics of Energy & Environment Meeting held March 22-24, 2011 in Walnut Creek, Calif. The emphasis of this meeting was on the genomics of renewable energy strategies, carbon cycling, environmental gene discovery, and engineering of fuel-producing organisms. The meeting features presentations by leading scientists advancing these topics. Rob Knight of the University of Colorado gives a presentation on "Spatially and Temporally Resolved Studies of the Human Microbiome" at the 6th annual Genomics of Energy & Environment Meeting on March 23, 2011

    6. Resolving the biophysics of axon transmembrane polarization in a single closed-form description

      SciTech Connect (OSTI)

      Melendy, Robert F.

      2015-12-28

      When a depolarizing event occurs across a cell membrane there is a remarkable change in its electrical properties. A complete depolarization event produces a considerably rapid increase in voltage that propagates longitudinally along the axon and is accompanied by changes in axial conductance. A dynamically changing magnetic field is associated with the passage of the action potential down the axon. Over 75 years of research has gone into the quantification of this phenomenon. To date, no unified model exist that resolves transmembrane polarization in a closed-form description. Here, a simple but formative description of propagated signaling phenomena in the membrane of an axon is presented in closed-form. The focus is on using both biophysics and mathematical methods for elucidating the fundamental mechanisms governing transmembrane polarization. The results presented demonstrate how to resolve electromagnetic and thermodynamic factors that govern transmembrane potential. Computational results are supported by well-established quantitative descriptions of propagated signaling phenomena in the membrane of an axon. The findings demonstrate how intracellular conductance, the thermodynamics of magnetization, and current modulation function together in generating an action potential in a unified closed-form description. The work presented in this paper provides compelling evidence that three basic factors contribute to the propagated signaling in the membrane of an axon. It is anticipated this work will compel those in biophysics, physical biology, and in the computational neurosciences to probe deeper into the classical and quantum features of membrane magnetization and signaling. It is hoped that subsequent investigations of this sort will be advanced by the computational features of this model without having to resort to numerical methods of analysis.

    7. Design and evaluation of a device for fast multispectral time-resolved fluorescence spectroscopy and imaging

      SciTech Connect (OSTI)

      Yankelevich, Diego R.; Department of Biomedical Engineering, University of California, 451 Health Sciences Drive, Davis, California 95616 ; Ma, Dinglong; Liu, Jing; Sun, Yang; Sun, Yinghua; Bec, Julien; Marcu, Laura; Elson, Daniel S.

      2014-03-15

      The application of time-resolved fluorescence spectroscopy (TRFS) to in vivo tissue diagnosis requires a method for fast acquisition of fluorescence decay profiles in multiple spectral bands. This study focusses on development of a clinically compatible fiber-optic based multispectral TRFS (ms-TRFS) system together with validation of its accuracy and precision for fluorescence lifetime measurements. It also presents the expansion of this technique into an imaging spectroscopy method. A tandem array of dichroic beamsplitters and filters was used to record TRFS decay profiles at four distinct spectral bands where biological tissue typically presents fluorescence emission maxima, namely, 390, 452, 542, and 629 nm. Each emission channel was temporally separated by using transmission delays through 200 μm diameter multimode optical fibers of 1, 10, 19, and 28 m lengths. A Laguerre-expansion deconvolution algorithm was used to compensate for modal dispersion inherent to large diameter optical fibers and the finite bandwidth of detectors and digitizers. The system was found to be highly efficient and fast requiring a few nano-Joule of laser pulse energy and <1 ms per point measurement, respectively, for the detection of tissue autofluorescent components. Organic and biological chromophores with lifetimes that spanned a 0.8–7 ns range were used for system validation, and the measured lifetimes from the organic fluorophores deviated by less than 10% from values reported in the literature. Multi-spectral lifetime images of organic dye solutions contained in glass capillary tubes were recorded by raster scanning the single fiber probe in a 2D plane to validate the system as an imaging tool. The lifetime measurement variability was measured indicating that the system provides reproducible results with a standard deviation smaller than 50 ps. The ms-TRFS is a compact apparatus that makes possible the fast, accurate, and precise multispectral time-resolved fluorescence

    8. Polychromatic x-ray micro- and nanodiffraction for spatially-resolved structural studies.

      SciTech Connect (OSTI)

      Budai, J. D.; Liu, W.; Tischler, J. Z.; Pan, Z. W.; Larson, B. C.; Yang, W.; Norton, D. P.; Ice, G. E.; ORNL; Univ. of Georgia; Univ.of Florida; Carnegie Inst. of Washington

      2008-01-01

      The availability of intense, focused synchrotron X-ray microbeams has enabled new techniques for materials investigations with sub-micron spatial resolution. The scanning microbeam setup we have developed at the XOR-UNI beamline at the Advanced Photon Source (APS) is versatile in that it provides 1D, 2D or 3D scans (including depth resolution), and can alternate between polychromatic- and monochromatic-beam modes. Focusing in both modes uses elliptical Kirkpatrick-Baez (K-B) reflecting mirrors. Beam diameters of {approx} 500 nm FWHM are now routine, and 90 nm focus has been demonstrated. In white-beam mode, a CCD detector records a complete Laue diffraction pattern, which is analyzed with an automated indexing program. These X-ray diffraction patterns provide real-space maps of the local lattice structure, crystal orientation, grain morphology, and strain tensor. Spatially-resolved X-ray microdiffraction studies are now providing previously unavailable measurements of local microstructures. These measurements, in turn, yield new insights in several classic fields of materials science. This paper will illustrate the application of polychromatic scanning X-ray microscopy with examples from 1D, 2D and 3D materials systems. In 1D systems, we have mapped the structure and orientation of an individual ZnO nanorod along with the associated Ge catalyst particle used to control the nanocrystal growth. In 2D systems, X-ray microdiffraction studies have revealed the mechanisms for local crystallographic tilting in epitaxial oxide films grown on textured Ni substrates for superconducting applications. In 3D systems, X-ray microscopy investigations have included in-situ studies of microstructural evolution during thermal grain growth in polycrystalline aluminum. In general, these spatially-resolved measurements provide important new insights and are valuable as input for theoretical and computer modeling studies of a wide range of material processes.

    9. Polychromatic X-ray Micro- and Nanodiffraction for Spatially-Resolved Structural Studies

      SciTech Connect (OSTI)

      Budai, John D; Liu, W.; Tischler, Jonathan Zachary; Pan, Zhengwei; Norton, David P.; Larson, Ben C; Yang, Wenge; Ice, Gene E

      2008-01-01

      The availability of intense, focused synchrotron X-ray microbeams has enabled new techniques for materials investigations with sub-micron spatial resolution. The scanning microbeam setup we have developed at the XOR-UNI beamline at the Advanced Photon Source (APS) is versatile in that it provides 1D, 2D or 3D scans (including depth resolution), and can alternate between polychromatic- and monochromatic-beam modes. Focusing in both modes uses elliptical Kirkpatrick-Baez (K-B) reflecting mirrors. Beam diameters of {approx} 500 nm FWHM are now routine, and 90 nm focus has been demonstrated. In white-beam mode, a CCD detector records a complete Laue diffraction pattern, which is analyzed with an automated indexing program. These X-ray diffraction patterns provide real-space maps of the local lattice structure, crystal orientation, grain morphology, and strain tensor. Spatially-resolved X-ray microdiffraction studies are now providing previously unavailable measurements of local microstructures. These measurements, in turn, yield new insights in several classic fields of materials science. This paper will illustrate the application of polychromatic scanning X-ray microscopy with examples from 1D, 2D and 3D materials systems. In 1D systems, we have mapped the structure and orientation of an individual ZnO nanorod along with the associated Ge catalyst particle used to control the nanocrystal growth. In 2D systems, X-ray microdiffraction studies have revealed the mechanisms for local crystallographic tilting in epitaxial oxide films grown on textured Ni substrates for superconducting applications. In 3D systems, X-ray microscopy investigations have included in-situ studies of microstructural evolution during thermal grain growth in polycrystalline aluminum. In general, these spatially-resolved measurements provide important new insights and are valuable as input for theoretical and computer modeling studies of a wide range of material processes.

    10. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

      Broader source: Energy.gov [DOE]

      BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

    11. U-190: Microsoft Security Bulletin MS12-037- Critical

      Broader source: Energy.gov [DOE]

      This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer.

