National Library of Energy BETA

Sample records for rsa adaptive authentication

  1. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  3. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  4. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  5. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  6. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  7. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  8. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  9. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  11. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  12. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued fixes. Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  13. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  14. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  15. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  16. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  17. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  18. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  19. Reviews of computing technology: Securing network applications, Kerberos and RSA

    SciTech Connect (OSTI)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  20. Digitally Marking RSA Moduli

    SciTech Connect (OSTI)

    Johnston, A.M.

    2000-10-09

    The moduli used in RSA (see [5]) can be generated by many different sources. The generator of that modulus (assuming a single entity generates the modulus) knows its factorization. They would have the ability to forge signatures or break any system based on this moduli. If a moduli and the RSA parameters associated with it were generated by a reputable source, the system would have higher value than if the parameters were generated by an unknown entity. So for tracking, security, confidence and financial reasons it would be beneficial to know who the generator of the RSA modulus was. This is where digital marking comes in. An RSA modulus ia digitally marked, or digitally trade marked, if the generator and other identifying features of the modulus (such as its intended user, the version number, etc.) can be identified and possibly verified by the modulus itself. The basic concept of digitally marking an RSA modulus would be to fix the upper bits of the modulus to this tag. Thus anyone who sees the public modulus can tell who generated the modulus and who the generator believes the intended user/owner of the modulus is.

  1. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  2. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc (453.3 KB) More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  3. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  4. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Environmental Management (EM)

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September ...

  5. System and method for authentication

    SciTech Connect (OSTI)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  6. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  7. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  8. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  9. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  10. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  11. Portable RSA encryption-decryption subprogram for protecting proprietary text

    SciTech Connect (OSTI)

    Hanson, R.J.

    1981-09-01

    A virtually portable (FORTRAN) version of the RSA (Rivest, Shamir, Adleman) algorithm for encryption and decryption of proprietary text has been written. This system uses three previously developed software packages. These are an extended precision integer arithmetic package, an error processing package, and machine-sensitive input/output subprograms from the Text Exchange System.

  12. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  13. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  14. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  15. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  16. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  17. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  18. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  19. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...

    Broader source: Energy.gov (indexed) [DOE]

    Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number displayed on the token in the Password field. Click Log on. For more ...

  20. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  1. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  2. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  3. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Environmental Management (EM)

    can inject SQL commands. A remote authenticated user can view files on the target system. ... A remote authenticated user can view files on the target system. Solution: The vendor has ...

  4. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  5. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  6. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  7. AVNG authentication features

    SciTech Connect (OSTI)

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  8. Two-chip implementation of the RSA public-key encryption algorithm

    SciTech Connect (OSTI)

    Rieden, R.F.; Snyder, J.B.; Widman, R.J.; Barnard, W.J.

    1982-01-01

    A system has been developed which employs two identical integrated circuits to perform the encryption algorithm developed by Rivest, Shamir, and Adleman (RSA) on a 336-bit message. The integrated circuit used in the system employs the 3-micron polysilicon gate, radiation-hard, CMOS technology developed at Sandia National Laboratories.

  9. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  10. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  11. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    SciTech Connect (OSTI)

    Kedgley, Angela E.; Jenkyn, Thomas R.

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  12. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  13. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  14. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf CERTIFICATE OF AUTHENTICITY (4.5 MB) More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  15. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  16. /ital Q/-modulation and four-wave mixing effects caused by RSA materials in a laser cavity

    SciTech Connect (OSTI)

    Zhang Tao; Yao Jianquan

    1989-04-01

    By making use of the density-matrix method, we give a unified explanation of /ital Q/-modulation and four-wave mixing effects caused by resonant saturable absorption (RSA) materials in a laser cavity. The underlying physical mechanism of the effects is expressed clearly. The theoretical calculation results agree very well with the experimental data.

  17. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  18. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  19. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  20. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  1. V-231: Cisco Identity Services Engine Discloses Authentication...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system stores the username and password of an authenticated user within hidden ... or clickjacking attack to access the username and password of an authenticated session. ...

  2. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  3. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  4. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  5. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  6. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  7. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  8. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect (OSTI)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  9. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  10. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  11. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  12. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  13. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  14. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  15. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  16. Multi-factor Authentication Update | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multi-factor Authentication Update There is a delay in the purchase of the multi-factor authentication software solution that will cause a lag in the planned implementation. The Laboratory is currently in negotiations to complete the purchase. Once complete, the implementation can begin.

  17. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  18. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  19. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect (OSTI)

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  20. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  1. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  2. Citrix_2FA_Authentication_09.09 | Department of Energy

    Energy Savers [EERE]

    More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 ...

  3. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  4. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  5. E-Labs - Learning with Authentic Data

    SciTech Connect (OSTI)

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  6. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  7. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  8. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect (OSTI)

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  9. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  10. Decreased cell survival and DNA repair capacity after UVC irradiation in association with down-regulation of GRP78/BiP in human RSa cells

    SciTech Connect (OSTI)

    Zhai Ling; Kita, Kazuko . E-mail: kita@faculty.chiba-u.jp; Wano, Chieko; Wu Yuping; Sugaya, Shigeru; Suzuki, Nobuo

    2005-05-01

    In contrast to extensive studies on the roles of molecular chaperones, such as heat shock proteins, there are only a few reports about the roles of GRP78/BiP, an endoplasmic reticulum (ER) stress-induced molecular chaperone, in mammalian cell responses to DNA-damaging stresses. To investigate whether GRP78/BiP is involved in resistance to a DNA-damaging agent, UVC (principally 254 nm in wavelength), we established human cells with down-regulation of GRP78/BiP by transfection of human RSa cells with antisense cDNA for GRP78/BiP. We found that the transfected cells showed higher sensitivity to UVC-induced cell death than control cells transfected with the vector alone. In the antisense-cDNA transfected cells, the removal capacities of the two major types of UVC-damaged DNA (thymine dimers and (6-4) photoproducts) in vivo and DNA synthesis activity of whole cell extracts to repair UVC-irradiated plasmids in vitro were remarkably decreased compared with those in the control cells. Furthermore, the antisense-cDNA transfected cells also showed slightly higher sensitivity to cisplatin-induced cell death than the control cells. Cisplatin-induced DNA damage is primarily repaired by nucleotide excision repair, like UVC-induced DNA damage. The present results suggest that GRP78/BiP plays a protective role against UVC-induced cell death possibly via nucleotide excision repair, at least in the human RSa cells tested.

  11. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  12. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  13. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  14. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5

  15. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  16. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  17. Adaptive Thresholds

    Energy Science and Technology Software Center (OSTI)

    2014-08-26

    ADAPT is a topological analysis code that allow to compute local threshold, in particular relevance based thresholds for features defined in scalar fields. The initial target application is vortex detection but the software is more generally applicable to all threshold based feature definitions.

  18. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  19. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  20. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  1. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Environmental Management (EM)

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  2. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  3. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  4. Adaptive sampler

    DOE Patents [OSTI]

    Watson, Bobby L.; Aeby, Ian

    1982-01-01

    An adaptive data compression device for compressing data having variable frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

  5. Adaptive sampler

    DOE Patents [OSTI]

    Watson, B.L.; Aeby, I.

    1980-08-26

    An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

  6. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  7. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  8. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  9. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  10. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the ...

  11. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  12. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  13. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  14. Adapting to Survive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Adapting to Survive Lesson on how climate and environment affect people in Alaska. Grade: ... of the land and the ways in which people adapted in that area. 3. To increase the ...

  15. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  16. Adaptive Energy Grid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control of a Flexible, Adaptive Energy Grid "%"&%'&"&()*+%,-.-"(&*"0.-"+.-1&.,2-"+2&01&"%"&3.-,.-"+%.4&"&5.67822& 9"-+%&3.(,"14&:.-&+82&;%+2&+"+2'&<2,"-+(2+&.:&2-...

  17. Adaptive Sampling Proxy Application

    Energy Science and Technology Software Center (OSTI)

    2012-10-22

    ASPA is an implementation of an adaptive sampling algorithm [1-3], which is used to reduce the computational expense of computer simulations that couple disparate physical scales. The purpose of ASPA is to encapsulate the algorithms required for adaptive sampling independently from any specific application, so that alternative algorithms and programming models for exascale computers can be investigated more easily.

  18. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  19. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  20. Climate Change Adaptation Planning

    Broader source: Energy.gov [DOE]

    This course provides an introduction to planning for climate change impacts, with examples of tribes that have been going through the adaptation planning process. The course is intended for tribal...

  1. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  2. Leak test adapter for containers

    DOE Patents [OSTI]

    Hallett, Brian H.; Hartley, Michael S.

    1996-01-01

    An adapter is provided for facilitating the charging of containers and leak testing penetration areas. The adapter comprises an adapter body and stem which are secured to the container's penetration areas. The container is then pressurized with a tracer gas. Manipulating the adapter stem installs a penetration plug allowing the adapter to be removed and the penetration to be leak tested with a mass spectrometer. Additionally, a method is provided for using the adapter.

  3. Verification of Adaptive Systems

    SciTech Connect (OSTI)

    Pullum, Laura L; Cui, Xiaohui; Vassev, Emil; Hinchey, Mike; Rouff, Christopher; Buskens, Richard

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  4. Telescope Adaptive Optics Code

    Energy Science and Technology Software Center (OSTI)

    2005-07-28

    The Telescope AO Code has general adaptive optics capabilities plus specialized models for three telescopes with either adaptive optics or active optics systems. It has the capability to generate either single-layer or distributed Kolmogorov turbulence phase screens using the FFT. Missing low order spatial frequencies are added using the Karhunen-Loeve expansion. The phase structure curve is extremely dose to the theoreUcal. Secondly, it has the capability to simulate an adaptive optics control systems. The defaultmore » parameters are those of the Keck II adaptive optics system. Thirdly, it has a general wave optics capability to model the science camera halo due to scintillation from atmospheric turbulence and the telescope optics. Although this capability was implemented for the Gemini telescopes, the only default parameter specific to the Gemini telescopes is the primary mirror diameter. Finally, it has a model for the LSST active optics alignment strategy. This last model is highly specific to the LSST« less

  5. Adaptive sequential controller

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A.; Xing, Jian; Butler, Nicholas G.; Rodriguez, Alonso

    1994-01-01

    An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

  6. Adaptive control for accelerators

    DOE Patents [OSTI]

    Eaton, Lawrie E.; Jachim, Stephen P.; Natter, Eckard F.

    1991-01-01

    An adaptive feedforward control loop is provided to stabilize accelerator beam loading of the radio frequency field in an accelerator cavity during successive pulses of the beam into the cavity. A digital signal processor enables an adaptive algorithm to generate a feedforward error correcting signal functionally determined by the feedback error obtained by a beam pulse loading the cavity after the previous correcting signal was applied to the cavity. Each cavity feedforward correcting signal is successively stored in the digital processor and modified by the feedback error resulting from its application to generate the next feedforward error correcting signal. A feedforward error correcting signal is generated by the digital processor in advance of the beam pulse to enable a composite correcting signal and the beam pulse to arrive concurrently at the cavity.

  7. Using regulations.gov to find dockets and documents

    Office of Environmental Management (EM)

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc of Energy

    Using Weather Data to Improve Capacity of Existing Power Lines Using Weather Data to Improve

  8. Climate Change Adaptation | Department of Energy

    Energy Savers [EERE]

    Climate Change Adaptation Climate Change Adaptation DOE is adapting to climate change by applying a risk-based resiliency approach to identify and minimize climate-related...

  9. CLAMR (Compute Language Adaptive Mesh Refinement)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLAMR (Compute Language Adaptive Mesh Refinement) CLAMR (Compute Language Adaptive Mesh Refinement) CLAMR (Compute Language Adaptive Mesh Refinement) is being developed as a DOE...

  10. Climate Adaptation for Transportation | Open Energy Information

    Open Energy Info (EERE)

    Climate Adaptation for Transportation (Redirected from 03 Climate Adaptation for Transportation) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: 03 Climate Adaptation...

  11. AfricaAdapt | Open Energy Information

    Open Energy Info (EERE)

    Africa Adapt AgencyCompany Organization AfricaAdapt Resource Type Training materials, Lessons learnedbest practices Website http:www.africa-adapt.netAA UN Region Eastern...

  12. Toward reflexive climate adaptation research

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Preston, Benjamin L.; Rickards, Lauren; Fünfgeld, Hartmut; Keenan, Rodney J.

    2015-06-22

    Climate adaptation research is expanding very quickly within an increasingly reflexive society where the relationship between academia and other social institutions is in a state of flux. Tensions exist between the two dominant research orientations of research about and research for adaptation. In particular, the research community is challenged to develop processes for successfully executing transdisciplinary research for adaptation when academic institutions and researchers are largely structured around traditional, disciplinary expertise and funding models. One tool for helping to manage this tension is a third, more reflexive, orientation toward adaptation research that is emerging in the literature. Finally, this newmore » ‘research on adaptation research’ promises to help enhance understanding of the research enterprise itself and how it can become more adaptive.« less

  13. RAZAR Adaptive Zoom Rifle Scope

    SciTech Connect (OSTI)

    Bagwell, Brett; Baker, Mike; Heinsohn, John; Squire, Michael

    2014-10-22

    RAZAR adaptive zoom is a revolutionary method whereby true optical zoom is accomplished by cooperatively varying the focal lengths of multiple active optical elements in the system.

  14. Adaptive capacity and its assessment

    SciTech Connect (OSTI)

    Engle, Nathan L.

    2011-04-20

    This paper reviews the concept of adaptive capacity and various approaches to assessing it, particularly with respect to climate variability and change. I find that adaptive capacity is a relatively under-researched topic within the sustainability science and global change communities, particularly since it is uniquely positioned to improve linkages between vulnerability and resilience research. I identify opportunities for advancing the measurement and characterization of adaptive capacity by combining insights from both vulnerability and resilience frameworks, and I suggest several assessment approaches for possible future development that draw from both frameworks and focus on analyzing the governance, institutions, and management that have helped foster adaptive capacity in light of recent climatic events.

  15. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  16. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  17. Adaptive multiconfigurational wave functions

    SciTech Connect (OSTI)

    Evangelista, Francesco A.

    2014-03-28

    A method is suggested to build simple multiconfigurational wave functions specified uniquely by an energy cutoff ?. These are constructed from a model space containing determinants with energy relative to that of the most stable determinant no greater than ?. The resulting ?-CI wave function is adaptive, being able to represent both single-reference and multireference electronic states. We also consider a more compact wave function parameterization (?+SD-CI), which is based on a small ?-CI reference and adds a selection of all the singly and doubly excited determinants generated from it. We report two heuristic algorithms to build ?-CI wave functions. The first is based on an approximate prescreening of the full configuration interaction space, while the second performs a breadth-first search coupled with pruning. The ?-CI and ?+SD-CI approaches are used to compute the dissociation curve of N{sub 2} and the potential energy curves for the first three singlet states of C{sub 2}. Special attention is paid to the issue of energy discontinuities caused by changes in the size of the ?-CI wave function along the potential energy curve. This problem is shown to be solvable by smoothing the matrix elements of the Hamiltonian. Our last example, involving the Cu{sub 2}O{sub 2}{sup 2+} core, illustrates an alternative use of the ?-CI method: as a tool to both estimate the multireference character of a wave function and to create a compact model space to be used in subsequent high-level multireference coupled cluster computations.

  18. 2014 DOE Climate Change Adaptation Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 U.S. Department of Energy June 2014 DOE Climate Change Adaptation Plan Table of Contents Climate Change Adaptation Plan ................................................................................................................................2 Impetus for Action ..................................................................................................................................................2 The DOE Mission and Climate Change Adaptation

  19. COMMENTARY:Limits to adaptation

    SciTech Connect (OSTI)

    Preston, Benjamin L

    2013-01-01

    An actor-centered, risk-based approach to defining limits to social adaptation provides a useful analytic framing for identifying and anticipating these limits and informing debates over society s responses to climate change.