    12. A monitoring campaign for Luhman 16AB. I. Detection of resolved near-infrared spectroscopic variability

      SciTech Connect (OSTI)

      Burgasser, Adam J.; Gillon, Michal; Jehin, E.; Delrez, L.; Opitom, C.; Faherty, Jacqueline K.; Radigan, Jacqueline; Triaud, Amaury H. M. J.; Plavchan, Peter

      2014-04-10

      We report resolved near-infrared spectroscopic monitoring of the nearby L dwarf/T dwarf binary WISE J104915.57531906.1AB (Luhman 16AB), as part of a broader campaign to characterize the spectral energy distribution and temporal variability of this system. A continuous 45 minute sequence of low-resolution IRTF/SpeX data spanning 0.8-2.4 ?m were obtained, concurrent with combined-light optical photometry with ESO/TRAPPIST. Our spectral observations confirm the flux reversal of this binary, and we detect a wavelength-dependent decline in the relative spectral fluxes of the two components coincident with a decline in the combined-light optical brightness of the system over the course of the observation. These data are successfully modeled as a combination of achromatic (brightness) and chromatic (color) variability in the T0.5 Luhman 16B, consistent with variations in overall cloud opacity; and no significant variability was found in L7.5 Luhman 16A, consistent with recent resolved photometric monitoring. We estimate a peak-to-peak amplitude of 13.5% at 1.25 ?m over the full light curve. Using a simple two-spot brightness temperature model for Luhman 16B, we infer an average cold covering fraction of ?30%-55%, varying by 15%-30% over a rotation period assuming a ?200-400 K difference between hot and cold regions. We interpret these variations as changes in the covering fraction of a high cloud deck and corresponding 'holes' which expose deeper, hotter cloud layers, although other physical interpretations are possible. A Rhines scale interpretation for the size of the variable features explains an apparent correlation between period and amplitude for Luhman 16B and the variable T dwarfs SIMP 0136+0933 and 2MASS J2139+0220, and predicts relatively fast winds (1-3 km s{sup 1}) for Luhman 16B consistent with light curve evolution on an advective time scale (1-3 rotation periods). The strong variability observed in this flux reversal brown dwarf pair supports the model of

    13. Phase-resolved nanosecond spectrofluorometry: theory, instrumentation, and new applications of multicomponent analysis by subnanosecond fluorescence lifetimes

      SciTech Connect (OSTI)

      Mattheis, J.R.; Mitchell, G.W.; Spencer, R.D.

      1982-03-01

      We describe a new method, phase-resolved subnanosecond spectroscopy (PRS), for the spectral differentiation of fluorophores in a mixture. The technique required adding a phase-variable rectifying detector to the SLM 4800S phasespectrofluorometer. The theory of PRS is based on the sinusoidal fluorescence emission of a population of molecules in response to sinusodially modulated exicitation light. The total a-c fluorescence signal is passed through the phase-variable detector which nulls the emission signal of any component in quadrature with the reference angle. The emission characteristics of the remaining component, or components, are more readily and accurately revealed. We investigated the sensitivity and selectivity of PRS. The sensitivity of PRS was demonstrated by nulling the contribution of the Raman scatter band of a nanomolar solution of quinine bisulfate to the real-time emission spectrum resolved at 8-nm bandpass. We demonstrated the selectivity of PRS by resolving the emission spectrum of anthracene and perylene from a 1 : 1 mixture with a lifetime differential of only 600 ps. The emission spectra of 2.2-phenylene bis-(5-phenyloxazole) and dimethyl 2.2-phenylene bis-(5-phenyloxazole) were also resolved from a 1 : 1 mixture in ethanol. The lifetime differential here was only 200 ps.

    14. A split imaging spectrometer for temporally and spatially resolved titanium absorption spectroscopy

      SciTech Connect (OSTI)

      Hager, J. D. Lanier, N. E.; Kline, J. L.; Flippo, K. A.; Bruns, H. C.; Schneider, M.; Saculla, M.; McCarville, T.

      2014-11-15

      We present a temporally and a spatially resolved spectrometer for titanium x-ray absorption spectroscopy along 2 axial symmetric lines-of-sight. Each line-of-sight of the instrument uses an elliptical crystal to acquire both the 2p and 3p Ti absorption lines on a single, time gated channel of the instrument. The 2 axial symmetric lines-of-sight allow the 2p and 3p absorption features to be measured through the same point in space using both channels of the instrument. The spatially dependent material temperature can be inferred by observing the 2p and the 3p Ti absorption features. The data are recorded on a two strip framing camera with each strip collecting data from a single line-of-sight. The design is compatible for use at both the OMEGA laser and the National Ignition Facility. The spectrometer is intended to measure the material temperature behind a Marshak wave in a radiatively driven SiO{sub 2} foam with a Ti foam tracer. In this configuration, a broad band CsI backlighter will be used for a source and the Ti absorption spectrum measured.

    15. FULLY RESOLVED QUIET-SUN MAGNETIC FLUX TUBE OBSERVED WITH THE SUNRISE/IMAX INSTRUMENT

      SciTech Connect (OSTI)

      Lagg, A.; Solanki, S. K.; Riethmueller, T. L.; Schuessler, M.; Hirzberger, J.; Feller, A.; Borrero, J. M.; Barthol, P.; Gandorfer, A.; MartInez Pillet, V.; Bonet, J. A.; Del Toro Iniesta, J. C.; Domingo, V.; Knoelker, M.; Title, A. M.

      2010-11-10

      Until today, the small size of magnetic elements in quiet-Sun areas has required the application of indirect methods, such as the line-ratio technique or multi-component inversions, to infer their physical properties. A consistent match to the observed Stokes profiles could only be obtained by introducing a magnetic filling factor that specifies the fraction of the observed pixel filled with magnetic field. Here, we investigate the properties of a small magnetic patch in the quiet Sun observed with the IMaX magnetograph on board the balloon-borne telescope SUNRISE with unprecedented spatial resolution and low instrumental stray light. We apply an inversion technique based on the numerical solution of the radiative transfer equation to retrieve the temperature stratification and the field strength in the magnetic patch. The observations can be well reproduced with a one-component, fully magnetized atmosphere with a field strength exceeding 1 kG and a significantly enhanced temperature in the mid to upper photosphere with respect to its surroundings, consistent with semi-empirical flux tube models for plage regions. We therefore conclude that, within the framework of a simple atmospheric model, the IMaX measurements resolve the observed quiet-Sun flux tube.

    16. Fixed target matrix for femtosecond time-resolved and in situ serial micro-crystallography

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Mueller, C.; Marx, A.; Epp, S. W.; Zhong, Y.; Kuo, A.; Balo, A. R.; Soman, J.; Schotte, F.; Lemke, H. T.; Owen, R. L.; et al

      2015-08-18

      We present a crystallography chip enabling in situ room temperature crystallography at microfocus synchrotron beamlines and X-ray free-electron laser (X-FEL) sources. Compared to other in situ approaches, we observe extremely low background and high diffraction data quality. The chip design is robust and allows fast and efficient loading of thousands of small crystals. The ability to load a large number of protein crystals, at room temperature and with high efficiency, into prescribed positions enables high throughput automated serial crystallography with microfocus synchrotron beamlines. In addition, we demonstrate the application of this chip for femtosecond time-resolved serial crystallography at the Linacmore » Coherent Light Source (LCLS, Menlo Park, California, USA). As a result, the chip concept enables multiple images to be acquired from each crystal, allowing differential detection of changes in diffraction intensities in order to obtain high signal-to-noise and fully exploit the time resolution capabilities of XFELs.« less

    17. Mean-state acceleration of cloud-resolving models and large eddy simulations

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Jones, C. R.; Bretherton, C. S.; Pritchard, M. S.

      2015-10-29

      In this study, large eddy simulations and cloud-resolving models (CRMs) are routinely used to simulate boundary layer and deep convective cloud processes, aid in the development of moist physical parameterization for global models, study cloud-climate feedbacks and cloud-aerosol interaction, and as the heart of superparameterized climate models. These models are computationally demanding, placing practical constraints on their use in these applications, especially for long, climate-relevant simulations. In many situations, the horizontal-mean atmospheric structure evolves slowly compared to the turnover time of the most energetic turbulent eddies. We develop a simple scheme to reduce this time scale separation to accelerate themore » evolution of the mean state. Using this approach we are able to accelerate the model evolution by a factor of 2–16 or more in idealized stratocumulus, shallow and deep cumulus convection without substantial loss of accuracy in simulating mean cloud statistics and their sensitivity to climate change perturbations. As a culminating test, we apply this technique to accelerate the embedded CRMs in the Superparameterized Community Atmosphere Model by a factor of 2, thereby showing that the method is robust and stable to realistic perturbations across spatial and temporal scales typical in a GCM.« less

    18. Time-resolved x-ray diffraction techniques for bulk polycrystalline materials under dynamic loading

      SciTech Connect (OSTI)

      Lambert, P. K.; Hustedt, C. J.; Zhao, M.; Ananiadis, A. G.; Hufnagel, T. C.; Vecchio, K. S.; Huskins, E. L.; Casem, D. T.; Gruner, S. M.; Tate, M. W.; Philipp, H. T.; Purohit, P.; Weiss, J. T.; Woll, A. R.; Kannan, V.; Ramesh, K. T.; Kenesei, P.; Okasinski, J. S.; Almer, J.

      2014-09-15

      We have developed two techniques for time-resolved x-ray diffraction from bulk polycrystalline materials during dynamic loading. In the first technique, we synchronize a fast detector with loading of samples at strain rates of ∼10{sup 3}–10{sup 4} s{sup −1} in a compression Kolsky bar (split Hopkinson pressure bar) apparatus to obtain in situ diffraction patterns with exposures as short as 70 ns. This approach employs moderate x-ray energies (10–20 keV) and is well suited to weakly absorbing materials such as magnesium alloys. The second technique is useful for more strongly absorbing materials, and uses high-energy x-rays (86 keV) and a fast shutter synchronized with the Kolsky bar to produce short (∼40 μs) pulses timed with the arrival of the strain pulse at the specimen, recording the diffraction pattern on a large-format amorphous silicon detector. For both techniques we present sample data demonstrating the ability of these techniques to characterize elastic strains and polycrystalline texture as a function of time during high-rate deformation.

    19. Studies of combustion reactions at the state-resolved differential cross section level

      SciTech Connect (OSTI)

      Houston, P.L.; Suits, A.G.; Bontuyan, L.S.; Whitaker, B.J.

      1993-12-01

      State-resolved differential reaction cross sections provide perhaps the most detailed information about the mechanism of a chemical reaction, but heretofore they have been extremely difficult to measure. This program explores a new technique for obtaining differential cross sections with product state resolution. The three-dimensional velocity distribution of state-selected reaction products is determined by ionizing the appropriate product, waiting for a delay while it recoils along the trajectory imparted by the reaction, and finally projecting the spatial distribution of ions onto a two dimensional screen using a pulsed electric field. Knowledge of the arrival time allows the ion position to be converted to a velocity, and the density of velocity projections can be inverted mathematically to provide the three-dimensional velocity distribution for the selected product. The main apparatus has been constructed and tested using photodissociations. The authors report here the first test results using crossed beams to investigate collisions between Ar and NO. Future research will both develop further the new technique and employ it to investigate methyl radical, formyl radical, and hydrogen atom reactions which are important in combustion processes. The authors intend specifically to characterize the reactions of CH{sub 3} with H{sub 2} and H{sub 2}CO; of HCO with O{sub 2}; and of H with CH{sub 4}, CO{sub 2}, and O{sub 2}.

    20. Spatially resolving the very high energy emission from MGRO J2019+37 with VERITAS

      SciTech Connect (OSTI)

      Aliu, E.; Errando, M. [Department of Physics and Astronomy, Barnard College, Columbia University, NY 10027 (United States); Aune, T. [Department of Physics and Astronomy, University of California, Los Angeles, CA 90095 (United States); Behera, B.; Chen, X.; Federici, S. [DESY, Platanenallee 6, D-15738 Zeuthen (Germany); Beilicke, M.; Buckley, J. H.; Bugaev, V. [Department of Physics, Washington University, St. Louis, MO 63130 (United States); Benbow, W.; Cerruti, M. [Fred Lawrence Whipple Observatory, Harvard-Smithsonian Center for Astrophysics, Amado, AZ 85645 (United States); Berger, K. [Department of Physics and Astronomy and the Bartol Research Institute, University of Delaware, Newark, DE 19716 (United States); Bird, R. [School of Physics, University College Dublin, Belfield, Dublin 4 (Ireland); Bouvier, A. [Santa Cruz Institute for Particle Physics and Department of Physics, University of California, Santa Cruz, CA 95064 (United States); Ciupik, L. [Astronomy Department, Adler Planetarium and Astronomy Museum, Chicago, IL 60605 (United States); Connolly, M. P. [School of Physics, National University of Ireland Galway, University Road, Galway (Ireland); Cui, W. [Department of Physics, Purdue University, West Lafayette, IN 47907 (United States); Dumm, J. [School of Physics and Astronomy, University of Minnesota, Minneapolis, MN 55455 (United States); Dwarkadas, V. V. [Department of Astronomy and Astrophysics, University of Chicago, Chicago, IL 60637 (United States); Falcone, A., E-mail: ealiu@astro.columbia.edu, E-mail: nahee@uchicago.edu [Department of Astronomy and Astrophysics, 525 Davey Lab, Pennsylvania State University, University Park, PA 16802 (United States); and others

      2014-06-10

      We present very high energy (VHE) imaging of MGRO J2019+37 obtained with the VERITAS observatory. The bright extended (?2) unidentified Milagro source is located toward the rich star formation region Cygnus-X. MGRO J2019+37 is resolved into two VERITAS sources. The faint, point-like source VER J2016+371 overlaps CTB 87, a filled-center remnant (SNR) with no evidence of a supernova remnant shell at the present time. Its spectrum is well fit in the 0.65-10 TeV energy range by a power-law model with photon index 2.3 0.4. VER J2019+378 is a bright extended (?1) source that likely accounts for the bulk of the Milagro emission and is notably coincident with PSR J2021+3651 and the star formation region Sh 2104. Its spectrum in the range 1-30 TeV is well fit with a power-law model of photon index 1.75 0.3, among the hardest values measured in the VHE band, comparable to that observed near Vela-X. We explore the unusual spectrum and morphology in the radio and X-ray bands to constrain possible emission mechanisms for this source.

    1. Position and energy-resolved particle detection using phonon-mediated microwave kinetic inductance detectors

      SciTech Connect (OSTI)

      Moore, D. C.; Golwala, S. R.; Cornell, B. [Division of Physics, Mathematics and Astronomy, California Institute of Technology, Pasadena, California 91125 (United States); Bumble, B.; Day, P. K.; LeDuc, H. G. [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109 (United States); Zmuidzinas, J. [Division of Physics, Mathematics and Astronomy, California Institute of Technology, Pasadena, California 91125 (United States); Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109 (United States)

      2012-06-04

      We demonstrate position and energy-resolved phonon-mediated detection of particle interactions in a silicon substrate instrumented with an array of microwave kinetic inductance detectors (MKIDs). The relative magnitude and delay of the signal received in each sensor allow the location of the interaction to be determined with < or approx. 1mm resolution at 30 keV. Using this position information, variations in the detector response with position can be removed, and an energy resolution of {sigma}{sub E} = 0.55 keV at 30 keV was measured. Since MKIDs can be fabricated from a single deposited film and are naturally multiplexed in the frequency domain, this technology can be extended to provide highly pixelized athermal phonon sensors for {approx}1 kg scale detector elements. Such high-resolution, massive particle detectors would be applicable to rare-event searches such as the direct detection of dark matter, neutrinoless double-beta decay, or coherent neutrino-nucleus scattering.

    2. Spatially resolved and observer-free experimental quantification of spatial resolution in tomographic images

      SciTech Connect (OSTI)

      Tsekenis, S. A.; McCann, H.; Tait, N.

      2015-03-15

      We present a novel framework and experimental method for the quantification of spatial resolution of a tomography system. The framework adopts the “black box” view of an imaging system, considering only its input and output. The tomography system is locally stimulated with a step input, viz., a sharp edge. The output, viz., the reconstructed images, is analysed by Fourier decomposition of their spatial frequency components, and the local limiting spatial resolution is determined using a cut-off threshold. At no point is an observer involved in the process. The framework also includes a means of translating the quantification region in the imaging space, thus creating a spatially resolved map of objectively quantified spatial resolution. As a case-study, the framework is experimentally applied using a gaseous propane phantom measured by a well-established chemical species tomography system. A spatial resolution map consisting of 28 regions is produced. In isolated regions, the indicated performance is 4-times better than that suggested in the literature and varies by 57% across the imaging space. A mechanism based on adjacent but non-interacting beams is hypothesised to explain the observed behaviour. The mechanism suggests that, as also independently concluded by other methods, a geometrically regular beam array maintains maximum objectivity in reconstructions. We believe that the proposed framework, methodology, and findings will be of value in the design and performance evaluation of tomographic imaging arrays and systems.

    3. New Resolved Resonance Region Evaluation for 63Cu and 65Cu for Nuclear Criticality Safety Program

      SciTech Connect (OSTI)

      Sobes, Vladimir; Leal, Luiz C; Guber, Klaus H; Forget, Benoit; Kopecky, S.; Schillebeeckx, P.; Siegler, P.