  20. ACCO Climate Change Adaptation Workshop

    Broader source: Energy.gov [DOE]

    The Association of Climate Change Officers (ACCO) is hosting a two-day training workshop titled, "Climate Change Adaptation" to cover climate science, impacts from severe climate events, tools to screen and access vulnerabilities, and strategies to lead organizational change.

  1. Adaptive Liquid Crystal Windows

    SciTech Connect (OSTI)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of power

  2. Adaptive Materials Inc | Open Energy Information

    Open Energy Info (EERE)

    Michigan Zip: MI 48108 Product: Adaptive Materials Inc (AMI) is a developer of portable fuel cell technology. References: Adaptive Materials Inc1 This article is a stub. You...

  3. Mainstreaming Climate Change Adaptation into Development Planning...

    Open Energy Info (EERE)

    Climate Change Adaptation into Development Planning: A Guide for Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation...

  4. Climate Adaptation for Transportation | Open Energy Information

    Open Energy Info (EERE)

    Climate Adaptation for Transportation Jump to: navigation, search Tool Summary LAUNCH TOOL Name: 03 Climate Adaptation for Transportation AgencyCompany Organization: AASHTO...

  5. WeADAPT | Open Energy Information

    Open Energy Info (EERE)

    weADAPT Sector Energy, Land, Water, Climate Resource Type Training materials, Lessons learnedbest practices Website http:www.weadapt.org References weADAPT1...

  6. Training Adaptive Decision-Making.

    SciTech Connect (OSTI)

    Abbott, Robert G.; Forsythe, James C.

    2014-10-01

    Adaptive Thinking has been defined here as the capacity to recognize when a course of action that may have previously been effective is no longer effective and there is need to adjust strategy. Research was undertaken with human test subjects to identify the factors that contribute to adaptive thinking. It was discovered that those most effective in settings that call for adaptive thinking tend to possess a superior capacity to quickly and effectively generate possible courses of action, as measured using the Category Generation test. Software developed for this research has been applied to develop capabilities enabling analysts to identify crucial factors that are predictive of outcomes in fore-on-force simulation exercises.

  7. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  8. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding

    2007-06-05

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  9. Hydropower, adaptive management, and biodiversity

    SciTech Connect (OSTI)

    Wieringa, M.J.; Morton, A.G.

    1996-11-01

    Adaptive management is a policy framework within which an iterative process of decision making is allowed based on the observed responses to and effectiveness of previous decisions. The use of adaptive management allows science-based research and monitoring of natural resource and ecological community responses, in conjunction with societal values and goals, to guide decisions concerning man`s activities. The adaptive management process has been proposed for application to hydropower operations at Glen Canyon Dam on the Colorado River, a situation that requires complex balancing of natural resources requirements and competing human uses. This example is representative of the general increase in public interest in the operation of hydropower facilities and possible effects on downstream natural resources and of the growing conflicts between uses and users of river-based resources. This paper describes the adaptive management process, using the Glen Canyon Dam example, and discusses ways to make the process work effectively in managing downstream natural resources and biodiversity. 10 refs., 2 figs.

  10. Adaptive protection algorithm and system

    DOE Patents [OSTI]

    Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  11. African Adaptation Programme | Open Energy Information

    Open Energy Info (EERE)

    AgencyCompany Organization United Nations Development Programme, Government of Japan Topics Adaptation, Finance, Implementation, Policiesdeployment programs Website...

  12. 2014 DOE Climate Change Adaptation Plan | Department of Energy

    Office of Environmental Management (EM)

    Climate Change Adaptation Plan 2014 DOE Climate Change Adaptation Plan Document presents the U.S. Department of Energy (DOE) 2014 plan for adapting to climate change....

  13. Regional Climate Change Adaptation Platform for Asia | Open Energy...

    Open Energy Info (EERE)

    Climate Change Adaptation Platform for Asia Jump to: navigation, search Logo: Regional Climate Change Adaptation Platform for Asia Name Regional Climate Change Adaptation Platform...

  14. Adaptive capture of expert behavior

    SciTech Connect (OSTI)

    Jones, R.D.; Barrett, C.L.; Hand, U.; Gordon, R.C.

    1994-08-01

    The authors smoothed and captured a set of expert rules with adaptive networks. The motivation for doing this is discussed. (1) Smoothing leads to stabler control actions. (2) For some sets of rules, the evaluation of the rules can be sped up. This is important in large-scale simulations where many intelligent elements are present. (3) Variability of the intelligent elements can be achieved by adjusting the weights in an adaptive network. (4) After capture has occurred, the weights can be adjusted based on performance criteria. The authors thus have the capability of learning a new set of rules that lead to better performance. The set of rules the authors chose to capture were based on a set of threat determining rules for tank commanders. The approach in this paper: (1) They smoothed the rules. The rule set was converted into a simple set of arithmetic statements. Continuous, non-binary inputs, are now permitted. (2) An operational measure of capturability was developed. (3) They chose four candidate networks for the rule set capture: (a) multi-linear network, (b) adaptive partial least squares, (c) connectionist normalized local spline (CNLS) network, and (d) CNLS net with a PLS preprocessor. These networks were able to capture the rule set to within a few percent. For the simple tank rule set, the multi-linear network performed the best. When the rules were modified to include more nonlinear behavior, CNLS net performed better than the other three nets which made linear assumptions. (4) The networks were tested for robustness to input noise. Noise levels of plus or minus 10% had no real effect on the network performance. Noise levels in the plus or minus 30% range degraded performance by a factor of two. Some performance enhancement occurred when the networks were trained with noisy data. (5) The scaling of the evaluation time was calculated. (6) Human variation can be mimicked in all the networks by perturbing the weights.

  15. NEPA, monitoring, and adaptive management

    SciTech Connect (OSTI)

    Carpenter, R.A.

    1995-12-01

    Getting concerns about the environment on the decision making table before Federal actions are taken is the recognized business of the National Environmental Policy Act (NEPA), but keeping them there is just as important. Human interventions into natural systems seldom proceed as originally planned. Scientific uncertainties prevent environmental impacts from being reliably or precisely predicted. Thus, the style of management must provide for monitoring to guide mid-course corrections adapting to inevitable surprises. the one time, pre-approval EA/EIS procedure remains essential but is not sufficient to assure the goal of NEPA {open_quotes}to...maintain conditions under which man and nature can exist in productive harmony...{close_quotes} (NEPA, 1969). This paper explores the extent to which NEPA encourages continuous assessment for timely feedback to managers, and the practical difficulties involved in doing so.

  16. Downhole tool adapted for telemetry

    DOE Patents [OSTI]

    Hall, David R.; Fox, Joe

    2010-12-14

    A cycleable downhole tool such as a Jar, a hydraulic hammer, and a shock absorber adapted for telemetry. This invention applies to other tools where the active components of the tool are displaced when the tool is rotationally or translationally cycled. The invention consists of inductive or contact transmission rings that are connected by an extensible conductor. The extensible conductor permits the transmission of the signal before, after, and during the cycling of the tool. The signal may be continuous or intermittent during cycling. The invention also applies to downhole tools that do not cycle, but in operation are under such stress that an extensible conductor is beneficial. The extensible conductor may also consist of an extensible portion and a fixed portion. The extensible conductor also features clamps that maintain the conductor under stresses greater than that seen by the tool, and seals that are capable of protecting against downhole pressure and contamination.