      2014-01-01

      A new resolved resonance region evaluation of 63Cu and 65Cu was done in the energy region from 10-5 eV to 99.5 keV. The R-Matrix SAMMY method using the Reich-Moore approximation was used to create a new set of consistent resonance parameters. The new evaluation was based on three experimental transmission data sets; two measured at ORELA and one from MITR, and two radiative capture experimental data sets from GELINA. A total of 141 new resonances were identied for 63Cu and 117 for 65Cu. The corresponding set of external resonances for each isotope was based on the identied resonances above 99.5 keV from the ORELA transmission data. The negative external levels (bound levels) were determined to match the dierential thermal cross section measured at the MITR. Double dierential elastic scattering cross sections were calculated from the new set of resonance parameters. Benchmarking calculations were carried out on a set of ICSBEP benchmarks. This work is in support of the DOE Nuclear Criticality Safety Program.

    4. Resolving Radiological Classification and Release Issues for Many DOE Solid Wastes and Salvageable Materials

      SciTech Connect (OSTI)

      Hochel, R.C.

      1999-06-14

      The cost effective radiological classification and disposal of solid materials with potential volume contamination, in accordance with applicable U.S. Department of Energy (DOE) Orders, suffers from an inability to unambiguously distinguish among transuranic waste, low-level waste, and unconditional-release materials. Depending on the classification, disposal costs can vary by a hundred-fold. But in many cases, the issues can be easily resolved by a combination of process information, some simple measurements, and calculational predictions from a computer model for radiation shielding.The proper classification and disposal of many solid wastes requires a measurement regime that is able to show compliance with a variety of institutional and regulatory contamination limits. Although this is not possible for all solid wastes, there are many that do lend themselves to such measures. Several examples are discussed which demonstrate the possibilities, including one which was successfully applied to bulk contamination.The only barriers to such broader uses are the slow-to-change institutional perceptions and procedures. For many issues and materials, the measurement tools are available; they need only be applied.

    5. Time- and space-resolved light emission and spectroscopic research of the flashover plasma

      SciTech Connect (OSTI)

      Gleizer, J. Z.; Krasik, Ya. E.; Leopold, J.

      2015-02-21

      The results of an experimental study of the evolution of surface flashover across the surface of an insulator in vacuum subject to a high-voltage pulse and the parameters of the flashover plasma are reported. For the system studied, flashover is always initiated at the cathode triple junctions. Using time-resolved framing photography of the plasma light emission the velocity of the light emission propagation along the surface of the insulator was found to be ∼2.5·10{sup 8} cm/s. Spectroscopic measurements show that the flashover is characterized by a plasma density of 2–4 × 10{sup 14} cm{sup −3} and neutral and electron temperatures of 2–4 eV and 1–3 eV, respectively, corresponding to a plasma conductivity of ∼0.2 Ω{sup −1} cm{sup −1} and a discharge current density of up to ∼10 kA/cm{sup 2}.

    6. Mean-state acceleration of cloud-resolving models and large eddy simulations

      SciTech Connect (OSTI)

      Jones, C. R.; Bretherton, C. S.; Pritchard, M. S.

      2015-10-29

      In this study, large eddy simulations and cloud-resolving models (CRMs) are routinely used to simulate boundary layer and deep convective cloud processes, aid in the development of moist physical parameterization for global models, study cloud-climate feedbacks and cloud-aerosol interaction, and as the heart of superparameterized climate models. These models are computationally demanding, placing practical constraints on their use in these applications, especially for long, climate-relevant simulations. In many situations, the horizontal-mean atmospheric structure evolves slowly compared to the turnover time of the most energetic turbulent eddies. We develop a simple scheme to reduce this time scale separation to accelerate the evolution of the mean state. Using this approach we are able to accelerate the model evolution by a factor of 2–16 or more in idealized stratocumulus, shallow and deep cumulus convection without substantial loss of accuracy in simulating mean cloud statistics and their sensitivity to climate change perturbations. As a culminating test, we apply this technique to accelerate the embedded CRMs in the Superparameterized Community Atmosphere Model by a factor of 2, thereby showing that the method is robust and stable to realistic perturbations across spatial and temporal scales typical in a GCM.

    7. Detection of nonlinear picosecond acoustic pulses by time-resolved Brillouin scattering

      SciTech Connect (OSTI)

      Gusev, Vitalyi E.

      2014-08-14

      In time-resolved Brillouin scattering (also called picosecond ultrasonic interferometry), the time evolution of the spatial Fourier component of an optically excited acoustic strain distribution is monitored. The wave number is determined by the momentum conservation in photon-phonon interaction. For linear acoustic waves propagating in a homogeneous medium, the detected time-domain signal of the optical probe transient reflectivity shows a sinusoidal oscillation at a constant frequency known as the Brillouin frequency. This oscillation is a result of heterodyning the constant reflection from the sample surface with the Brillouin-scattered field. Here, we present an analytical theory for the nonlinear reshaping of a propagating, finite amplitude picosecond acoustic pulse, which results in a time-dependence of the observed frequency. In particular, we examine the conditions under which this information can be used to study the time-evolution of the weak-shock front speed. Depending on the initial strain pulse parameters and the time interval of its nonlinear transformation, our theory predicts the detected frequency to either be monotonically decreasing or oscillating in time. We support these theoretical predictions by comparison with available experimental data. In general, we find that picosecond ultrasonic interferometry of nonlinear acoustic pulses provides access to the nonlinear acoustic properties of a medium spanning most of the GHz frequency range.

    8. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

      SciTech Connect (OSTI)

      Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

      2015-08-31

      The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grasses (prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.

    9. Final Report Spacially-Resolved Diagnostics and Modeling of Micro-Discharges

      SciTech Connect (OSTI)

      Vincent M. Donnelly; Demetre J. Economou

      2012-08-09

      Optical emission spectroscopy measurements were performed with added trace probe gases in an atmospheric pressure direct current (DC) helium microplasma. Spatially resolved measurements (resolution {approx} 6 {micro}m) were taken across a 200 {micro}m slot-type discharge. Stark splitting of the hydrogen Balmer-line was used to investigate the electric field distribution in the cathode sheath region. Electron densities were evaluated from the analysis of the spectral line broadenings of H-{beta} emission. The electron density in the bulk plasma was in the range 3-8 x 1013 cm-3. The electric field peaked at the cathode ({approx}60 kV/cm) and decayed to small values over a distance of {approx} 50 {micro}m (sheath edge) from the cathode. These experimental data were in good agreement with a self-consistent one-dimensional model of the discharge. The dependence of gas temperature on gas flow through the slot-type, atmospheric pressure microplasma in helium or argon was investigated by a combination of experiments and modeling. Spatially-resolved gas temperature profiles across the gap between the two electrodes were obtained from rotational analysis of N{sub 2} (C{sup 3}II{sub u} {yields} B{sup 3} II{sub g}) emission spectra, with small amounts of N{sub 2} added as actinometer gas. Under the same input power of 20 kW/cm{sup 3}, the peak gas temperature in helium ({approx}650 K) was significantly lower than that in argon (over 1200 K). This reflects the much higher thermal conductivity of helium gas. The gas temperature decreased with increasing gas flow rate, more so in argon compared to helium. This was consistent with the fact that conductive heat losses dominate in helium microplasmas, while convective heat losses play a major role in argon microplasmas. A plasma-gas flow simulation of the microdischarge, including a chemistry set, a compressible Navier-Stokes (and mass continuity) equation, and a convective heat transport equation, was also performed. Experimental

    10. Dose calculation for permanent prostate implants incorporating spatially anisotropic linearly time-resolving edema

      SciTech Connect (OSTI)

      Monajemi, T. T.; Clements, Charles M.; Sloboda, Ron S.

      2011-04-15

      Purpose: The objectives of this study were (i) to develop a dose calculation method for permanent prostate implants that incorporates a clinically motivated model for edema and (ii) to illustrate the use of the method by calculating the preimplant dosimetry error for a reference configuration of {sup 125}I, {sup 103}Pd, and {sup 137}Cs seeds subject to edema-induced motions corresponding to a variety of model parameters. Methods: A model for spatially anisotropic edema that resolves linearly with time was developed based on serial magnetic resonance imaging measurements made previously at our center to characterize the edema for a group of n=40 prostate implant patients [R. S. Sloboda et al., ''Time course of prostatic edema post permanent seed implant determined by magnetic resonance imaging,'' Brachytherapy 9, 354-361 (2010)]. Model parameters consisted of edema magnitude, {Delta}, and period, T. The TG-43 dose calculation formalism for a point source was extended to incorporate the edema model, thus enabling calculation via numerical integration of the cumulative dose around an individual seed in the presence of edema. Using an even power piecewise-continuous polynomial representation for the radial dose function, the cumulative dose was also expressed in closed analytical form. Application of the method was illustrated by calculating the preimplant dosimetry error, RE{sub preplan}, in a 5x5x5 cm{sup 3} volume for {sup 125}I (Oncura 6711), {sup 103}Pd (Theragenics 200), and {sup 131}Cs (IsoRay CS-1) seeds arranged in the Radiological Physics Center test case 2 configuration for a range of edema relative magnitudes ({Delta}=[0.1,0.2,0.4,0.6,1.0]) and periods (T=[28,56,84] d). Results were compared to preimplant dosimetry errors calculated using a variation of the isotropic edema model developed by Chen et al. [''Dosimetric effects of edema in permanent prostate seed implants: A rigorous solution,'' Int. J. Radiat. Oncol., Biol., Phys. 47, 1405-1419 (2000

    11. Resolving the tips of the tree of life: How much mitochondrialdata doe we need?

      SciTech Connect (OSTI)

      Bonett, Ronald M.; Macey, J. Robert; Boore, Jeffrey L.; Chippindale, Paul T.

      2005-04-29

      Mitochondrial (mt) DNA sequences are used extensively to reconstruct evolutionary relationships among recently diverged animals,and have constituted the most widely used markers for species- and generic-level relationships for the last decade or more. However, most studies to date have employed relatively small portions of the mt-genome. In contrast, complete mt-genomes primarily have been used to investigate deep divergences, including several studies of the amount of mt sequence necessary to recover ancient relationships. We sequenced and analyzed 24 complete mt-genomes from a group of salamander species exhibiting divergences typical of those in many species-level studies. We present the first comprehensive investigation of the amount of mt sequence data necessary to consistently recover the mt-genome tree at this level, using parsimony and Bayesian methods. Both methods of phylogenetic analysis revealed extremely similar results. A surprising number of well supported, yet conflicting, relationships were found in trees based on fragments less than {approx}2000 nucleotides (nt), typical of the vast majority of the thousands of mt-based studies published to date. Large amounts of data (11,500+ nt) were necessary to consistently recover the whole mt-genome tree. Some relationships consistently were recovered with fragments of all sizes, but many nodes required the majority of the mt-genome to stabilize, particularly those associated with short internal branches. Although moderate amounts of data (2000-3000 nt) were adequate to recover mt-based relationships for which most nodes were congruent with the whole mt-genome tree, many thousands of nucleotides were necessary to resolve rapid bursts of evolution. Recent advances in genomics are making collection of large amounts of sequence data highly feasible, and our results provide the basis for comparative studies of other closely related groups to optimize mt sequence sampling and phylogenetic resolution at the ''tips

    12. Spatially resolved characterization of biogenic manganese oxideproduction within a bacterial biofilm

      SciTech Connect (OSTI)

      Toner, Brandy; Fakra, Sirine; Villalobos, Mario; Warwick, Tony; Sposito, Garrison

      2004-10-01

      Pseudomonas putida strain MnB1, a biofilm forming bacteria, was used as a model for the study of bacterial Mn oxidation in freshwater and soil environments. The oxidation of Mn{sub (aq)}{sup +2} by P. putida was characterized by spatially and temporally resolving the oxidation state of Mn in the presence of a bacterial biofilm using scanning transmission x-ray microscopy (STXM) combined with near edge x-ray absorption fine structure (NEXAFS) spectroscopy at the Mn-L{sub 2,3} absorption edges. Subsamples were collected from growth flasks containing 0.1 mM and 1 mM total Mn at 16, 24, 36 and 48 hours after inoculation. Immediately after collection, the unprocessed hydrated subsamples were imaged at 40 nm resolution. Manganese NEXAFS spectra were extracted from x-ray energy sequences of STXM images (stacks) and fit with linear combinations of well characterized reference spectra to obtain quantitative relative abundances of Mn(II), Mn(III) and Mn(IV). Careful consideration was given to uncertainty in the normalization of the reference spectra, choice of reference compounds, and chemical changes due to radiation damage. The STXM results confirm that Mn{sub (aq)}{sup +2} was removed from solution by P. putida and was concentrated as Mn(III) and Mn(IV) immediately adjacent to the bacterial cells. The Mn precipitates were completely enveloped by bacterial biofilm material. The distribution of Mn oxidation states was spatially heterogeneous within and between the clusters of bacterial cells. Scanning transmission x-ray microscopy is a promising tool to advance the study of hydrated interfaces between minerals and bacteria, particularly in cases where the structure of bacterial biofilms needs to be maintained.

    13. Laser plasma x-ray source for ultrafast time-resolved x-ray absorption spectroscopy

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Miaja-Avila, L.; O'Neil, G. C.; Uhlig, J.; Cromer, C. L.; Dowell, M. L.; Jimenez, R.; Hoover, A. S.; Silverman, K. L.; Ullom, J. N.

      2015-03-02

      We describe a laser-driven x-ray plasma source designed for ultrafast x-ray absorption spectroscopy. The source is comprised of a 1 kHz, 20 W, femtosecond pulsed infrared laser and a water target. We present the x-ray spectra as a function of laser energy and pulse duration. Additionally, we investigate the plasma temperature and photon flux as we vary the laser energy. We obtain a 75 μm FWHM x-ray spot size, containing ~106 photons/s, by focusing the produced x-rays with a polycapillary optic. Since the acquisition of x-ray absorption spectra requires the averaging of measurements from >107 laser pulses, we also presentmore » data on the source stability, including single pulse measurements of the x-ray yield and the x-ray spectral shape. In single pulse measurements, the x-ray flux has a measured standard deviation of 8%, where the laser pointing is the main cause of variability. Further, we show that the variability in x-ray spectral shape from single pulses is low, thus justifying the combining of x-rays obtained from different laser pulses into a single spectrum. Finally, we show a static x-ray absorption spectrum of a ferrioxalate solution as detected by a microcalorimeter array. Altogether, our results demonstrate that this water-jet based plasma source is a suitable candidate for laboratory-based time-resolved x-ray absorption spectroscopy experiments.« less

    14. A SCR Model Calibration Approach with Spatially Resolved Measurements and NH3 Storage Distributions

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Song, Xiaobo; Parker, Gordon G.; Johnson, John H.; Naber, Jeffrey D.; Pihl, Josh A.

      2014-11-27

      The selective catalytic reduction (SCR) is a technology used for reducing NO x emissions in the heavy-duty diesel (HDD) engine exhaust. In this study, the spatially resolved capillary inlet infrared spectroscopy (Spaci-IR) technique was used to study the gas concentration and NH3 storage distributions in a SCR catalyst, and to provide data for developing a SCR model to analyze the axial gaseous concentration and axial distributions of NH3 storage. A two-site SCR model is described for simulating the reaction mechanisms. The model equations and a calculation method was developed using the Spaci-IR measurements to determine the NH3 storage capacity andmore » the relationships between certain kinetic parameters of the model. Moreover, a calibration approach was then applied for tuning the kinetic parameters using the spatial gaseous measurements and calculated NH3 storage as a function of axial position instead of inlet and outlet gaseous concentrations of NO, NO2, and NH3. The equations and the approach for determining the NH3 storage capacity of the catalyst and a method of dividing the NH3 storage capacity between the two storage sites are presented. It was determined that the kinetic parameters of the adsorption and desorption reactions have to follow certain relationships for the model to simulate the experimental data. Finally, the modeling results served as a basis for developing full model calibrations to SCR lab reactor and engine data and state estimator development as described in the references (Song et al. 2013a, b; Surenahalli et al. 2013).« less

    15. Perturbed Physics Ensemble Simulations of Cirrus on the Cloud System-resolving Scale

      SciTech Connect (OSTI)

      Muhlbauer, Andreas; Berry, Elizabeth; Comstock, Jennifer M.; Mace, Gerald G.