  17. Electricity Market Complex Adaptive System

    Energy Science and Technology Software Center (OSTI)

    2004-10-14

    EMCAS is a model developed for the simulation and analysis of electricity markets. As power markets are relatively new and still continue to evolve, there is a growing need for advanced modeling approaches that simulate the behavior of electricity markets over time and how market participants may act and react to the changing economic, financial, and regulatory environments in which they operate. A new and rather promising approach applied in the EMCAS software is tomore » model the electricity market as a complex adaptive system using an agent-based modeling and simulation scheme. With its unique combination of various novel approaches, the Agent Based Modeling System (ABMS) provides the ability to capture and investigate the complex interactions between the physical infrastructures (generation, transmission, and distribution) and the economic behavior of market participants that are a trademark of the newly emerging markets.« less

  18. Cubit Adaptive Meshing Algorithm Library

    Energy Science and Technology Software Center (OSTI)

    2004-09-01

    CAMAL (Cubit adaptive meshing algorithm library) is a software component library for mesh generation. CAMAL 2.0 includes components for triangle, quad and tetrahedral meshing. A simple Application Programmers Interface (API) takes a discrete boundary definition and CAMAL computes a quality interior unstructured grid. The triangle and quad algorithms may also import a geometric definition of a surface on which to define the grid. CAMAL’s triangle meshing uses a 3D space advancing front method, the quadmore » meshing algorithm is based upon Sandia’s patented paving algorithm and the tetrahedral meshing algorithm employs the GHS3D-Tetmesh component developed by INRIA, France.« less

  19. Adaptive Intrusion Data System (AIDS)

    SciTech Connect (OSTI)

    Corlis, N. E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems.

  20. Adaptive Street Lighting Controls | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources » Webcasts » Adaptive Street Lighting Controls Adaptive Street Lighting Controls This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of San Jose, CA, and Kelly Cunningham of the California Lighting Technology Center at UC Davis discussed their experiences as early adopters of these smart street lighting systems. In Part II, presenters

  1. Climate Change Adaptation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change Adaptation Climate Change Adaptation Mission The Climate Change Adaption team affirms the overall DOE commitment to plan for and manage the short- and long-term effects of climate change, as deemed appropriate for LM operations and approved by LM, as defined in: Executive Order (EO) 13693, Planning for Federal Sustainability in the Next Decade, and EO 13653, Preparing the United States for the Impacts of Climate Change The team endorses the President's Climate Action Plan,

  2. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the...

  3. Climate Change Adaptation Technical Fact Sheet: Contaminated...

    Office of Environmental Management (EM)

    of potential climate change vulnerabilities and (2) presenting possible adaptation measures that may be considered to increase a remedy's resilience to climate change impacts. ...

  4. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the...

  5. Results of adaptive feedforward on GTA

    SciTech Connect (OSTI)

    Ziomek, C.D.; Denney, P.M.; Regan, A.H.; Lynch, M.T.; Jachim, S.P.; Eaton, L.E.; Natter, E.F.

    1993-06-01

    This paper presents the results of the adaptive feedforward system in use on the Ground Test Accelerator (GTA). The adaptive feedforward system was shown to correct repetitive, high-frequency errors in the amplitude and phase of the RF field of the pulsed accelerator. The adaptive feedforward system was designed as an augmentation to the RF field feedback control system and was able to extend the closed-loop bandwidth and disturbance rejection by a factor of ten. Within a second implementation, the adaptive feedforward hardware was implemented in place of the feedback control system and was shown to negate both beam transients and phase droop in the klystron amplifier.

  6. Results of adaptive feedforward on GTA

    SciTech Connect (OSTI)

    Ziomek, C.D.; Denney, P.M.; Regan, A.H.; Lynch, M.T.; Jachim, S.P.; Eaton, L.E.; Natter, E.F.

    1993-01-01

    This paper presents the results of the adaptive feedforward system in use on the Ground Test Accelerator (GTA). The adaptive feedforward system was shown to correct repetitive, high-frequency errors in the amplitude and phase of the RF field of the pulsed accelerator. The adaptive feedforward system was designed as an augmentation to the RF field feedback control system and was able to extend the closed-loop bandwidth and disturbance rejection by a factor of ten. Within a second implementation, the adaptive feedforward hardware was implemented in place of the feedback control system and was shown to negate both beam transients and phase droop in the klystron amplifier.

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  8. Training for Climate Adaptation in Conservation

    Broader source: Energy.gov [DOE]

    The Wildlife Conservation Society and the Northern Institute of Applied Climate Science are hosting this two-day training for climate adaptation.

  9. Climate adaptation planning in practice: an evaluation of adaptation plans from three developed nations

    SciTech Connect (OSTI)

    Preston, Benjamin L; Westaway, Richard M.; Yuen, Emma J.

    2011-04-01

    Formal planning for climate change adaptation is emerging rapidly at a range of geo-political scales. This first generation of adaptation plans provides useful information regarding how institutions are framing the issue of adaptation and the range of processes that are recognized as being part of an adaptation response. To better understand adaptation planning among developed nations, a set of 57 adaptation plans from Australia, the United Kingdom and the United States was evaluated against a suite of 19 planning processes identified from existing guidance instruments for adaptation planning. Total scores among evaluated plans ranged from 16% of the maximum possible score to 61%, with an average of 37%. These results suggest adaptation plans are largely under-developed. Critical weaknesses in adaptation planning are related to limited consideration for non-climatic factors as well as neglect for issues of adaptive capacity including entitlements to various forms of capital needed for effective adaptation. Such gaps in planning suggest there are opportunities for institutions to make better use of existing guidance for adaptation planning and the need to consider the broader governance context in which adaptation will occur. In addition, the adaptation options prescribed by adaptation plans reflect a preferential bias toward low-risk capacity-building (72% of identified options) over the delivery of specific actions to reduce vulnerability. To the extent these findings are representative of the state of developed nation adaptation planning, there appear to be significant deficiencies in climate change preparedness, even among those nations often assumed to have the greatest adaptive capacity.

  10. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  11. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Suggests Role as Molecular Adapter Print Wednesday, 24 June 2009 00:00 To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known...

  12. Scalable Adaptive Multilevel Solvers for Multiphysics Problems

    SciTech Connect (OSTI)

    Xu, Jinchao

    2014-12-01

    In this project, we investigated adaptive, parallel, and multilevel methods for numerical modeling of various real-world applications, including Magnetohydrodynamics (MHD), complex fluids, Electromagnetism, Navier-Stokes equations, and reservoir simulation. First, we have designed improved mathematical models and numerical discretizaitons for viscoelastic fluids and MHD. Second, we have derived new a posteriori error estimators and extended the applicability of adaptivity to various problems. Third, we have developed multilevel solvers for solving scalar partial differential equations (PDEs) as well as coupled systems of PDEs, especially on unstructured grids. Moreover, we have integrated the study between adaptive method and multilevel methods, and made significant efforts and advances in adaptive multilevel methods of the multi-physics problems.

  13. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Protein Structure Suggests Role as Molecular Adapter Print Wednesday, 24 June 2009 00:00 To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins

  14. An adaptive approach to resource management

    SciTech Connect (OSTI)

    Lessard, G.

    1995-12-01

    A formal process of adaptive management will be required to maximize the benefits of any option for land and natural resource management and to achieve the long-term objective of ecosystem management. The process itself is straightforward and simple: new information is identified, evaluated, and a determination is made whether to adjust strategy or goals. Adaptive management is a continuing process of action-based planning, monitoring, researching and adjusting with the objective of improving the implementation and achieving the desired goals and outcomes. In this process goals and objectives are clearly stated, an initial hypothesis of ecosystem behavior is described, and monitoring is conducted to provide rapid feedback for redirection of management experiments. While the concept of adaptive management is relatively straightforward, applying it to complex management strategies requires answers to several critical questions. What new information should compel an adjustment to the management strategy? What threshold should trigger this adjustment? Who decides when and how to make adjustments? What are the definitions and thresholds of acceptable results? Adaptive ecosystem management depends on a continually evolving understanding of cause-and-effect relationships in both biological and social systems. The key features in an adaptive approach are: (1) An experimental design for implementation; (2) An explicit description of the system; (3) Well defined goals and objectives (4) Identification of critical uncertainties; (5) A monitoring and evaluation program; (6) An aggressive approach to learning; and (7) An adaptable structure.

  15. Instructions | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  16. Remarks on Grid Generation Equidistribution and Solution-Adaptation...

    Office of Scientific and Technical Information (OSTI)

    Remarks on Grid Generation Equidistribution and Solution-Adaptation. Citation Details In-Document Search Title: Remarks on Grid Generation Equidistribution and Solution-Adaptation. ...

  17. Adaptive Optics for Astronomy and Retinal Imaging Applications...

    Office of Scientific and Technical Information (OSTI)

    Adaptive Optics for Astronomy and Retinal Imaging Applications (Adaptive Optics and Laser Guide Stars for Astronomy and Medical Applications) Citation Details In-Document Search ...

  18. Electricity Market Complex Adaptive System | Open Energy Information

    Open Energy Info (EERE)

    Complex Adaptive System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Electricity Market Complex Adaptive System AgencyCompany Organization: Argonne National...

  19. Kenya-Strengthening Adaptation and Resilience to Climate Change...

    Open Energy Info (EERE)

    Kenya-Strengthening Adaptation and Resilience to Climate Change(StARCK) (Redirected from Strengthening Adaptation and Resilience to Climate Change in Kenya (StARCK)) Jump to:...

  20. Anisoplanatism in adaptive optics systems due to pupil aberrations...

    Office of Scientific and Technical Information (OSTI)

    Anisoplanatism in adaptive optics systems due to pupil aberrations Citation Details In-Document Search Title: Anisoplanatism in adaptive optics systems due to pupil aberrations You ...

  1. Optical Design for Extremely Large Telescope Adaptive Optics...

    Office of Scientific and Technical Information (OSTI)

    Large Telescope Adaptive Optics Systems Citation Details In-Document Search Title: Optical Design for Extremely Large Telescope Adaptive Optics Systems You are accessing a ...

  2. Time Adaptive Conditional Kernel Density Estimation for Wind...

    Office of Scientific and Technical Information (OSTI)

    Time Adaptive Conditional Kernel Density Estimation for Wind Power Forecasting Citation Details In-Document Search Title: Time Adaptive Conditional Kernel Density Estimation for ...

  3. Asia-Pacific Regional Climate Change Adaptation Assessment |...

    Open Energy Info (EERE)

    Pacific Regional Climate Change Adaptation Assessment Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Asia-Pacific Regional Climate Change Adaptation Assessment Agency...

  4. The Cost to Developing Countries of Adapting to Climate Change...

    Open Energy Info (EERE)

    Cost to Developing Countries of Adapting to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Cost to Developing Countries of Adapting to Climate Change...

  5. Burundi-National Adaptation Plan of Action to Climate Change...

    Open Energy Info (EERE)

    National Adaptation Plan of Action to Climate Change Jump to: navigation, search Name Burundi-National Adaptation Plan of Action to Climate Change AgencyCompany Organization...

  6. Ethiopia-Climate Change National Adaptation Programme of Action...

    Open Energy Info (EERE)

    Climate Change National Adaptation Programme of Action Jump to: navigation, search Name Ethiopia-Climate Change National Adaptation Programme of Action AgencyCompany Organization...

  7. A National Strategy for Adaptation to Climate Change | Open Energy...

    Open Energy Info (EERE)

    National Strategy for Adaptation to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A National Strategy for Adaptation to Climate Change AgencyCompany...

  8. Impacts of Climate Change on Agriculture and Adaptation in Vietnam...

    Open Energy Info (EERE)

    Climate Change on Agriculture and Adaptation in Vietnam Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Impacts of Climate Change on Agriculture and Adaptation in...

  9. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  10. OECD-Private Sector Engagement in Adaptation to Climate Change...

    Open Energy Info (EERE)

    Private Sector Engagement in Adaptation to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: OECD-Private Sector Engagement in Adaptation to Climate Change...

  11. Adaptation to Climate Variability and Change: A Guidance Manual...

    Open Energy Info (EERE)

    Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate...

  12. Rwanda-National Adaptation Programs of Action to Climate Change...

    Open Energy Info (EERE)

    National Adaptation Programs of Action to Climate Change Jump to: navigation, search Name Rwanda-National Adaptation Programs of Action to Climate Change AgencyCompany...

  13. GIZ Sourcebook Module 5f: Adapting Urban Transport to Climate...

    Open Energy Info (EERE)

    f: Adapting Urban Transport to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GIZ Sourcebook Module 5f: Adapting Urban Transport to Climate Change...

  14. Anisoplanatism in adaptive optics systems due to pupil aberrations...

    Office of Scientific and Technical Information (OSTI)

    Conference: Anisoplanatism in adaptive optics systems due to pupil aberrations Citation Details In-Document Search Title: Anisoplanatism in adaptive optics systems due to pupil ...

  15. Climate Change and the Los Alamos National Laboratory: The Adaptation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and the Los Alamos National Laboratory: The Adaptation Challenge Climate Change and the Los Alamos National Laboratory: The Adaptation Challenge The Los Alamos National Laboratory ...

  16. Petascale, Adaptive CFD (ALCF ESP Technical Report): ALCF-2 Early...

    Office of Scientific and Technical Information (OSTI)

    Petascale, Adaptive CFD (ALCF ESP Technical Report): ALCF-2 Early Science Program Technical Report Citation Details In-Document Search Title: Petascale, Adaptive CFD (ALCF ESP ...

  17. Annex IV Environmental Webinar: Adaptive Management in the Marine...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Annex IV Environmental Webinar: Adaptive Management in the Marine Renewable Energy Industry Annex IV Environmental Webinar: Adaptive Management in the Marine Renewable Energy ...

  18. Online adaptation and verification of VMAT

    SciTech Connect (OSTI)

    Crijns, Wouter; Defraene, Gilles; Depuydt, Tom; Haustermans, Karin; Van Herck, Hans; Maes, Frederik; Van den Heuvel, Frank

    2015-07-15

    Purpose: This work presents a method for fast volumetric modulated arc therapy (VMAT) adaptation in response to interfraction anatomical variations. Additionally, plan parameters extracted from the adapted plans are used to verify the quality of these plans. The methods were tested as a prostate class solution and compared to replanning and to their current clinical practice. Methods: The proposed VMAT adaptation is an extension of their previous intensity modulated radiotherapy (IMRT) adaptation. It follows a direct (forward) planning approach: the multileaf collimator (MLC) apertures are corrected in the beam’s eye view (BEV) and the monitor units (MUs) are corrected using point dose calculations. All MLC and MU corrections are driven by the positions of four fiducial points only, without need for a full contour set. Quality assurance (QA) of the adapted plans is performed using plan parameters that can be calculated online and that have a relation to the delivered dose or the plan quality. Five potential parameters are studied for this purpose: the number of MU, the equivalent field size (EqFS), the modulation complexity score (MCS), and the components of the MCS: the aperture area variability (AAV) and the leaf sequence variability (LSV). The full adaptation and its separate steps were evaluated in simulation experiments involving a prostate phantom subjected to various interfraction transformations. The efficacy of the current VMAT adaptation was scored by target mean dose (CTV{sub mean}), conformity (CI{sub 95%}), tumor control probability (TCP), and normal tissue complication probability (NTCP). The impact of the adaptation on the plan parameters (QA) was assessed by comparison with prediction intervals (PI) derived from a statistical model of the typical variation of these parameters in a population of VMAT prostate plans (n = 63). These prediction intervals are the adaptation equivalent of the tolerance tables for couch shifts in the current clinical

  19. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S.; Lobitz, Donald W.

    2003-01-01

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  20. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S.; Lobitz, Donald W.

    2003-01-07

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  1. The Adaptive Multi-scale Simulation Infrastructure

    SciTech Connect (OSTI)

    Tobin, William R.

    2015-09-01

    The Adaptive Multi-scale Simulation Infrastructure (AMSI) is a set of libraries and tools developed to support the development, implementation, and execution of general multimodel simulations. Using a minimal set of simulation meta-data AMSI allows for minimally intrusive work to adapt existent single-scale simulations for use in multi-scale simulations. Support for dynamic runtime operations such as single- and multi-scale adaptive properties is a key focus of AMSI. Particular focus has been spent on the development on scale-sensitive load balancing operations to allow single-scale simulations incorporated into a multi-scale simulation using AMSI to use standard load-balancing operations without affecting the integrity of the overall multi-scale simulation.