      2014-04-16

      In this study, the effect of uncertainties in the parameterization of ice microphysical processes and initial conditions on the variability of cirrus microphysical and radiative properties are investigated in a series of cloud system-resolving perturbed physics ensemble (PPE) and initial condition ensemble (ICE) simulations. Three cirrus cases representative of mid-latitude, subtropical and tropical cirrus are examined. It is found that the variability in cirrus properties induced by perturbing uncertain parameters in ice microphysics parameterizations outweighs the variability induced by perturbing the initial conditions in midlatitude and subtropical cirrus. However, in tropical anvil cirrus the variability in the PPE and ICE simulations is about the same order of magnitude. The cirrus properties showing the largest sensitivity are ice water content (IWC) and cloud thickness whereas the averaged high cloud cover is only marginally affected. Changes in cirrus ice water path and outgoing longwave radiation are controlled primarily by changes in IWC and cloud thickness but not by changes is the averaged high cloud cover. The change in the vertical distribution of cloud fraction and cloud thickness is caused by changes in cirrus cloud base whereas cloud top is not sensitive to either perturbed physics or perturbed initial conditions. In all cirrus cases, the top three parameters controlling the microphysical variability and radiative impact of cirrus clouds are ice fall speeds, ice autoconversion size thresholds and heterogeneous ice nucleation. Changes in the ice deposition coefficient do not affect the ice water path and outgoing longwave radiation. Similarly, changes in the number concentration of aerosols available for homogeneous freezing have virtually no effect on the microphysical and radiative properties of midlatitude and subtropical cirrus but only little impact on tropical anvil cirrus. Overall, the sensitivity of cirrus microphysical and radiative

    16. Evaluation of high-level clouds in cloud resolving model simulations with ARM and KWAJEX observations

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Liu, Zheng; Muhlbauer, Andreas; Ackerman, Thomas

      2015-11-05

      In this paper, we evaluate high-level clouds in a cloud resolving model during two convective cases, ARM9707 and KWAJEX. The simulated joint histograms of cloud occurrence and radar reflectivity compare well with cloud radar and satellite observations when using a two-moment microphysics scheme. However, simulations performed with a single moment microphysical scheme exhibit low biases of approximately 20 dB. During convective events, two-moment microphysical overestimate the amount of high-level cloud and one-moment microphysics precipitate too readily and underestimate the amount and height of high-level cloud. For ARM9707, persistent large positive biases in high-level cloud are found, which are not sensitivemore » to changes in ice particle fall velocity and ice nuclei number concentration in the two-moment microphysics. These biases are caused by biases in large-scale forcing and maintained by the periodic lateral boundary conditions. The combined effects include significant biases in high-level cloud amount, radiation, and high sensitivity of cloud amount to nudging time scale in both convective cases. The high sensitivity of high-level cloud amount to the thermodynamic nudging time scale suggests that thermodynamic nudging can be a powerful ‘‘tuning’’ parameter for the simulated cloud and radiation but should be applied with caution. The role of the periodic lateral boundary conditions in reinforcing the biases in cloud and radiation suggests that reducing the uncertainty in the large-scale forcing in high levels is important for similar convective cases and has far reaching implications for simulating high-level clouds in super-parameterized global climate models such as the multiscale modeling framework.« less

    17. An Investigation to Resolve the Interaction Between Fuel Cell, Power Conditioning System and Application Loads

      SciTech Connect (OSTI)

      Sudip K. Mazumder

      2005-12-31

      Development of high-performance and durable solidoxide fuel cells (SOFCs) and a SOFC power-generating system requires knowledge of the feedback effects from the power-conditioning electronics and from application-electrical-power circuits that may pass through or excite the power-electronics subsystem (PES). Therefore, it is important to develop analytical models and methodologies, which can be used to investigate and mitigate the effects of the electrical feedbacks from the PES and the application loads (ALs) on the reliability and performance of SOFC systems for stationary and non-stationary applications. However, any such attempt to resolve the electrical impacts of the PES on the SOFC would be incomplete unless one utilizes a comprehensive analysis, which takes into account the interactions of SOFC, PES, balance-of-plant system (BOPS), and ALs as a whole. SOFCs respond quickly to changes in load and exhibit high part- and full-load efficiencies due to its rapid electrochemistry, which is not true for the thermal and mechanical time constants of the BOPS, where load-following time constants are, typically, several orders of magnitude higher. This dichotomy can affect the lifetime and durability of the SOFCSs and limit the applicability of SOFC systems for load-varying stationary and transportation applications. Furthermore, without validated analytical models and investigative design and optimization methodologies, realizations of cost-effective, reliable, and optimal PESs (and power-management controls), in particular, and SOFC systems, in general, are difficult. On the whole, the research effort can lead to (a) cost-constrained optimal PES design for high-performance SOFCS and high energy efficiency and power density, (b) effective SOFC power-system design, analyses, and optimization, and (c) controllers and modulation schemes for mitigation of electrical impacts and wider-stability margin and enhanced system efficiency.

    18. Laser plasma x-ray source for ultrafast time-resolved x-ray absorption spectroscopy

      SciTech Connect (OSTI)

      Miaja-Avila, L.; O'Neil, G. C.; Uhlig, J.; Cromer, C. L.; Dowell, M. L.; Jimenez, R.; Hoover, A. S.; Silverman, K. L.; Ullom, J. N.

      2015-03-02

      We describe a laser-driven x-ray plasma source designed for ultrafast x-ray absorption spectroscopy. The source is comprised of a 1 kHz, 20 W, femtosecond pulsed infrared laser and a water target. We present the x-ray spectra as a function of laser energy and pulse duration. Additionally, we investigate the plasma temperature and photon flux as we vary the laser energy. We obtain a 75 μm FWHM x-ray spot size, containing ~106 photons/s, by focusing the produced x-rays with a polycapillary optic. Since the acquisition of x-ray absorption spectra requires the averaging of measurements from >107 laser pulses, we also present data on the source stability, including single pulse measurements of the x-ray yield and the x-ray spectral shape. In single pulse measurements, the x-ray flux has a measured standard deviation of 8%, where the laser pointing is the main cause of variability. Further, we show that the variability in x-ray spectral shape from single pulses is low, thus justifying the combining of x-rays obtained from different laser pulses into a single spectrum. Finally, we show a static x-ray absorption spectrum of a ferrioxalate solution as detected by a microcalorimeter array. Altogether, our results demonstrate that this water-jet based plasma source is a suitable candidate for laboratory-based time-resolved x-ray absorption spectroscopy experiments.

    19. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

      SciTech Connect (OSTI)

      Not Available

      1992-09-01

      The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

    20. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

      SciTech Connect (OSTI)

      Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

      2012-07-01

      In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

    1. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

      DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

      Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

      2015-08-31

      The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grassesmore » (prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.« less

    2. SCADA Vulnerability Assessments

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

    3. Grid Cyber Vulnerability & Assessments

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      ... to increase power grid reliability and resilience, but also provides adversaries with the ... in industrial control systems for electricity generationtransmissiondistribution ...

    4. Ultrafast time-resolved spectroscopy of the light-harvesting complex 2 (LH2) from the photosynthetic bacterium Thermochromatium tepidum

      SciTech Connect (OSTI)

      Niedzwiedzki, Dariusz M.; Fuciman, Marcel; Kobayashi, Masayuki; Frank, Harry A.; Blankenship, Robert E.

      2011-10-08

      The light-harvesting complex 2 from the thermophilic purple bacterium Thermochromatium tepidum was purified and studied by steady-state absorption and fluorescence, sub-nanosecond-time-resolved fluorescence and femtosecond time-resolved transient absorption spectroscopy. The measurements were performed at room temperature and at 10 K. The combination of both ultrafast and steady-state optical spectroscopy methods at ambient and cryogenic temperatures allowed the detailed study of carotenoid (Car)-to-bacteriochlorophyll (BChl) as well BChl-to-BChl excitation energy transfer in the complex. The studies show that the dominant Cars rhodopin (N = 11) and spirilloxanthin (N = 13) do not play a significant role as supportive energy donors for BChl a. This is related with their photophysical properties regulated by long ?-electron conjugation. On the other hand, such properties favor some of the Cars, particularly spirilloxanthin (N = 13) to play the role of the direct quencher of the excited singlet state of BChl.

    5. Improving the accuracy and efficiency of time-resolved electronic spectra calculations: Cellular dephasing representation with a prefactor

      SciTech Connect (OSTI)

      Zambrano, Eduardo; ulc, Miroslav; Van?ek, Ji?

      2013-08-07

      Time-resolved electronic spectra can be obtained as the Fourier transform of a special type of time correlation function known as fidelity amplitude, which, in turn, can be evaluated approximately and efficiently with the dephasing representation. Here we improve both the accuracy of this approximationwith an amplitude correction derived from the phase-space propagatorand its efficiencywith an improved cellular scheme employing inverse Weierstrass transform and optimal scaling of the cell size. We demonstrate the advantages of the new methodology by computing dispersed time-resolved stimulated emission spectra in the harmonic potential, pyrazine, and the NCO molecule. In contrast, we show that in strongly chaotic systems such as the quartic oscillator the original dephasing representation is more appropriate than either the cellular or prefactor-corrected methods.