  2. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  3. Adaptive Optics Applications in Vision Science

    SciTech Connect (OSTI)

    Olivier, S S

    2003-03-17

    Adaptive optics can be used to correct the aberrations in the human eye caused by imperfections in the cornea and the lens and thereby, improve image quality both looking into and out of the eye. Under the auspices of the NSF Center for Adaptive Optics and the DOE Biomedical Engineering Program, Lawrence Livermore National Laboratory has joined together with leading vision science researchers around the country to develop and test new ophthalmic imaging systems using novel wavefront corrector technologies. Results of preliminary comparative evaluations of these technologies in initial system tests show promise for future clinical utility.

  4. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  5. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  6. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  7. Beyond Adapting to Climate Change: Embedding Adaptation in Responses to Multiple Threats and Stresses

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Kates, Dr. Robert W.

    2010-01-01

    Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental history of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.

  8. Adaptive control system for gas producing wells

    SciTech Connect (OSTI)

    Fedor, Pashchenko; Sergey, Gulyaev; Alexander, Pashchenko

    2015-03-10

    Optimal adaptive automatic control system for gas producing wells cluster is proposed intended for solving the problem of stabilization of the output gas pressure in the cluster at conditions of changing gas flow rate and changing parameters of the wells themselves, providing the maximum high resource of hardware elements of automation.

  9. Adaptive, full-spectrum solar energy system

    DOE Patents [OSTI]

    Muhs, Jeffrey D.; Earl, Dennis D.

    2003-08-05

    An adaptive full spectrum solar energy system having at least one hybrid solar concentrator, at least one hybrid luminaire, at least one hybrid photobioreactor, and a light distribution system operably connected to each hybrid solar concentrator, each hybrid luminaire, and each hybrid photobioreactor. A lighting control system operates each component.

  10. Climate adaptation heuristics and the science/policy divide

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Preston, Benjamin L.; Mustelin, Johanna; Maloney, Megan C.

    2013-09-05

    The adaptation science enterprise has expanded rapidly in recent years, presumably in response to growth in demand for knowledge that can facilitate adaptation policy and practice. However, evidence suggests such investments in adaptation science have not necessarily translated into adaptation implementation. One potential constraint on adaptation may be the underlying heuristics that are used as the foundation for both adaptation research and practice. In this paper, we explore the adaptation academic literature with the objective of identifying adaptation heuristics, assessing the extent to which they have become entrenched within the adaptation discourse, and discussing potential weaknesses in their framing thatmore » could undermine adaptation efforts. This investigation is supported by a multi-method analysis that includes both a quantitative content analysis of the adaptation literature that evidences the use of adaptation heuristics and a qualitative analysis of the implications of such heuristics for enhancing or hindering the implementation of adaptation. Results demonstrate that a number of heuristic devices are commonly used in both the peer-reviewed adaptation literature as well as within grey literature designed to inform adaptation practitioners. Furthermore, the apparent lack of critical reflection upon the robustness of these heuristics for diverse contexts may contribute to potential cognitive bias with respect to the framing of adaptation by both researchers and practitioners. Finally, we discuss this phenomenon by drawing upon heuristic-analytic theory, which has explanatory utility in understanding both the origins of such heuristics as well as the measures that can be pursued toward the co-generation of more robust approaches to adaptation problem-solving.« less

  11. Climate adaptation heuristics and the science/policy divide

    SciTech Connect (OSTI)

    Preston, Benjamin L.; Mustelin, Johanna; Maloney, Megan C.

    2013-09-05

    The adaptation science enterprise has expanded rapidly in recent years, presumably in response to growth in demand for knowledge that can facilitate adaptation policy and practice. However, evidence suggests such investments in adaptation science have not necessarily translated into adaptation implementation. One potential constraint on adaptation may be the underlying heuristics that are used as the foundation for both adaptation research and practice. In this paper, we explore the adaptation academic literature with the objective of identifying adaptation heuristics, assessing the extent to which they have become entrenched within the adaptation discourse, and discussing potential weaknesses in their framing that could undermine adaptation efforts. This investigation is supported by a multi-method analysis that includes both a quantitative content analysis of the adaptation literature that evidences the use of adaptation heuristics and a qualitative analysis of the implications of such heuristics for enhancing or hindering the implementation of adaptation. Results demonstrate that a number of heuristic devices are commonly used in both the peer-reviewed adaptation literature as well as within grey literature designed to inform adaptation practitioners. Furthermore, the apparent lack of critical reflection upon the robustness of these heuristics for diverse contexts may contribute to potential cognitive bias with respect to the framing of adaptation by both researchers and practitioners. Finally, we discuss this phenomenon by drawing upon heuristic-analytic theory, which has explanatory utility in understanding both the origins of such heuristics as well as the measures that can be pursued toward the co-generation of more robust approaches to adaptation problem-solving.

  12. Adaptive method for electron bunch profile prediction

    SciTech Connect (OSTI)

    Scheinker, Alexander; Gessner, Spencer

    2015-10-01

    We report on an experiment performed at the Facility for Advanced Accelerator Experimental Tests (FACET) at SLAC National Accelerator Laboratory, in which a new adaptive control algorithm, one with known, bounded update rates, despite operating on analytically unknown cost functions, was utilized in order to provide quasi-real-time bunch property estimates of the electron beam. Multiple parameters, such as arbitrary rf phase settings and other time-varying accelerator properties, were simultaneously tuned in order to match a simulated bunch energy spectrum with a measured energy spectrum. The simple adaptive scheme was digitally implemented using matlab and the experimental physics and industrial control system. The main result is a nonintrusive, nondestructive, real-time diagnostic scheme for prediction of bunch profiles, as well as other beam parameters, the precise control of which are important for the plasma wakefield acceleration experiments being explored at FACET. © 2015 authors. Published by the American Physical Society.

  13. Adaptive method for electron bunch profile prediction

    SciTech Connect (OSTI)

    Scheinker, Alexander; Gessner, Spencer

    2015-10-15

    We report on an experiment performed at the Facility for Advanced Accelerator Experimental Tests (FACET) at SLAC National Accelerator Laboratory, in which a new adaptive control algorithm, one with known, bounded update rates, despite operating on analytically unknown cost functions, was utilized in order to provide quasi-real-time bunch property estimates of the electron beam. Multiple parameters, such as arbitrary rf phase settings and other time-varying accelerator properties, were simultaneously tuned in order to match a simulated bunch energy spectrum with a measured energy spectrum. The simple adaptive scheme was digitally implemented using matlab and the experimental physics and industrial control system. Thus, the main result is a nonintrusive, nondestructive, real-time diagnostic scheme for prediction of bunch profiles, as well as other beam parameters, the precise control of which are important for the plasma wakefield acceleration experiments being explored at FACET.

  14. Adapting ethanol fuels to diesel engines

    SciTech Connect (OSTI)

    Not Available

    1981-08-01

    During the 2nd International Alcohol Symposium 1977, Daimler-Benz reported on the advantages and disadvantages of the various methods of using ethanol in originally diesel-operated commercial vehicles, and especially about the first results in the field of adapting the ethanol fuel to the requirements of conventional diesel engines. Investigations to this effect were continued by Daimler-Benz AG, Stuttgart, and Mercedes-Benz of Brasil in coordination with competent Brazilian government departments. The development effort is primarily adapted to Brazilian conditions, since ethanol fuel is intended as a long-term project in this country. This report is presented under headings - auto-ignition; durability tests; remedial measures; the injection systems; ethanol quality.

  15. SU-E-J-153: MRI Based, Daily Adaptive Radiotherapy for Rectal Cancer: Contour Adaptation

    SciTech Connect (OSTI)

    Kleijnen, J; Burbach, M; Verbraeken, T; Weggers, R; Zoetelief, A; Reerink, O; Lagendijk, J; Raaymakers, B; Asselen, B

    2014-06-01

    Purpose: A major hurdle in adaptive radiotherapy is the adaptation of the planning MRI's delineations to the daily anatomy. We therefore investigate the accuracy and time needed for online clinical target volume (CTV) adaptation by radiation therapists (RTT), to be used in MRI-guided adaptive treatments on a MRI-Linac (MRL). Methods: Sixteen patients, diagnosed with early stage rectal cancer, underwent a T2-weighted MRI prior to each fraction of short-course radiotherapy, resulting in 4–5 scans per patient. On these scans, the CTV was delineated according to guidelines by an experienced radiation oncologist (RO) and considered to be the gold standard. For each patient, the first MRI was considered as the planning MRI and matched on bony anatomy to the 3–4 daily MRIs. The planning MRI's CTV delineation was rigidly propagated to the daily MRI scans as a proposal for adaptation. Three RTTs in training started the adaptation of the CTV conform guidelines, after a two hour training lecture and a two patient (n=7) training set. To assess the inter-therapist variation, all three RTTs altered delineations of 3 patients (n=12). One RTT altered the CTV delineations (n=53) of the remaining 11 patients. Time needed for adaptation of the CTV to guidelines was registered.As a measure of agreement, the conformity index (CI) was determined between the RTTs' delineations as a group. Dice similarity coefficients were determined between delineations of the RTT and the RO. Results: We found good agreement between RTTs' and RO's delineations (average Dice=0.91, SD=0.03). Furthermore, the inter-observer agreement between the RTTs was high (average CI=0.94, SD=0.02). Adaptation time reduced from 10:33 min (SD= 3:46) to 2:56 min (SD=1:06) between the first and last ten delineations, respectively. Conclusion: Daily CTV adaptation by RTTs, seems a feasible and safe way to introduce daily, online MRI-based plan adaptation for a MRL.

  16. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this

  17. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this

  18. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this

  19. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this

  20. Adaptive Management in the Marine Renewable Energy Industry Webinar...

    Office of Environmental Management (EM)

    Adaptive Management in the Marine Renewable Energy Industry Webinar Adaptive Management in the Marine Renewable Energy Industry Webinar December 10, 2015 8:30AM to 10:00AM PST As...

  1. Kenya-Strengthening Adaptation and Resilience to Climate Change...

    Open Energy Info (EERE)

    Kenya-Strengthening Adaptation and Resilience to Climate Change(StARCK) Jump to: navigation, search Name Strengthening Adaptation and Resilience to Climate Change in Kenya (StARCK)...

  2. The Importance of Traditional Ecological Knowledge in Adaptation Planning

    Broader source: Energy.gov [DOE]

    The National Adaptation Forum is hosting a webinar to focus on the importance and role of traditional ecological knowledge in adaptation planning at the local, regional, and national level.

  3. BIA Request for Proposals for Climate Adaptation Grants for Tribes

    Broader source: Energy.gov [DOE]

    Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

  4. Communication adapter for use with a drilling component

    DOE Patents [OSTI]

    Hall, David R.; Pixton, David S.; Hall; Jr.; H. Tracy; Bradford, Kline; Rawle, Michael

    2007-04-03

    A communication adapter is disclosed that provides for removable attachment to a drilling component when the drilling component is not actively drilling and for communication with an integrated transmission system in the drilling component. The communication adapter comprises a data transmission coupler that facilitates communication between the drilling component and the adapter, a mechanical coupler that facilitates removable attachment of the adapter to the drilling component, and a data interface.

  5. Adaptive path planning algorithm for cooperating unmanned air vehicles

    SciTech Connect (OSTI)

    Cunningham, C T; Roberts, R S

    2001-02-08

    An adaptive path planning algorithm is presented for cooperating Unmanned Air Vehicles (UAVs) that are used to deploy and operate land-based sensor networks. The algorithm employs a global cost function to generate paths for the UAVs, and adapts the paths to exceptions that might occur. Examples are provided of the paths and adaptation.

  6. An Adaptive Path Planning Algorithm for Cooperating Unmanned Air Vehicles

    SciTech Connect (OSTI)

    Cunningham, C.T.; Roberts, R.S.

    2000-09-12

    An adaptive path planning algorithm is presented for cooperating Unmanned Air Vehicles (UAVs) that are used to deploy and operate land-based sensor networks. The algorithm employs a global cost function to generate paths for the UAVs, and adapts the paths to exceptions that might occur. Examples are provided of the paths and adaptation.

  7. An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control Adaptive control strategies ...

  8. Adaptable Computing Environment/Self-Assembling Software

    Energy Science and Technology Software Center (OSTI)

    2007-09-25

    Complex software applications are difficult to learn to use and to remember how to use. Further, the user has no control over the functionality available in a given application. The software we use can be created and modified only by a relatively small group of elite, highly skilled artisans known as programmers. "Normal users" are powerless to create and modify software themselves, because the tools for software development, designed by and for programmers, are amore » barrier to entry. This software, when completed, will be a user-adaptable computing environment in which the user is really in control of his/her own software, able to adapt the system, make new parts of the system interactive, and even modify the behavior of the system itself. Som key features of the basic environment that have been implemented are (a) books in bookcases, where all data is stored, (b) context-sensitive compass menus (compass, because the buttons are located in compass directions relative to the mouose cursor position), (c) importing tabular data and displaying it in a book, (d) light-weight table querying/sorting, (e) a Reach&Get capability (sort of a "smart" copy/paste that prevents the user from copying invalid data), and (f) a LogBook that automatically logs all user actions that change data or the system itself. To bootstrap toward full end-user adaptability, we implemented a set of development tools. With the development tools, compass menus can be made and customized.« less

  9. Adaptive Dynamic Event Tree in RAVEN code

    SciTech Connect (OSTI)

    Alfonsi, Andrea; Rabiti, Cristian; Mandelli, Diego; Cogliati, Joshua Joseph; Kinoshita, Robert Arthur

    2014-11-01

    RAVEN is a software tool that is focused on performing statistical analysis of stochastic dynamic systems. RAVEN has been designed in a high modular and pluggable way in order to enable easy integration of different programming languages (i.e., C++, Python) and coupling with other applications (system codes). Among the several capabilities currently present in RAVEN, there are five different sampling strategies: Monte Carlo, Latin Hyper Cube, Grid, Adaptive and Dynamic Event Tree (DET) sampling methodologies. The scope of this paper is to present a new sampling approach, currently under definition and implementation: an evolution of the DET me

  10. Adaptive powertrain control for plugin hybrid electric vehicles

    DOE Patents [OSTI]

    Kedar-Dongarkar, Gurunath; Weslati, Feisel

    2013-10-15

    A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

  11. Adaptive strategies for materials design using uncertainties

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Balachandran, Prasanna V.; Xue, Dezhen; Theiler, James; Hogden, John; Lookman, Turab

    2016-01-21

    Here, we compare several adaptive design strategies using a data set of 223 M2AX family of compounds for which the elastic properties [bulk (B), shear (G), and Young’s (E) modulus] have been computed using density functional theory. The design strategies are decomposed into an iterative loop with two main steps: machine learning is used to train a regressor that predicts elastic properties in terms of elementary orbital radii of the individual components of the materials; and a selector uses these predictions and their uncertainties to choose the next material to investigate. The ultimate goal is to obtain a material withmore » desired elastic properties in as few iterations as possible. We examine how the choice of data set size, regressor and selector impact the design. We find that selectors that use information about the prediction uncertainty outperform those that don’t. Our work is a step in illustrating how adaptive design tools can guide the search for new materials with desired properties.« less

  12. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, R.S.

    1986-05-02

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  13. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, Robert S.

    1987-01-01

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  14. Epigenomic Adaptation to Low Dose Radiation

    SciTech Connect (OSTI)

    Gould, Michael N.

    2015-06-30

    The overall hypothesis of this grant application is that the adaptive responses elicited by low dose ionizing radiation (LDIR) result in part from heritable DNA methylation changes in the epigenome. In the final budget period at the University of Wisconsin-Madison, we will specifically address this hypothesis by determining if the epigenetically labile, differentially methylated regions (DMRs) that regulate parental-specific expression of imprinted genes are deregulated in agouti mice by low dose radiation exposure during gestation. This information is particularly important to ascertain given the 1) increased human exposure to medical sources of radiation; 2) increased number of people predicted to live and work in space; and 3) enhanced citizen concern about radiation exposure from nuclear power plant accidents and terrorist ‘dirty bombs.’