    6. Fiber-fed time-resolved photoluminescence for reduced process feedback time on thin-film photovoltaics

      SciTech Connect (OSTI)

      Repins, I. L.; Egaas, B.; Mansfield, L. M.; Contreras, M. A.; Beall, C.; Glynn, S.; Carapella, J.; Kuciauskas, D.; Muzzillo, C. P.

      2015-01-15

      Fiber-fed time-resolved photoluminescence is demonstrated as a tool for immediate process feedback after deposition of the absorber layer for CuIn{sub x}Ga{sub 1-x}Se{sub 2} and Cu{sub 2}ZnSnSe{sub 4} photovoltaic devices. The technique uses a simplified configuration compared to typical laboratory time-resolved photoluminescence in the delivery of the exciting beam, signal collection, and electronic components. Correlation of instrument output with completed device efficiency is demonstrated over a large sample set. The extraction of the instrument figure of merit, depending on both the initial luminescence intensity and its time decay, is explained and justified. Limitations in the prediction of device efficiency by this method, including surface effect, are demonstrated and discussed.

    7. Experimental station for laser-based picosecond time-resolved x-ray absorption near-edge spectroscopy

      SciTech Connect (OSTI)

      Dorchies, F. Fedorov, N.; Lecherbourg, L.

      2015-07-15

      We present an experimental station designed for time-resolved X-ray Absorption Near-Edge Spectroscopy (XANES). It is based on ultrashort laser-plasma x-ray pulses generated from a table-top 100 mJ-class laser at 10 Hz repetition rate. A high transmission (10%–20%) x-ray beam line transport using polycapillary optics allows us to set the sample in an independent vacuum chamber, providing high flexibility over a wide spectral range from 0.5 up to 4 keV. Some XANES spectra are presented, demonstrating 1% noise level in only ∼1 mn and ∼100 cumulated laser shots. Time-resolved measurements are reported, indicating that the time resolution of the entire experimental station is 3.3 ± 0.6 ps rms.

    8. Spatially resolved determination of the short-circuit current density of silicon solar cells via lock-in thermography

      SciTech Connect (OSTI)

      Fertig, Fabian Greulich, Johannes; Rein, Stefan

      2014-05-19

      We present a spatially resolved method to determine the short-circuit current density of crystalline silicon solar cells by means of lock-in thermography. The method utilizes the property of crystalline silicon solar cells that the short-circuit current does not differ significantly from the illuminated current under moderate reverse bias. Since lock-in thermography images locally dissipated power density, this information is exploited to extract values of spatially resolved current density under short-circuit conditions. In order to obtain an accurate result, one or two illuminated lock-in thermography images and one dark lock-in thermography image need to be recorded. The method can be simplified in a way that only one image is required to generate a meaningful short-circuit current density map. The proposed method is theoretically motivated, and experimentally validated for monochromatic illumination in comparison to the reference method of light-beam induced current.

    9. Phased-Resolved Strain Measuremetns in Hydrated Ordinary Portland Cement Using Synchrotron x-Rays (Prop. 2003-033)

      SciTech Connect (OSTI)

      BIernacki, Joseph J.; Watkins, Thomas R; Parnham, C. J.; Hubbard, Camden R; Bai, J.

      2006-01-01

      X-ray diffraction methods developed for the determination of residual stress states in crystalline materials have been applied to study residual strains and strains because of mechanical loading of ordinary portland cement paste. Synchrotron X-rays were used to make in situ measurements of interplanar spacings in the calcium hydroxide (CH) phase of hydrated neat portland cement under uniaxial compression. The results indicate that strains on the order of 1/100 000 can be resolved providing an essentially new technique by which to measure the phase-resolved meso-scale mechanical behavior of cement under different loading conditions. Evaluation of these strain data in view of published elastic parameters for CH suggests that the CH carries a large fraction of the applied stress and that plastic interactions with the matrix are notable.

    10. Design of a High Resolution and High Flux Beam line for VUV Angle-Resolved Photoemission at UVSOR-II

      SciTech Connect (OSTI)

      Kimura, Shin-ichi; Ito, Takahiro; Nakamura, Eiken; Hosaka, Masahito; Katoh, Masahiro

      2007-01-19

      A high-energy-resolution angle-resolved photoemission beamline in the vacuum-ultraviolet (VUV) region has been designed for a 750 MeV synchrotron light source UVSOR-II. The beamline equips an APPLE-II-type undulator with the horizontally/vertically linear and right/left circular polarizations, a modified Wadsworth-type monochromator and a high-resolution photoelectron analyzer. The monochromator covers the photon energy range of 6 - 40 eV. The energy resolution (hv/{delta}hv) and the photon flux on samples are expected to be 2 x 104 and 1012 photons/sec at 10 eV, 4 x 104 and 5 x 1011 photons/sec at 20 eV, and 6 x 104 and 1011 photons/sec at 40 eV, respectively. The beamline provides the high-resolution angle-resolved photoemission spectroscopy less than 1 meV in the whole VUV energy range.

    11. Evaluation of Cloud Type Occurrences and Radiative Forcings Simulated by a Cloud Resolving Model Using Observations from Sa...

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Cloud Type Occurrences and Radiative Forcings Simulated by a Cloud Resolving Model Using Observations from Satellite and Cloud Radar Y. Luo and S. K. Krueger University of Utah Salt Lake City, Utah Introduction Because of both the various effects clouds exert on the earth-atmospheric system and the cloud feedback, correct representations of clouds in numerical models are critical for accurate climate modeling and weather forecast. Unfortunately, determination of clouds and their radiative

    12. Enforcement actions: Significant actions resolved. Volume 14, No. 2, Part 1: Individual actions. Quarterly progress report, April--June 1995

      SciTech Connect (OSTI)

      1995-09-01

      This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1995) and includes copies of Orders sent by the Nuclear Regulatory Commission to individuals with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC. The Commission believes this information may be useful to licensees in making employment decisions.

    13. Time-resolved extreme-ultraviolet spectroscopy of laser-produced plasmas originating at the parylene layer of microballon targets

      SciTech Connect (OSTI)

      Griem, H.R.; Moreno, J.

      1991-03-01

      In experiments this past year at the University of Rochester's Laboratory for Laser Energetics we obtained time-integrated and time-resolved spectra from the ultraviolet to the x-ray region. We have investigated various phenomena in laser-produced plasmas including spectral line broadening, plasma expansion velocities, ionization and recombination of low-Z materials in spherical targets, and the formation of satellites near some resonance lines. In addition we have improved our spectroscopic instrumentation.

    14. Time-resolved dosimetry using a pinpoint ionization chamber as quality assurance for IMRT and VMAT

      SciTech Connect (OSTI)

      Louwe, Robert J. W. Satherley, Thomas; Day, Rebecca A.; Greig, Lynne; Wendling, Markus; Monshouwer, René

      2015-04-15

      study showed that time-resolved dosimetry using an ionization chamber is feasible and can be largely automated which limits the required additional time compared to integrated dose measurements. It provides a unique QA method which enables identification and quantification of the contribution of various error sources during IMRT and VMAT delivery.

    15. Spatially resolved assessment of hepatic function using 99mTc-IDA SPECT

      SciTech Connect (OSTI)

      Wang, Hesheng; Cao, Yue

      2013-09-15

      Purpose: 99mTc-iminodiacetic acid (IDA) hepatobiliary imaging is usually quantified for hepatic function on the entire liver or regions of interest (ROIs) in the liver. The authors presented a method to estimate the hepatic extraction fraction (HEF) voxel-by-voxel from single-photon emission computed tomography (SPECT)/CT with a 99mTc-labeled IDA agent of mebrofenin and evaluated the spatially resolved HEF measurements with an independent physiological measurement.Methods: Fourteen patients with intrahepatic cancers were treated with radiation therapy (RT) and imaged by 99mTc-mebrofenin SPECT before and 1 month after RT. The dynamic SPECT volumes were with a resolution of 3.9 × 3.9 × 2.5 mm{sup 3}. Throughout the whole liver with approximate 50 000 voxels, voxelwise HEF quantifications were estimated and compared between using arterial input function (AIF) from the heart and using vascular input function (VIF) from the spleen. The correlation between mean of the HEFs over the nontumor liver tissue and the overall liver function measured by Indocyanine green clearance half-time (T1/2) was assessed. Variation of the voxelwise estimation was evaluated in ROIs drawn in relatively homogeneous regions of the livers. The authors also examined effects of the time range parameter on the voxelwise HEF quantification.Results: Mean of the HEFs over the liver estimated using AIF significantly correlated with the physiological measurement T1/2 (r= 0.52, p= 0.0004), and the correlation was greatly improved by using VIF (r= 0.79, p < 0.0001). The parameter of time range for the retention phase did not lead to a significant difference in the means of the HEFs in the ROIs. Using VIF and a retention phase time range of 7–30 min, the relative variation of the voxelwise HEF in the ROIs was 10%± 6% of respective mean HEF.Conclusions: The voxelwise HEF derived from 99mTc-IDA SPECT by the deconvolution analysis is feasible to assess the spatial distribution of hepatic function in the