  15. COSMOLOGICAL ADAPTIVE MESH REFINEMENT MAGNETOHYDRODYNAMICS WITH ENZO

    SciTech Connect (OSTI)

    Collins, David C.; Xu Hao; Norman, Michael L.; Li Hui; Li Shengtai

    2010-02-01

    In this work, we present EnzoMHD, the extension of the cosmological code Enzo to include the effects of magnetic fields through the ideal magnetohydrodynamics approximation. We use a higher order Godunov method for the computation of interface fluxes. We use two constrained transport methods to compute the electric field from those interface fluxes, which simultaneously advances the induction equation and maintains the divergence of the magnetic field. A second-order divergence-free reconstruction technique is used to interpolate the magnetic fields in the block-structured adaptive mesh refinement framework already extant in Enzo. This reconstruction also preserves the divergence of the magnetic field to machine precision. We use operator splitting to include gravity and cosmological expansion. We then present a series of cosmological and non-cosmological test problems to demonstrate the quality of solution resulting from this combination of solvers.

  16. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M

    2014-11-18

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  17. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M; Lee, Vo

    2014-04-15

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  18. Visualization Tools for Adaptive Mesh Refinement Data

    SciTech Connect (OSTI)

    Weber, Gunther H.; Beckner, Vincent E.; Childs, Hank; Ligocki,Terry J.; Miller, Mark C.; Van Straalen, Brian; Bethel, E. Wes

    2007-05-09

    Adaptive Mesh Refinement (AMR) is a highly effective method for simulations that span a large range of spatiotemporal scales, such as astrophysical simulations that must accommodate ranges from interstellar to sub-planetary. Most mainstream visualization tools still lack support for AMR as a first class data type and AMR code teams use custom built applications for AMR visualization. The Department of Energy's (DOE's) Science Discovery through Advanced Computing (SciDAC) Visualization and Analytics Center for Enabling Technologies (VACET) is currently working on extending VisIt, which is an open source visualization tool that accommodates AMR as a first-class data type. These efforts will bridge the gap between general-purpose visualization applications and highly specialized AMR visual analysis applications. Here, we give an overview of the state of the art in AMR visualization research and tools and describe how VisIt currently handles AMR data.

  19. Visualization of Scalar Adaptive Mesh Refinement Data

    SciTech Connect (OSTI)

    VACET; Weber, Gunther; Weber, Gunther H.; Beckner, Vince E.; Childs, Hank; Ligocki, Terry J.; Miller, Mark C.; Van Straalen, Brian; Bethel, E. Wes

    2007-12-06

    Adaptive Mesh Refinement (AMR) is a highly effective computation method for simulations that span a large range of spatiotemporal scales, such as astrophysical simulations, which must accommodate ranges from interstellar to sub-planetary. Most mainstream visualization tools still lack support for AMR grids as a first class data type and AMR code teams use custom built applications for AMR visualization. The Department of Energy's (DOE's) Science Discovery through Advanced Computing (SciDAC) Visualization and Analytics Center for Enabling Technologies (VACET) is currently working on extending VisIt, which is an open source visualization tool that accommodates AMR as a first-class data type. These efforts will bridge the gap between general-purpose visualization applications and highly specialized AMR visual analysis applications. Here, we give an overview of the state of the art in AMR scalar data visualization research.

  20. Adaptable radiation monitoring system and method

    DOE Patents [OSTI]

    Archer, Daniel E.; Beauchamp, Brock R.; Mauger, G. Joseph; Nelson, Karl E.; Mercer, Michael B.; Pletcher, David C.; Riot, Vincent J.; Schek, James L.; Knapp, David A.

    2006-06-20

    A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

  1. Dynamic and Adaptive Parallel Programming for Exascale Research | Argonne

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Leadership Computing Facility Sample multi-resolution adaptive decomposition of a function and flow of data associated with compression of the representation. Sample multi-resolution adaptive decomposition of a function and flow of data associated with compression of the representation. The example is in one dimension but practical applications are typically in three, four, five and even six dimensions. Robert Harrison, Stony Brook University Dynamic and Adaptive Parallel Programming for

  2. Climate Change Adaptation Policy Statement | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy Statement Climate Change Adaptation Policy Statement This policy statement affirms the Department of Energy's commitment to plan for and manage the short and long-term impacts of climate change on its mission, policies, programs, and operations. Climate Change Adaptation Policy Statement (631.83 KB) More Documents & Publications 2014 DOE Climate Change Adaptation Plan U.S. Department of Energy 2012 Strategic Sustainability Performance Plan Strategic Plan 2007 - Making Today's Change,

  3. Climate Change Adaptation Technical Fact Sheet: Contaminated Sediment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remedies | Department of Energy Contaminated Sediment Remedies Climate Change Adaptation Technical Fact Sheet: Contaminated Sediment Remedies This fact sheet addresses remedies for contaminated sediment. It is intended to serve as an adaptation planning tool by (1) providing an overview of potential climate change vulnerabilities and (2) presenting possible adaptation measures that may be considered to increase a remedy's resilience to climate change impacts. This tool was developed in

  4. Climate Change Adaptation Technical Fact Sheet: Landfills and Containment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    as an Element of Site Remediation | Department of Energy Landfills and Containment as an Element of Site Remediation Climate Change Adaptation Technical Fact Sheet: Landfills and Containment as an Element of Site Remediation This fact sheet addresses contaminated site remedies involving source containment systems. It is intended to serve as an adaptation planning tool by (1) providing an overview of potential climate change vulnerabilities and (2) presenting possible adaptation measures that

  5. Climate Change and the Los Alamos National Laboratory: The Adaptation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Challenge | Department of Energy and the Los Alamos National Laboratory: The Adaptation Challenge Climate Change and the Los Alamos National Laboratory: The Adaptation Challenge The Los Alamos National Laboratory (LANL) has been adapting to climate change related impacts that have been occurring on decadal time scales. The region where LANL is located has been subject to a cascade of climate related impacts: drought, devastating wildfires, and historic flooding events. Instead of buckling

  6. 2014 DOE Climate Change Adaptation Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change Adaptation Plan 2014 DOE Climate Change Adaptation Plan Document presents the U.S. Department of Energy (DOE) 2014 plan for adapting to climate change. doe_ccap_2014.pdf (583.95 KB) More Documents & Publications Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order 13653-Preparing the United States for the Impacts of Climate Change EO 13653: Preparing the United States for the Impacts of Climate Change (2013)

  7. Climate Change Adaptation/Resilience | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change Adaptation/Resilience Climate Change Adaptation/Resilience DOE is adapting to climate change by applying a risk-based resiliency approach to identify and minimize climate-related vulnerabilities across all DOE policies, programs and activities.DOE is assessing climate change vulnerabilities, using the best available science, to strengthen the agency's planning, operations, and investment activities and ensure the continuation of its mission. DOE facilities are located in all eight

  8. Parametric Adaptive Model Based Diagnostics | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parametric Adaptive Model Based Diagnostics Parametric Adaptive Model Based Diagnostics A model-based adaptive, robust technology is presented for on-board diagnostics of failure of diesel engine emission control devices and ethanol estimation of flex-fuel vehicles. p-06_franchek.pdf (256.08 KB) More Documents & Publications Model-Based Transient Calibration Optimization for Next Generation Diesel Engines Evaluation of 2010 Urea-SCR Technology for Hybrid Vehicles using PSAT System

  9. ADAPT Elektronik GmbH | Open Energy Information

    Open Energy Info (EERE)

    GmbH Jump to: navigation, search Name: ADAPT Elektronik GmbH Place: Grobheubach, Germany Zip: 63920 Sector: Solar Product: Germany-based manufacturer of electronic connector...

  10. Output-Based Error Estimation and Adaptation for Uncertainty...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Output-Based Error Estimation and Adaptation for Uncertainty Quantification Isaac M. Asher and Krzysztof J. Fidkowski University of Michigan US National Congress on Computational...