    16. A high-efficiency spin-resolved photoemission spectrometer combining time-of-flight spectroscopy with exchange-scattering polarimetry

      SciTech Connect (OSTI)

      Jozwiak, Chris M.; Graff, Jeff; Lebedev, Gennadi; Andresen, Nord; Schmid, Andreas; Fedorov, Alexei; El Gabaly, Farid; Wan, Weishi; Lanzara, Alessandra; Hussain, Zahid

      2010-04-13

      We describe a spin-resolved electron spectrometer capable of uniquely efficient and high energy resolution measurements. Spin analysis is obtained through polarimetry based on low-energy exchange scattering from a ferromagnetic thin-film target. This approach can achieve a similar analyzing power (Sherman function) as state-of-the-art Mott scattering polarimeters, but with as much as 100 times improved efficiency due to increased reflectivity. Performance is further enhanced by integrating the polarimeter into a time-of-flight (TOF) based energy analysis scheme with a precise and flexible electrostatic lens system. The parallel acquisition of a range of electron kinetic energies afforded by the TOF approach results in an order of magnitude (or more) increase in efficiency compared to hemispherical analyzers. The lens system additionally features a 90 degrees bandpass filter, which by removing unwanted parts of the photoelectron distribution allows the TOF technique to be performed at low electron drift energy and high energy resolution within a wide range of experimental parameters. The spectrometer is ideally suited for high-resolution spin- and angle-resolved photoemission spectroscopy (spin-ARPES), and initial results are shown. The TOF approach makes the spectrometer especially ideal for time-resolved spin-ARPES experiments.

    17. SAMRAI: A novel variably polarized angle-resolved photoemission beamline in the VUV region at UVSOR-II

      SciTech Connect (OSTI)

      Kimura, Shin-Ichi; Ito, Takahiro; Hosaka, Masahito; Katoh, Masahiro; Sakai, Masahiro; Nakamura, Eiken; Kondo, Naonori; Horigome, Toshio; Hayashi, Kenji; Goto, Tomohiro; Ejima, Takeo; Soda, Kazuo

      2010-05-15

      A novel variably polarized angle-resolved photoemission spectroscopy beamline in the vacuum-ultraviolet (VUV) region has been installed at the UVSOR-II 750 MeV synchrotron light source. The beamline is equipped with a 3 m long APPLE-II type undulator with horizontally/vertically linear and right/left circular polarizations, a 10 m Wadsworth type monochromator covering a photon energy range of 6-43 eV, and a 200 mm radius hemispherical photoelectron analyzer with an electron lens of a {+-}18 deg. acceptance angle. Due to the low emittance of the UVSOR-II storage ring, the light source is regarded as an entrance slit, and the undulator light is directly led to a grating by two plane mirrors in the monochromator while maintaining a balance between high-energy resolution and high photon flux. The energy resolving power (h{nu}/{Delta}h{nu}) and photon flux of the monochromator are typically 1x10{sup 4} and 10{sup 12} photons/s, respectively, with a 100 {mu}m exit slit. The beamline is used for angle-resolved photoemission spectroscopy with an energy resolution of a few meV covering the UV-to-VUV energy range.

    18. Strain-resolved microbial community proteomics reveals simultaneous aerobic and anaerobic function during gastrointestinal tract colonization of a preterm infant

      SciTech Connect (OSTI)

      Brooks, Brandon; Mueller, R. S.; Young, Jacque C.; Morowitz, Michael J.; Robert L. Hettich; Banfield, Jillian F.

      2015-07-01

      While there has been growing interest in the gut microbiome in recent years, it remains unclear whether closely related species and strains have similar or distinct functional roles and if organisms capable of both aerobic and anaerobic growth do so simultaneously. To investigate these questions, we implemented a high-throughput mass spectrometry-based proteomics approach to identify proteins in fecal samples collected on days of life 13 21 from an infant born at 28 weeks gestation. No prior studies have coupled strain-resolved community metagenomics to proteomics for such a purpose. Sequences were manually curated to resolve the genomes of two strains of Citrobacter that were present during the later stage of colonization. Proteome extracts from fecal samples were processed via a nano-2D-LC-MS/MS and peptides were identified based on information predicted from the genome sequences for the dominant organisms, Serratia and the two Citrobacter strains. These organisms are facultative anaerobes, and proteomic information indicates the utilization of both aerobic and anaerobic metabolisms throughout the time series. This may indicate growth in distinct niches within the gastrointestinal tract. We uncovered differences in the physiology of coexisting Citrobacter strains, including differences in motility and chemotaxis functions. Additionally, for both Citrobacter strains we resolved a community-essential role in vitamin metabolism and a predominant role in propionate production. Finally, in this case study we detected differences between genome abundance and activity levels for the dominant populations. This underlines the value in layering proteomic information over genetic potential.

    19. AN INVESTIGATION TO RESOLVE THE INTERACTION BETWEEN FUEL CELL, POWER CONDITIONING SYSTEM AND APPLICATION LOADS

      SciTech Connect (OSTI)

      Sudip K. Mazumder; Chuck McKintyre; Dan Herbison; Doug Nelson; Comas Haynes; Michael von Spakovsky; Joseph Hartvigsen; S. Elangovan

      2003-11-03

      the SOFC stack subsystem (SOFCSS), the power-electronics subsystem (PES), and the BOPS. Such an approach leads to robust and comprehensive electrical, electrochemical, thermodynamic, kinetic, chemical, and geometric models of the SOFSS, PES and application loads, and BOPS. A comprehensive methodology to resolve interactions among SOFCSS, PES and application loads and to investigate the impacts of the fast- and slow-scale dynamics of the power-conditioning system (PCS) on the SOFCSS has been developed by this team. Parametric studies on SOFCSS have been performed and the effects of current ripple and load transients on SOFC material properties are investigated. These results are used to gain insights into the long-term performance and reliability of the SOFCSS. Based on this analysis, a novel, efficient, and reliable PES for SOFC has been developed. Impacts of SOFC PCS control techniques on the transient responses, flow parameters, and current densities have also been studied and a novel nonlinear hybrid controller for single/parallel DC-DC converter has been developed.

    20. High-temperature aerosol formation in wood pellets flames: Spatially resolved measurements

      SciTech Connect (OSTI)

      Wiinikka, Henrik; Gebart, Rikard; Boman, Christoffer; Bostroem, Dan; Nordin, Anders; OEhman, Marcus

      2006-12-15

      The formation and evolution of high-temperature aerosols during fixed bed combustion of wood pellets in a realistic combustion environment were investigated through spatially resolved experiments. The purpose of this work was to investigate the various stages of aerosol formation from the hot flame zone to the flue gas channel. The investigation is important both for elucidation of the formation mechanisms and as a basis for development and validation of particle formation models that can be used for design optimization. Experiments were conducted in an 8-kW-updraft fired-wood-pellets combustor. Particle samples were withdrawn from the centerline of the combustor through 10 sampling ports by a rapid dilution sampling probe. The corresponding temperatures at the sampling positions were in the range 200-1450{sup o}C. The particle sample was size-segregated in a low-pressure impactor, allowing physical and chemical resolution of the fine particles. The chemical composition of the particles was investigated by SEM/EDS and XRD analysis. Furthermore, the experimental results were compared to theoretical models for aerosol formation processes. The experimental data show that the particle size distribution has two peaks, both of which are below an aerodynamic diameter of 2.5 {mu}m (PM{sub 2.5}). The mode diameters of the fine and coarse modes in the PM{sub 2.5} region were {approx}0.1 and {approx}0.8 {mu}m, respectively. The shape of the particle size distribution function continuously changes with position in the reactor due to several mechanisms. Early, in the flame zone, both the fine mode and the coarse mode in the PM{sub 2.5} region were dominated by particles from incomplete combustion, indicated by a significant amount of carbon in the particles. The particle concentrations of both the fine and the coarse mode decrease rapidly in the hot oxygen-rich flame due to oxidation of the carbon-rich particles. After the hot flame, the fine mode concentration and particle